• Title/Summary/Keyword: 학과인증

Search Result 436, Processing Time 0.02 seconds

The Need for Education on Health and Medical Law for Nursing Students (간호대학생의 보건의료법에 대한 교육의 필요성)

  • Seung ok Shin
    • Journal of the Health Care and Life Science
    • /
    • v.10 no.2
    • /
    • pp.187-193
    • /
    • 2022
  • This study aimed to find out the learning outcomes of the program belonging to law and ethics, which is the category of the 4th cycle nursing certification evaluation, and to find out the direction of health care laws and regulations belonging to the related category accordingly. In the 4th cycle, 4 sub-competences were presented, and "learning outcomes are to practice nursing in accordance with law and ethics". Planning is recommended. In particular, health care laws and regulations are an important subject in the national examination for nurses, and the number of students who failed in the recent national examination for nurses was 1st to 2nd. However, if these subjects are recognized only as memorization-oriented national tests, the learning outcomes of the Nursing Education Accreditation and Evaluation Institute cannot be achieved. In particular, with the demand for high-level nursing care as a nurse and the expansion of work, related responsibilities and duties are increasing, so it is necessary to recognize the importance of achieving learning outcomes for health care laws and regulations and to make efforts to link learning outcomes.

A Study on the Security Performance of JWT Token Signature Algorithms (JWT 토큰 서명 알고리즘 보안 성능에 대한 연구)

  • Chaeeun Lee;Sanghoon Jeon
    • Convergence Security Journal
    • /
    • v.24 no.4
    • /
    • pp.3-10
    • /
    • 2024
  • With the rapid expansion of the web environment, users are using various web services. As Internet users increase, phishing techniques such as stealing user IDs and passwords are occurring. In order to provide a safe environment, security technologies must be fully known and applied, and a secure authentication method is required for this. This study compares and analyzes web page security using token signing algorithms such as HMAC and RSA, specifically HS256 and RS256. The HS256 algorithm is fast and efficient but has difficulties in managing symmetric keys. In contrast, RS256 uses a public and private key, offering higher security, although longer key lengths increase the time required for key generation and encryption. Evaluation of the security performance of the two algorithms against brute force attacks show that RS256 is relatively safer than HS256. These results demonstrate the need for an appropriate selection of token signing algorithms, considering both processing performance and security performance, to ensure web security. We hope this study will be an important guideline for selecting algorithms to enhance web security and protect user authentication information.

Protection Profile for Smart Meters: Vulnerability and Security Requirements Analysis (스마트미터의 취약성/보안요구사항 분석 CC v3.1 기반 보호프로파일 개발)

  • Jung, Chul-Jo;Eun, Sun-Ki;Choi, Jin-Ho;Oh, Soo-Hyun;Kim, Hwan-Koo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.111-125
    • /
    • 2010
  • There is a growing interest in "smart grid" technology, especially after the government recently announced "low-carbon green-growth industry" project. A smart grid uses "smart meters", which can be deployed in any power-consuming places like homes and factories. It has been shown that smart meters have several security weaknesses. There is, however, no protection profile available for smart meters, which means that safety with using them is not guaranteed at all. This paper analyzes vulnerabilities of smart meters and the relevant attack methods, thereby deriving the security functions and requirements for smart meters. Finally, we propose a protection profile based on Common Criterion v3.l for smart meters.

An Analysis of Spatial Characteristics of Environmental-Friendly Certified Farms - Focused on Jeollanam-do - (친환경 인증 농경지의 공간적 특성 분석 - 전라남도를 대상으로 -)

  • Park, Yujin;Gu, Jeong-Yoon;Lee, Sang-Woo;An, Kyungjin;Choi, Jinah;Kim, Sangbum;Park, Se-Rin
    • Journal of Korean Society of Rural Planning
    • /
    • v.29 no.3
    • /
    • pp.79-89
    • /
    • 2023
  • As the demand for environmental-friendly agricultural products continues to rise due to increased concerns regarding food safety and ecosystem conservation, it is becoming important to identify regions and spatial locations where environmental-friendly should be intensively established for production integration. This study aims to analyze the spatial distribution of environmental-friendly certified farms in Jeollanam-do, South Korea. Spatial statistical analysis based on Local Moran's I and Getis-Ord Gi* were used to identify spatial cluster characteristics and landscape indices were utilized to analyze spatial patterns of environmental-friendly certified farms. The results indicated that Haenam-gun, Gangjin-gun, Muan-gun, and Jindo-gun were identified as hotspots, while Muan-gun, Goheung-gun, and Jindo-gun exhibited high connectivity. This suggests that environmental-friendly certified farms in Muan-gun and Jindo-gun were clustered and closely connected to one another. Based on the results of the spatial distribution of environmental-friendly certified farms, areas belonging to the hotspot and with high connectivity should be managed as clustered districts to secure the foundation and system of environmental-friendly certified farms. Areas that belong to cold spots and have low connectivity should be preceded by measures to promote conversion to environmental-friendly agriculture. In addition, it is necessary to make it possible to create a large-scale cluster district through a long-term spatial planning strategy to expand the environmental-friendly certified farms. The findings of this study can provide quantitative data on policies and discussions for developing a model for rural spatial planning.

