• Title/Summary/Keyword: Authorization System

Search Result 240, Processing Time 0.028 seconds

Electrolytic Decontamination of the Dismantled Metallic Wastes Contaminated with Uanium Compounds in Neutral Salt Solutions (중성염 용액 내에서 우라늄으로 오염된 금속성 해체폐기물의 전해제염)

  • 최왕규;이성렬;김계남;원휘준;정종헌;오원진
    • Proceedings of the Korean Radioactive Waste Society Conference
    • /
    • 2004.06a
    • /
    • pp.72-80
    • /
    • 2004
  • Electrolytic dissolution study was carried out to evaluate the applicability of electrochemical decontamination process using a neutral salt electrolyte as a decontamination technology for the recycle or self disposal with authorization of large amount of metallic wastes contaminated with uranium compounds generated by dismantling a retired uranium conversion plant using SUS-304 and Inconel-600 specimen as the main materials of internal system components of the plant. The effects of type of neutral salt as an electrolyte, current density, and concentration of electrolyte on the dissolution of the materials were evaluated. On the basis of the results obtained through the basic inactive experiments, electrochemical decontamination tests using the specimens contaminated with uranium compounds such as $UO_2$, AUC (ammonium uranyl carbonate) and ADU (ammonium diuranate) taken from an uranium conversion plant were peformed in $Na_2SO_4$ and $NaNO_3$ solution. It was verified that the electrochemical decontamination of the dismantled metallic wastes was quite successful in $Na_2SO_4$ and $NaNO_3$ neutral salt electrolyte by reducing $\beta$ radioactivities below the level of self disposal with authorization within 10 minutes regardless of the type of contaminants and the degree of contamination.

  • PDF

New Approach for Detecting Leakage of Internal Information; Using Emotional Recognition Technology

  • Lee, Ho-Jae;Park, Min-Woo;Eom, Jung-Ho;Chung, Tai-Myoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4662-4679
    • /
    • 2015
  • Currently, the leakage of internal information has emerged as one of the most significant security concerns in enterprise computing environments. Especially, damage due to internal information leakage by insiders is more serious than that by outsiders because insiders have considerable knowledge of the system's identification and password (ID&P/W), the security system, and the main location of sensitive data. Therefore, many security companies are developing internal data leakage prevention techniques such as data leakage protection (DLP), digital right management (DRM), and system access control, etc. However, these techniques cannot effectively block the leakage of internal information by insiders who have a legitimate access authorization. The security system does not easily detect cases which a legitimate insider changes, deletes, and leaks data stored on the server. Therefore, we focused on the insider as the detection target to address this security weakness. In other words, we switched the detection target from objects (internal information) to subjects (insiders). We concentrated on biometrics signals change when an insider conducts abnormal behavior. When insiders attempt to leak internal information, they appear to display abnormal emotional conditions due to tension, agitation, and anxiety, etc. These conditions can be detected by the changes of biometrics signals such as pulse, temperature, and skin conductivity, etc. We carried out experiments in two ways in order to verify the effectiveness of the emotional recognition technology based on biometrics signals. We analyzed the possibility of internal information leakage detection using an emotional recognition technology based on biometrics signals through experiments.

A Conceptual Design of Spatial and Non-spatial Information for Water Hazard Information Management and Service (수재해 정보관리 및 서비스를 위한 공간, 비공간 정보 자료 개념 설계)

  • Lee, Jeong-Ju;Kim, Dong-Young;Jung, Young-Hun;Hwang, Eui-Ho;Chae, Hyo-Sok
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.58 no.2
    • /
    • pp.21-29
    • /
    • 2016
  • This study conducted a basic design of system and interface which provide both of spatial and non-spatial data for water hazard information management. This helps to decide directions of the future integrated water hazard information platform and possible technical examinations of the web-based system for the realization of the prototype. For user friendly system, this study did a survey to investigate the data format, service environment, image processing level and visualization type that users prefer. Also, authorization range was set up by type of the user group. In the water hazard information platform, the data and analysis algorithm were classified by the fields. Furthermore, the platform was consisted with six block systems according to the function and the interface and designed to flexibly mount or modify the additional functions. For a basic design of the data exchange method and protocols, a prototype was constructed by using the spatial information web service technology. The portal service system to visualize and provide spatial data was designed by the WMS/WFS type of OGC standard interface and the FTP/HTTP interface type through open source GIS software for server environment.

