• Title/Summary/Keyword: Certification Services

Search Result 291, Processing Time 0.023 seconds

Improvement of ISMS Certification Components for Virtual Asset Services: Focusing on CCSS Certification Comparison (안전한 가상자산 서비스를 위한 ISMS 인증항목 개선에 관한 연구: CCSS 인증제도 비교를 중심으로)

  • Kim, Eun Ji;Koo, Ja Hwan;Kim, Ung Mo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.8
    • /
    • pp.249-258
    • /
    • 2022
  • Since the advent of Bitcoin, various virtual assets have been actively traded through virtual asset services of virtual asset exchanges. Recently, security accidents have frequently occurred in virtual asset exchanges, so the government is obligated to obtain information security management system (ISMS) certification to strengthen information protection of virtual asset exchanges, and 56 additional specialized items have been established. In this paper, we compared the domain importance of ISMS and CryptoCurrency Security Standard (CCSS) which is a set of requirements for all information systems that make use of cryptocurrencies, and analyzed the results after mapping them to gain insight into the characteristics of each certification system. Improvements for 4 items of High Level were derived by classifying the priorities for improvement items into 3 stages: High, Medium, and Low. These results can provide priority for virtual asset and information system security, support method and systematic decision-making on improvement of certified items, and contribute to vitalization of virtual asset transactions by enhancing the reliability and safety of virtual asset services.

A Study on Restricted Category Type Certification Procedure of Surion Derivatives Rotorcraft (수리온파생형 회전익항공기 민간 제한형식증명 획득 절차에 관한 연구)

  • Kim, Yonghee;Park, Sanghyuk;Lee, Seunghyun;Kim, Sungjin;Kang, Youngho
    • Journal of Aerospace System Engineering
    • /
    • v.14 no.1
    • /
    • pp.54-61
    • /
    • 2020
  • For operating military aircraft, military certificate of airworthiness (MCA) must be obtained from military authority. Among procedures of general airworthiness certification, there is a military type certification process that aircraft design complies with military airworthiness certification criteria. The Surion is the first military rotorcraft which has obtained military type certificate, production validation and airworthiness certificate in Korea, and the Surion derivatives for special mission are being operated for government services. Based on Aviation Safety Act, in order to operate the Surion derivatives (military aircraft) for special purpose (such as emergency patient transportation and firefighting), the issuance of special airworthiness certificates was needed from civil airworthiness authority, and the restricted category type certification (RTC) is one of design approvals for special airworthiness certification to be streamlined. This study discussed the procedures for acquiring RTC for special purpose operation of the Surion derivatives classified as military derived aircraft, and suggested procedural ideas to improve Korean RTC system.

Improved u-Healthcare Service Authentication Protocol based on RFID Technology (개선된 RFID 기술을 이용한 u-헬스케어 서비스 인증 프로토콜)

  • Ahn, Hae-Soon;Yoon, Eun-Jun;Bu, Ki-Dong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.10
    • /
    • pp.107-115
    • /
    • 2013
  • Recently, the RFID technology is combined with a u-healthcare services is an emerging trend in the field of medical services. u-healthcare service, as covering the field of personal health information beyond the level of simple health screening and treatment of life are closely related. Considering security, invasion of privacy, as well as life may be threatened even if your personal health information to be exposed or exploited illegally u-Healthcare services certification is essential. In 2012, Jeong proposed J-L patient authentication protocol that Initialization process, and patients using RFID technology separates the certification process. Jeong, such as the claim that the proposed protocol for reuse attacks, spoofing attacks, prevent information disclosure and traceability fire safety, but raises issues of security and operations efficiency. Therefore, in this paper, Jeong, such as the security of the proposed protocol and to prove the computational efficiency issues, and to enhance the safety and efficiency of RFID technology based on practical u-Healthcare services authentication protocol is proposed.

A Comparison Study of the Green Building Certification Systems for Multifamily Housing between South Korea and Hong Kong (한국과 홍콩의 공동주택 친환경 인증제도의 비교분석 연구)

  • Kim, Sung-Hwa;Lee, Jae-Hoon;Kim, Min-Young
    • Journal of the Korean housing association
    • /
    • v.26 no.1
    • /
    • pp.1-10
    • /
    • 2015
  • In line with the recent public concern on the environmental issues in building industry, there has been a rise in demand for a healthy, sustainable housing environment in South Korea. In order to achieve a healthy environment in residential buildings, considerable efforts have been made in a wide range of sectors. Among others, the development of the certification schemes to promote environment-friendly planning and building construction is remarkable. In urban South Korea, recently built houses tend to be significantly high-rise, high-density buildings. Global warming has brought about drastic climate change and continued to increase the average annual temperature year by year. These changes should be well reflected on the government's implementation of the building environmental assessment system. For guidance, therefore, this study looks to the case of Hong Kong which is well known for high-density housing development and subtropical climate conditions. It compares the features of the green building certification schemes for newly developed multifamily housing in two regions, namely HK-BEAM in Hong Kong and G-SEED in South Korea. Based on the findings, it argues that the G-SEED implementor should have expanded roles in providing training programs and follow-up services in collaboration with the certification authorities. It is also argued that G-SEED professionals should be involved in the early stages of design processes, and training programs and licence systems to produce green building professionals should be developed. Finally, it points out that the assessment indicators should be more detailed and diversified.

