• Title/Summary/Keyword: Authorization System

Search Result 240, Processing Time 0.022 seconds

TSO Authorization of Airborne Multipurpose Electronic Displays (항공기용 다목적 디스플레이의 기술표준품 인증)

  • Cheon, Young-Ho;Lee, Seoung-Pil;Park, Jun-Hyeon
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.6
    • /
    • pp.765-776
    • /
    • 2013
  • Civilian aircraft industry, even if the superior performance of the product in order to ensure the safety of aircraft navigation safety requirements necessary for compliance does not receive a legally recognized can not be used in aircraft characteristics. These are applied in a variety of safety in avionics for navigation of civil aircraft certification standards for the technology is implemented. KTSO-C113 aircraft for the purpose of electronic display technology to authenticate standard contains minimum performance standards. Standard design and manufacturing technology for type approval means approval by mounting the aircraft in order to use a separate approval is required. Through this paper, multi-display technology standards for aircraft type certification approval system and demonstrate compliance with the requirements for the certification practices introduced are presented.

Design and Implementation of CoAP Authorization Framework Based on OAuth 2.0 (OAuth 2.0 기반 CoAP 인증 프레임워크 설계 및 구현)

  • Kim, Kyoung-Han;Lim, Hyun-Kyo;Heo, Joo-Seong;Han, Youn-Hee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.8
    • /
    • pp.329-342
    • /
    • 2017
  • Recently, interest and investment in the Internet of Things (IoT) have increased significantly, and security issues are constantly being raised. As a solution, the IETF ACE Working Group is establishing the ACE framework standard, which is a new security framework for various constrained IoT environments based on the existing OAuth 2.0. However, additional work is required to apply the ACE framework, which proposes a new lightweight security system, to the existing Internet environment, and this additional cost is a factor that hinders the application of OAuth 2.0 to the IOT environment. Therefore, we propose an IoT authentication framework based on OAuth 2.0's existing development motivation, and implement a proposal framework based on CoAPthon and analyze its performance.

A Study on the Improvement Measures of Drowning Accident in South Korea (물놀이 안전사고 개선방안에 관한 연구)

  • Kim, Jung-Gon;Lim, Hojung;Kim, Tae-Hwan;Lee, Dae-Sung
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.1
    • /
    • pp.153-164
    • /
    • 2019
  • Purpose: This paper aims to derive improvement measures, in terms of legal and technical aspects, which can reduce effectively the casualties caused by drowing accidents. Method: Firstly, we checked the status of drowing accident management and carried out the interview of field private safety guards. field private safety guards. In addition, surveys were conducted on safety personnel and managers. Based on survey results, we are lastly analyzed the specific problems and reviews the improvement measures from technical and legal aspects. Result: As an analytical result, it was considered that supplementary supporting tools such as CCTV, monitoring devices using IoT and artificial intelligence technologies were necessary to prevent drowning accident, and qualification with limited authority should be added to the private safety guard because of the lack of regulation. Conclusion: In order to manage water safety effectively, a comprehensive water safety management system should be established that integrates people and equipment through systemic education of security personnel, authorization of enforcement, and introduction of surveillance equipment.

An Architecture of Access Control Model for Preventing Illegal Information Leakage by Insider (내부자의 불법적 정보 유출 차단을 위한 접근통제 모델 설계)

  • Eom, Jung-Ho;Park, Seon-Ho;Chung, Tai-M.
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.5
    • /
    • pp.59-67
    • /
    • 2010
  • In the paper, we proposed an IM-ACM(Insider Misuse-Access Control Model) for preventing illegal information leakage by insider who exploits his legal rights in the ubiquitous computing environment. The IM-ACM can monitor whether insider uses data rightly using misuse monitor add to CA-TRBAC(Context Aware-Task Role Based Access Control) which permits access authorization according to user role, context role, task and entity's security attributes. It is difficult to prevent information leakage by insider because of access to legal rights, a wealth of knowledge about the system. The IM-ACM can prevent the information flow between objects which have the different security levels using context role and security attributes and prevent an insider misuse by misuse monitor which comparing an insider actual processing behavior to an insider possible work process pattern drawing on the current defined profile of insider's process.