Application Design for Food Allergy Management (식품 알레르기 관리에 관한 애플리케이션 설계)

  • Ji-Uk Han;Nam-Bin Kim;Ye-Won Lee;Byeong-Seung Yang;Won-Whoi Huh
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.2
    • /
    • pp.197-203
    • /
    • 2024
  • Food allergies are common and accidents occur annually. However, many people lack knowledge of the severity of allergies and food ingredients. Allergy-related applications currently on the market have problems such as providing information by relying only on certain certified products, food ingredients, and barcodes. This design plans a customized service application for food allergy patients. In this application, after extracting the text of the image using OCR technology, the food ingredients were read and displayed in large letters. In addition, if the user selects an ingredient that cannot be consumed through filtering technology, the restricted food is quickly and conveniently shown when searching for food ingredients. Finally, when scanning a barcode or searching for a product, food ingredient information is provided through barcode scanning and search engine technology that provides ingredient information of the product. Therefore, the purpose of this paper is to design an app in which users with food allergies can easily check food ingredients and avoid allergic reactions using databases and various information search methods.

An Experimental Study on the Semi-Automated Formal Verification of Cryptographic Protocols (암호프로토콜 논리성 자동 검증에 관한 연구)

  • 권태경;양숙현;김승주;임선간
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.115-129
    • /
    • 2003
  • This paper presents a semi-automated formal verification method based on the famous SVO logic, and discusses its experimental results. We discuss several problems on automating the SVO logic and design its derivative, ASVO logic for automation. Also the proposed method is implemented by the Isabelle/Isar system. As a result, we verified the well-known weakness of the NSSK protocol that is vulnerable to the Denning-Sacco attack, using our Isabelle/ASVO system. Finally, we refined the protocol by following the logical consequence of the ASVO verification.

A Study on Distributed OCSP for minimizing the load of OCSP Server based on PKI (PKI환경의 OCSP서버 부하 감소를 위한 OCSP 분산 기법)

  • Ko, Hoon;Jang, Eui-Jin;Shin, Yong-Tae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.97-106
    • /
    • 2003
  • The important factor in Public-Key Infrastructure is the authentication to correspondent. We receive the digital certificate for authentication between each other, and then we check the existence of validity on the certificate by Certification Revocation List(CRL). But, To use CRL is the scheme used in offline status. So, it is impossible to refer to the latest information and the CRL scheme which is used after downloading is variously unsuitable to getting bigger of the CRL size as time goes on. Therefore, we prefer OCSP(Online Certificate Status Protocol) used in online to CRL used in offline. Consequently, we propose the scheme which provides the request of fast verification in case of requesting the verification on the certificate by owning the same update information to Certificate Registry and distributed OCSP.

A study on the Efficient OKTEK(One-way Key-chain for TEK) for Realtime Digital Contents Transmission (실시간 디지털 콘텐츠 데이터 전송을 위한 효율적인 OKTEK(One-way Key-chain for TEK) 기법에 관한 연구)

  • Jeon, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.3
    • /
    • pp.103-111
    • /
    • 2009
  • IEEE 802.16e(Wibro) standard, providing robust mobile realtime data transmission technology, requires of faster and smooth execution of security mechanisms, such as key distribution and user authentications, during base station hopping. In particular, key management mechanisms such as redistribution and regeneration have an impact on digital contents transmission and realtime data transmission, not only in 802.16e environment, but also in typical transmission environment as well. This paper presents traffic management mechanisms designed to realtime digital contents (such as IPTV) transmission efficiency and increase the QoE by utilizing OKTEK methodology.

Auto Qualification Test Guide of Control Loading System for Flight Simulation Training Device (모의비행훈련장치용 조종반력시스템의 자동-QTG 구현)

  • Chun-Han Hong;Won-Seok Shin;Sang-Jin Jung;Byeong Soo Kim
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.32 no.2
    • /
    • pp.11-19
    • /
    • 2024
  • Flight simulators are crucial devices for aircraft piloting training and simulation, requiring regular inspections to maintain performance and operational quality. This study explores the development of an automated inspection system for flight simulators to automate quality inspections of control loading systems (CLS). While quality inspection of the control loading system (CLS) is essential for flight simulators, manual inspections are common practice. To address this, we developed an Auto Qualification Test Guide (Auto QTG) using artificial control logic and sensor data and applied it to the militarily simulator. Experimental results demonstrate that Auto QTG successfully automates quality inspections of CLS, enhancing accuracy and efficiency. This automated inspection system is expected to contribute to improving the operation and maintenance of flight simulators.

Authentication and Key Agreement Protocol based on NTRU in the Mobile Communication (NTRU기반의 이동 통신에서의 인증 및 키 합의 프로토콜)

  • 박현미;강상승;최영근;김순자
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.3
    • /
    • pp.49-59
    • /
    • 2002
  • As the electronic commerce increases rapidly in the mobile communication, security issues become more important. A suitable authentication and key agreement for the mobile communication environment is a essential condition. Some protocols based on the public key cryptosystem such as Diffie-Hellman, EIGamal etc. were adapted in the mobile communication. But these protocols that are based on the difficult mathematical problem in the algebra, are so slow and have long key-length. Therefore, these have many limitation to apply to the mobile communication. In this paper, we propose an authentication and key agreement protocol based on NTRU to overcome the restriction of the mobile communication environment such as limited sources. low computational fewer, and narrow bandwidth. The proposed protocol is faster than other protocols based on ECC, because of addition and shift operation with small numbers in the truncated polynomial ring. And it is as secure as other existent mathematical problem because it is based on finding the Shortest or Closest Vector Problem(SVP/CVP).