• Title/Summary/Keyword: Certificate information management

Search Result 195, Processing Time 0.025 seconds

The Study of Improvement of Personal Information Leakage Prevention in Mobile Environment (모바일 환경에서 개인정보 유출 방지를 위한 개선 연구)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.3
    • /
    • pp.53-62
    • /
    • 2015
  • Recently, number of tablet or Smartphone users increased significantly in domestic and around the world. But violation of personal information such as leakage, misuse and abuse are constantly occurring by using mobile devices which is very useful in our society. Therefore, in this paper it will talk about the problems in the network environment of the mobile environment such as tablet and Smartphone, Mobile Malware, hacking of the public key certificate, which could be potential threat to mobile environment. This thesis will research for people to use their mobile devices more reliable and safer in mobile environment from invasion and leakage of personal information. In order to use Smartphone safely, users have to use Wi-Fi and Bluetooth carefully in the public area. This paper will research how to use App safely and characteristic of risk of worm and Malware spreading. Because of security vulnerabilities of the public key certificate, it will suggest new type of security certification. In order to prevent from the information leakage and infect from Malware in mobile environment without knowing, this thesis will analyze the improved way to manage and use the mobile device.

Development plans of FTA Experts in Product Areas (상품분야 FTA 전문 인력 양성 방안)

  • LIM, Mok-Sam;CHOI, Mi-Soo
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.70
    • /
    • pp.159-179
    • /
    • 2016
  • Companies do not be resolved by the FTA services of external aid should be operational by assigning dedicated personnel inside the company. FTA is a choice, not an essential trade agreement requirements. If the exporter contracts to provide a certificate of origin in trade agreements, it shall issue a certificate of origin of goods originating management is performed. When considering the future trend of spreading wide FTA, it should be extended to one year to take advantage of the FTA Certificate of Origin environments utilizing a comprehensive environment for regional countries that require proof of origin between certain countries, such as current. FTA utilization of the future is to utilize the GVC(Global Value Chain) efficiently. In other words, the expansion of the consumer market and take advantage of an efficient production base across borders. These environmental changes are needed development of the FTA utilization promotion and FTA experts. The experts studying how to procure raw materials or intermediate goods exports in a variety of regional foreign countries, to meet the rules of origin is required for a successful FTA utilization. One of the objectives of Origin managers are qualified experts in the country of origin can take advantage of the FTA plan. Therefore, managers of origin shall collect their ability to expand the understanding and information about the industry as an international business perspective beyond the Certificate of Origin. In addition, it should be in their best learning expertise for the introduction and development of country of origin control system in an effort to effectively perform its international FTA utilization. Once the FTA is more widespread in the future and build a common origin information it must not be disconnected until the export enterprises from terminal manufacturers systematically. Therefore origin management is preferred by expanding the knowledge base of teaching and learning in the common sense to the universal subject of specialization from professional schools to promote the relevant departments so that they can be opened in a college or university. An FTA hub linking East and West, also need the confidence that in order to become a center of Glabal Supply Chain Using an FTA Certificate of Origin and stable environment for importers to import products from the country offers. Certificate of Origin and all of them thoroughly exporters and companies related to the administration of origin and should create an atmosphere that can effectively respond to the origin verification. Korea shall endeavor to elicit a geopolitical value (FTA Hub), as well as securing a competitive advantage in the global industry leverage, trading at a reasonable price competitive products thereby enhancing production and economic growth through the FTA.

  • PDF

Access Control of Visiting Mobile Node on the Foreign Domain Network in Mobile IPv6

  • Park, Sugil;Masayuki Abe;Kim, Kwangjo
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.495-498
    • /
    • 2002
  • The need for network protection, accounting and resource management in foreign administrative domain requires appropriate security services. In this paper, we propose an access control protocol to support the authentication between mobile node and visiting subnet. Our hybrid way of approach aims to reduce computational overhead and minimize the use of network bandwidth. We also propose non-certificate based public-key cryptography to provide non-repudiation, which does not require CRL retrieval and certificate validation.