Problems and Solutions for the Private-funded Railroad Station Project Management (철도 민자역사 사업수행체계 개선방안)

  • Park Chan-Sik;Jeon Yong-Seok
    • Korean Journal of Construction Engineering and Management
    • /
    • v.5 no.2 s.18
    • /
    • pp.172-180
    • /
    • 2004
  • Recently, there are growing concerns on the introduction of private financing in railroad station construction project. But private-funded station project does not have the efficient delivery system. This study is focused on the recommended solutions about the private-funded station project management. Through the literature survey and interview, it is investigated and analyzed that project management has the problems. The problems are classified as 2 areas: law & regulations and job practice. The problems in law & regulations are a lowing on the profitability, and an unreasonable project team selection process. Job practice has problems such as delaying in authorization process, and inferior feasibility analysis. The study suggests several recommended solutions related to the problem areas. That are as follows: the efficient return of investment system, the project financing system, the professional project management, the benchmarking team operation, and the cut down on discussion period

Implementation of Hybrid Smartcard Using Multi Encryption Method (다중 암호화 기법을 활용한 하이브리드 스마트카드 구현)

  • 이성은;장홍종;박인재;한선영
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.2
    • /
    • pp.81-89
    • /
    • 2003
  • With the rapid development of information and communication technology, online dissemination increases rapidly. So, It becomes more important to protect information. Recently the authentication system using public key infrastructure (PKI) is being utilized as an information protection infrastructure for electronic business transactions. And the smartcard system makes the most use of such an infrastructure. But because the certification based on the current PKI provides oかy basic user certification information, the use has to be limited in various application services that need the identification and authorization information as well as face-to-face information of the user. In order to protect a system from various kinds backings and related treats, we have proposed angular and private key multiplexing for prevention of smartcard forgery and alteration based on a photopolymer cryptosystem. When smartcard becomes prone to forgery and alteration, we should be able to verify it. Also, our parer proposes a new authentication system using multi authentication based on PKI. The smartcard has an excellent advantage in security and moving.

A Study on Parts Manufacturer Approval in Civil Aviation Law (항공기 부품제작자증명에 관한 연구)

  • Lee, Kang-Yi;Jin, Young-Kwon;Lee, Jong-Hee;Lee, Kwang-Hee
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.17
    • /
    • pp.133-152
    • /
    • 2003
  • Certification by Civil Aviation Law is necessary for aircraft parts and appliances as well as aircraft, engines, and propellers to ensure safety and reliability in operation. Advanced countries in aerospace industry as like U.S.A require Parts Manufacturer Approval for aircraft parts and Technical Standard Order Authorization for designated appliances. However, there are no legal requirements for certification of aircraft parts and appliances in Korea until now. This study presents the draft to revise Civil Aviation Law, which is applicable to set up domestic certification system and maintain it equivalent to U.S. Federal Aviation Regulation.

  • PDF

Analysis of the Organization Structure and Learning Objectives of High School Informatics Textbooks (고등학교 정보 교과서의 구성체계 및 학습목표 분석)

  • Kang, Oh-Han
    • The Journal of Korean Association of Computer Education
    • /
    • v.23 no.3
    • /
    • pp.9-15
    • /
    • 2020
  • This study analyzed high school informatics textbooks that were developed based on the 2015 Revised National Curriculum. Content analysis was adopted to analyze the organization system of the textbooks. Learning objectives were also analyzed according to Anderson's taxonomy of educational objectives. Through content analysis, it was revealed that the textbooks were composed of activities, differentiated learning, and small group learning to promote core competencies. The analysis of learning objectives of the textbooks showed that 'understanding' (41%), 'developing' (20%), and 'applying' (18%) were the three highest criteria in terms of cognitive processes; in terms of type of knowledge, conceptual knowledge accounts for the highest(45%), followed by procedural (32%), and factual (12%). Further methods to improve the textbook quality is proposed based on the results from this analysis.