Patient Information Transfer System Using OAuth 2.0 Delegation Token (OAuth 2.0 위임 Token을 이용한 환자정보 전달 시스템)

  • Park, Jungsoo;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1103-1113
    • /
    • 2020
  • Hospitals store and manage personal and health information through the electronic medical record (EMR). However, vulnerabilities and threats are increasing with the provision of various services for information sharing in hospitals. Therefore, in this paper, we propose a model to prevent personal information leakage due to the transmission of patient information in EMR. A method for granting permission to securely receive and transmit patient information from hospitals where patient medical records are stored is proposed using OAuth authorization tokens. A protocol was proposed to enable secure information delivery by applying and delivering the record access restrictions desired by the patient to the OAuth Token. OAuth Delegation Token can be delivered by writing the authority, scope, and time of destruction to view patient information.This prevents the illegal collection of patient information and prevents the leakage of personal information that may occur during the delivery process.

Design and implementation of improved authentication mechanism base on mobile DRM using blockchain (블록체인을 이용한 모바일 DRM 기반 개선된 인증 메커니즘 설계 및 구현)

  • Jeon, Jinl-Oh;Seo, Byeong-Min
    • Journal of Digital Convergence
    • /
    • v.19 no.4
    • /
    • pp.133-139
    • /
    • 2021
  • Due to the rapid progress in network technology, many research on content security technologies is also being conducted in the mobile digital content sector. In the meantime, content protection has been immersed in preventing illegal copying, certifying, and issuance/management certificates, but still have many vulnerabilities in managing or authenticating confidential information. This study aims to strengthen confidential information about content based on dual management of content download rights through mobile phone numbers or device numbers. It also protect replay-attack by building a secure mobile DRM system where digital content is safely distributed based on a three-stage user authentication process. In addition, blockchain-based content security enhancements were studied during the primary/secondary process for user authentication for the prevention of piracy and copyright protection. In addition, the client authentication process was further improved through three final stages of authorization in the use of illegal content, considering that legitimate users redistributed their content to third-party.

A Study on Activation Policy of Smart Construction Safety Cost by Analyzing Actually Estimated Amount in Safety Management Plan (스마트건설안전 비용의 안전관리계획서 계상 현황 분석을 통한 활성화 방안 연구)

  • Won, Jeong-Hun;Jang, Nam Gwon;Yu, Ji Young
    • Journal of the Korean Society of Safety
    • /
    • v.37 no.3
    • /
    • pp.34-44
    • /
    • 2022
  • This study analyzed the smart construction safety cost included in safety management plans that are approved before construction. Specifically, it refers to the cost incurred in constructing and operating a safety management system using wireless communication and facilities. Based on the obtained statistical results, an activation policy for the inclusion of the smart construction safety cost in building safety management plans was proposed. The smart construction safety cost must be included in the safety management cost; notably, this is mandated by the Construction Technology Promotion Act. However, there are some problems with the inclusion of smart construction safety costs. To analyze the problems encountered when calculating the smart construction safety cost and including it in safety management plans, in this study, statistical analysis was performed using the data of 1,334 safety management plans received at the Construction Safety Management Integrated Information (CSI) from June to August 2021. The results show that only 50.7% of the safety management plans included the smart construction safety cost although the current law mandates 100% inclusion of these costs. Thus, it is apparent that the smart construction safety costs are only included in a low proportion of sites. In addition, the calculated smart construction safety costs were shown to have a small correlation with the construction cost; moreover, they appeared to be distributed at a constant cost level. In this context, it is believed that perfunctory cost calculations were performed at most sites since the effect of the construction cost on the smart construction safety cost was negligible. Therefore, it is necessary to improve the inclusion of smart construction safety costs by strengthening the authorization process of the approval institute of safety management plans. In addition, institutional support, such as guidelines that promote the calculation and inclusion of appropriate smart construction safety costs according to the characteristics of sites, are needed.