  • PDF

Integrated Management Systems - Theoretical and Practical Implications

  • Eriksson, Henrik;Hansson, Jonas
    • International Journal of Quality Innovation
    • /
    • v.7 no.2
    • /
    • pp.69-82
    • /
    • 2006
  • Organisations worldwide strive to develop their management systems for business functions, ranging from quality and environment to safety, information security and social responsibility. During the latest decade a considerable amount of these efforts has been concentrated on introducing and applying standards such as the ISO 9001 and ISO 14001. The need for Integrated Management Systems (IMS) often arises as a result of decisions to implement Environmental Management System (EMS) and/or an occupational health and safety management system in addition to a Quality Management System (QMS). At the end of 2003, approximately 3200 organisations in Sweden had an ISO 9001 certificate, and approximately 3400 organisations had a certificate based on an EMS. Dealing with separate management systems and ensuring that they align with the organisation's strategies and goals, has proved difficult. Owing to the large number of organisations certified according to multiple types of systems, an increasing number of organisations are establishing IMS. There are examples of companies, which chose to integrate EMS and QMS into a co-ordinated implementation approach, and although sparse, the research within this area indicates potential benefits of using an integrated approach. This paper presents both a theoretical and an empirical investigation with the aim to elucidate problems related to the integration of management systems. Furthermore, the paper will present recommendations for succeeding in such integrations and, hence, contributing to an increased understanding on how IMSs should be designed and implemented.

A Certificate Verification Method based on the Attribute Certificates (AC기반의 인증서 검증 모델)

  • Park ChongHwa;Kim JiHong;Lee ChulSoo;Kim Dongkyoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.15-24
    • /
    • 2004
  • Electronic commerce is widely used with the development of information communication technologies in internet using public key certificates. And the study for access control in Web application and DB system is also progressed actively. There are many verification method for PKC(Public Key Certificates), which are CRL, OCSP, SCVP and others. But their certificates verification methods for PKC cannot to be applied to PMI(Privilege Management Infrastructure) which is using AC(Attribute certificates) because of synchronization of PKC and AC. It is because AC has no public key, AC Verifier must get the PKC and verify the validity on PKC and AC. So in this paper we proposed the new AC-based certificate verification model. which provide the synchronization in two certificates(AC and PKC).

A study on establishing a ISO 9001:2000 Quality Management System using information technology (정보기술을 이용한 ISO 9001:2000 품질경영시스템 구축)

  • Kim, Sang-Kuk;Shin, Sung-Ho;Lee, Young-Sei;Chung, Taek-Young
    • Journal of Korean Society for Quality Management
    • /
    • v.33 no.2
    • /
    • pp.13-21
    • /
    • 2005
  • Most organizations adopt a process-based approach to manage their operations and now business process management(BPM) is a well-established concept. Because ISO 9001:2000 has been influenced by BPR and it also emphasizes process based, BPM can get together with ISO 9001:2000. Korea Institute of Science and Technology Information has taken ISO 9001:2000 certificate in November 11, 2003 and now implements quality management systems based on BPMS. We call it KQMS(KISTI Quality Management System). KQMS based on BPMS is a new example in field of ISO quality management and is expected to support process management well.

Privilege Management Technique for Unreliable Network Environments based on Tree Structure (신뢰도가 낮은 네트워크 환경을 위한 트리 구조 기반의 권한 관리 기법)

  • Yang, Soo-Mi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.83-91
    • /
    • 2008
  • IISO/IEC 9594-8 defines the public key framework and attribute certificate framework. Attribute certificate framework deals with privilege management infrastructure(PMI). In PMI, for privilege management using attribute certificates, role assignment certificates and role specification certificates are used to assign and specify privileges independently. Role specification certificates includes privilege specifications and the details far privilege management of network environments. Privilege management of unreliable network environment tries to enhance the reliability and efficiency of privilege information transmission forwarding over unreliable routes in the presence of potentially faulty nodes and edges. Each node forms a role specification tree based on role specification relationship data collected from the network. In this paper privilege management cost with the role specification certificates tree structure is evaluated trying to reduce the overhead incurred by role creation and modification of privileges. The multicasting of packets are used for scalability. We establish management cost model taking into account the packet loss and node reliability which continuously join and leave for network. We present quantitative results which demonstrate the effectiveness of the proposed privilege management scheme.