E-licensing 이용 동향과 고도화 방안 연구

  • Lee Tae-Jin;Jeong Hae-Gung;Song Gi-Hong
    • The Proceeding of the Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.17 no.3 s.59
    • /
    • pp.87-100
    • /
    • 2006
  • Recently, a lot of countries including the USA, Japan and European countries are working on applying IT technologies to spectrum management. Korea has put the G4C(Government for Citizen) project in pace that enables customers to access online public services including authorization of radio station. To improve the spectrum access and use, it is required to develop advanced support system for spectrum policy. This study analyzed and compared the e-licensing systems of foreign countries with those of Korea, and considers what process and methods of e-licensing are needed for Korea.

Development of Authentication and Authorization System based on User Location for an Administration Equipment (사용자 위치 기반의 관리장비 인증 및 권한부여 시스템 개발)

  • Hong, Sung-Min;Kim, Eun-Gyeong;Kim, Seok-Hoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.129-131
    • /
    • 2017
  • 최근 다양한 사물인터넷 장비들의 개발 및 도입이 확산됨에 따라, 도입된 장비들에 대한 관리의 중요성이 나날이 부각되고 있다. 현재 이러한 사물인터넷 환경을 구성하고 있는 다수의 장비들을 효과적으로 관리할 수 있는 다양한 관리장비들이 출시되어 있지만, 이 중 가장 범용적으로 사용되고 있는 장비는 스마트폰이다. 스마트폰은 언제 어디서나 사용할 수 있다는 장점이 있지만, 관리되는 장비의 특성에 따라 스마트폰으로 원격지에서 특정 장비를 관리하게 될 경우 보안 및 장비상태의 정확한 확인 등의 측면에서 많은 위험성을 내포하게 된다. 때문에, 본 논문에서는 스마트폰을 이용하되 특정 위치 또는 범위를 벗어나는 경우에는 사용자가 관리장비에 접근할 수 없도록 하여, 잠재적인 위험성을 미연에 방지할 수 있는 시스템을 제안한다. 이러한 문제점들을 해결하기 위해, 본 논문에서 제안하는 시스템은 안드로이드 디바이스에서 사용가능한 센서 기술들을 활용하여, 특정 지역 및 범위 내에서만 관리장비에 접근할 수 있도록 하는 솔루션을 내재하고 있으며, 이를 실제로 모바일 기반 승강기 보수작업용 컴퓨터의 인증 및 권한부여 시스템에 적용하여, 제안 시스템의 우수성을 검증하였다.

A Study on the Certification System in Electromic Commerce (전자상거래(電子商去來)의 인증체계(認證體系)에 관한 고찰(考察))

  • Ha, Kang Hun
    • Journal of Arbitration Studies
    • /
    • v.9 no.1
    • /
    • pp.367-390
    • /
    • 1999
  • The basic requirements for conducting electronic commerce include confidentiality, integrity, authentication and authorization. Cryptographic algorithms, make possible use of powerful authentication and encryption methods. Cryptographic techniques offer essential types of services for electronic commerce : authentication, non-repudiation. The oldest form of key-based cryptography is called secret-key or symmetric encryption. Public-key systems offer some advantages. The public key pair can be rapidly distributed. We don't have to send a copy of your public key to all the respondents. Fast cryptographic algorithms for generating message digests are known as one-way hash function. In order to use public-key cryptography, we need to generate a public key and a private key. We could use e-mail to send public key to all the correspondents. A better, trusted way of distributing public keys is to use a certification authority. A certification authority will accept our public key, along with some proof of identity, and serve as a repository of digital certificates. The digital certificate acts like an electronic driver's license. The Korea government is trying to set up the Public Key Infrastructure for certificate authorities. Both governments and the international business community must involve archiving keys with trusted third parties within a key management infrastructure. The archived keys would be managed, secured by governments under due process of law and strict accountability. It is important that all the nations continue efforts to develop an escrowed key in frastructure based on voluntary use and international standards and agreements.

  • PDF