Black box-assisted fine-grained hierarchical access control scheme for epidemiological survey data

  • Xueyan Liu;Ruirui Sun;Linpeng Li;Wenjing Li;Tao Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.9
    • /
    • pp.2550-2572
    • /
    • 2023
  • Epidemiological survey is an important means for the prevention and control of infectious diseases. Due to the particularity of the epidemic survey, 1) epidemiological survey in epidemic prevention and control has a wide range of people involved, a large number of data collected, strong requirements for information disclosure and high timeliness of data processing; 2) the epidemiological survey data need to be disclosed at different institutions and the use of data has different permission requirements. As a result, it easily causes personal privacy disclosure. Therefore, traditional access control technologies are unsuitable for the privacy protection of epidemiological survey data. In view of these situations, we propose a black box-assisted fine-grained hierarchical access control scheme for epidemiological survey data. Firstly, a black box-assisted multi-attribute authority management mechanism without a trusted center is established to avoid authority deception. Meanwhile, the establishment of a master key-free system not only reduces the storage load but also prevents the risk of master key disclosure. Secondly, a sensitivity classification method is proposed according to the confidentiality degree of the institution to which the data belong and the importance of the data properties to set fine-grained access permission. Thirdly, a hierarchical authorization algorithm combined with data sensitivity and hierarchical attribute-based encryption (ABE) technology is proposed to achieve hierarchical access control of epidemiological survey data. Efficiency analysis and experiments show that the scheme meets the security requirements of privacy protection and key management in epidemiological survey.

Constitutional Legitimacy of the Maritime Cadet Training System : Justifiable Restrictions on the Cadet's Fundamental Rights at the College of Maritime Science of the KMOU (해사대학 승선생활교육의 헌법상 기본권제한에 관한 연구 - 한국해양대학교 해사대학을 중심으로 -)

  • Lee, Sang-Il;Yoo, Jin-Ho;Choi, Jung-Hwan
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.22 no.5
    • /
    • pp.430-443
    • /
    • 2016
  • This paper involves the constitutionality of the restrictive by-laws established by the 'College of Maritime Science' at the 'Korea Maritime and Ocean University' when they affect the cadet's fundamental rights, particularly, in connection with the training system of the 'Merchant Cadet Dormitory.' The issue in question is whether the school regulations may fall within a judicially permissible boundary in light of the general principles of constitutional rights in that the rules are enacted by the school itself in accordance with the Article 31, Section 4 of the Constitution and largely regulate the cadets' living conditions on a campus. However, the general scrutiny standard the courts apply requires the school enactments to pass three tests to be justified: (1) legislative authorization, (2) proportionality and (3) non-infringement on the essential elements of the fundamental rights as articulated under Article 37, Section 2 of the Constitution. The review in this paper shows that, first, the by-laws at issue find themselves statutorily authorized by the 'Higher Education Act' and the 'Decree of the Establishment of National Schools', with the proportionality as a second part observed within a justifiable scope and the essential elements of the fundamental rights as the third point not being marred. In conclusion, the school's dormitory training system is not found to cross the line and, however, the school authorities still need to keep overseeing the overall training course to secure the constitutional proportionality.

Implementation of Monitoring System of the Living Waste based on Artificial Intelligence and IoT (AI 및 IoT 기반의 생활 폐기물 모니터링 시스템 구현)

  • Kim, Sang-Hyun;Kang, Young-Hoon;Yoon, Dal-Hwan
    • Journal of IKEEE
    • /
    • v.24 no.1
    • /
    • pp.302-310
    • /
    • 2020
  • In this paper, we have implemented the living waste analysis system based on IoT and AI(Artificial Intelligence), and proposed effective waste process and management method. The Jeju location have the strong point to devise a stratagem and estimate waste quantization, rather than others. Especially, we can recognized the amount variation of waste to the residence people compare to the sightseer number, and the good example a specific waste duty. Thus this paper have developed the IoT device for interconnecting the existed CCTV camera, and use the AI algorithm to analysis the waste image. By using these decision of image analysis, we can inform their deal commend and a decided information to the map of the waste cars. In order to evaluate the performance of IoT, we have experimented the electromagnetic compatibility under a national official authorization KN-32, KN61000-4-2~6, and obtained the stable experimental results. In the further experimental results, we can applicable for an data structure for precise definition command by using the simulated several waste image with artificial intelligence algorithm.