An Example of ISO 9001 Quality Management System based on BPMS (ISO 9001 품질정보시스템 구축 사례 연구)

  • Shin, Sung-Ho;Kim, Sang-Kuk;Lee, Young-Sei;Chung, Taik-Yeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.659-662
    • /
    • 2005
  • Most organizations adopt a process-based approach to manage their operations and now business process management(BPM) is a well-established concept. Because ISO 9001:2000 has been influenced by BPR and it also emphasizes process based. BPM can get together with ISO 9001:2000. Korea Institute of Science and Technology Information has taken ISO 9001:2000 certificate in November 11, 2003 and now implements quality management systems based on BPMS. We call it KQMS(KISTI Quality Management System). KQMS based on BPMS is a new example in field of ISO quality management and is expected to support process management well.

  • PDF

An Authentication Model based Fingerprint Recognition for Electronic Medical Records System (지문인식 기반의 전자의무기록 시스템 인증 모델)

  • Lee, Yong-Joon
    • The KIPS Transactions:PartC
    • /
    • v.18C no.6
    • /
    • pp.379-388
    • /
    • 2011
  • Ensuring the security of medical records is becoming an increasingly important problem as modern technology is integrated into existing medical services. As a consequence of the adoption of EMR(Electronic Medical Records) in the health care sector, it is becoming more and more common for a health professional to edit and view a patient's record. In order to protect the patient's privacy, a secure authentication model to access the electronic medical records system must be used. A traditional identity based digital certificate for the authenticity of EMR has private key management and key escrow of a user's private key. In order to protect the EMR, The traditional authentication system is based on the digital certificate. The identity based digital certificate has many disadvantages, for example, the private key can be forgotten or stolen, and can be easily escrow of the private key. Nowadays, authentication model using fingerprint recognition technology for EMR has become more prevalent because of the advantages over digital certificate -based authentication model. Because identity-based fingerprint recognition can eliminate disadvantages of identity-based digital certificate, the proposed authentication model provide high security for access control in EMR.

Development of Safety and Environment Index for Vehicle Inspection Data Using Statistical Methods (통계적 분석 기법을 활용한 자동차 검사 안전지수 및 환경지수 개발)

  • Hong, Ji-sun;Oh, Se-do;Kim, Young-jin;Youn, Young-han;Baek, An-Sun
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.41 no.4
    • /
    • pp.352-358
    • /
    • 2015
  • It is important to guarantee the safety of vehicle to minimize the damage to the driver in case of the accidents. In order to inspect and later enhance the safety of vehicle, the owner of the vehicle usually have a vehicle safety inspection. The Korea Transportation Safety Authority (KOTSA) issues the Comprehensive Performance Inspection Certificate after vehicle inspection. The certificate only specify the legal inspection criteria for safety and measured values of the safety parameters, however, as ordinary driver in lack of expert knowledge about the vehicle is difficult to understand the contents of the Certificate. Thus, in this paper, the authors try to give the information about the inspection results in easier way to understand. This information not only guarantees the owner of the vehicle to better understand the inspection results, but it also gives the opportunity to the driver to deal with the specific problem listed in the results. The methods in this paper are to transform the vehicle inspection data into the non parametric distribution to easily represent the values to the index later on. Also, example indexes are presented to the actually inspected vehicle based on the reference distribution to show the better assessment of the developed method.