An Empirical Study on the Effects of Business Performance by Information Security Management System(ISMS) (정보보호 관리체계(ISMS)가 기업성과에 미치는 영향에 관한 실증적 연구)

  • Jang, Sang Soo;Kim, Sang Choon
    • Convergence Security Journal
    • /
    • v.15 no.3_1
    • /
    • pp.107-114
    • /
    • 2015
  • Since 2002, information security management system has been implemented (ISMS) certification scheme whilst providing telecommunications services to enhance the level of enterprise information security was ongoing and Prevent accidents and avoid spread of infringement, such as rapid response and there is a lot of it came true. However, this system is the protection of the country or the investment company, as part of the actual information on how management affects the performance came from or how measures are still lacking for. In this study, the companies have their own privacy ISMS certification measures the level of activity continued to improve information security performance measures and methodology are presented. The government is also based on the validity of the certification system to ensure the overall implementation of the ISMS itself is this a step increase effective information security system is to be certified in advance to prevent security incidents and to improve business performance to help.

An Effective Authentication in Mobile Ad Hoc Networks (Mobile Ad Hoc Networks에서 효과적인 인증서비스)

  • Kim Yoon-Ho
    • The Journal of Society for e-Business Studies
    • /
    • v.10 no.1
    • /
    • pp.121-134
    • /
    • 2005
  • The MANET has many problems in security despite of its many advantages such as supporting the mobility of nodes, independence of the fixed infrastructure, and quick network establishment. In particular, in establishing security, the traditional certification service has many difficult problems in applying to the MANET because of its safety, expandability, and availability. In this paper, a secure and effective distributed certification service method was proposed using the Secret Sharing scheme and the Threshold Digital Signature scheme in providing certification services in the MANET. In the proposed distributed certification service, certain nodes of relatively high safety among the mobile nodes consisting of the MANET, were set as privileged nodes, from which the process of issuing a certification started. The proposed scheme solved problem that the whole network security would be damaged by the intrusion to one node in the Centralized Architecture and the Hierarchical Architecture. And it decreased the risk of the exposure of the personal keys also in the Fully Distributed Architecture as the number of the nodes containing the partial confidential information of personal keys decreased. By the network simulation, the features and availability of the proposed scheme was evaluated and the relation between the system parameters was analyzed.

  • PDF

Implementation of Personal Certification Using i-PIN Service (i-PIN 서비스를 활용한 인증 서비스 구현)

  • Kim, Hyun-Joo;Shin, In-Chul;Lee, Soo-Jung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.7
    • /
    • pp.117-128
    • /
    • 2012
  • Recently IT infrastructure plays a central role in the base of the society. However, use of personal registration number on internet sites has become a major factor increasing danger of leaking of personal information. Currently, the government is recommending various information protection services in order to prevent the collection of personal registration numbers and leaking of personal information on the internet. Among them, i-PIN service is the one recommended for minimal use of personal registration numbers on the internet. Although i-PIN can be used as a way to substitute personal registration numbers on the internet, there are certain limitations in using i-PIN as the only key to recognize individuals. This study proposes organization of web system in which self certification can be conducted using i-PIN as a tool for personal certification. Also its usability and stability have been verified through performance test when i-PIN service is linked with web service and used as personal certificate. But i-PIN service is unavailable if obstacles occur in providers of i-PIN self certification. To settle this inconvenience, the study also proposes how to cope with such obstacles.

Study on Introduction of Partial Delegation System for Aircraft Certification (항공기인증의 일부 위임제도 도입방안에 대한 연구)

  • Sanghyuk Park;Gyeongchul Kang;Minkyu Kang;Sunmi Jin;Yunseo Lee;Yonghee Kim;Seunghyeon Lee;Sungjin Kim
    • Journal of Aerospace System Engineering
    • /
    • v.17 no.1
    • /
    • pp.1-9
    • /
    • 2023
  • Recently, aerospace industries in South Korea are expected to continue to grow due to UAM. Accordingly, certification services for aircraft are expected to increase. As a way to cope with the increase of certification work, one could consider a delegation system that can limitedly delegate the unique role of airworthiness authorities. In this paper, we reviewed regulations of FAA's individual delegation (DER, DAR, DMIR, etc.), the organizational delegation system (ODA), and the EASA's organizational delegation system (DOA, POA). We also reviewed regulations and actual status of delegation system in South Korea. On the basis of these, considering circumstances of aerospace industries in South Korea, we presented a method to introduce certification delegation system gradually and to improve domestic certification regulation.

Gradual Certification Correspond with Sensual Confidence by Network Paths (본인인증의 네트워크 경로와 감성신뢰도에 연동한 점진적 인증방법)

  • Suh, Hyo-Joong
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.12
    • /
    • pp.955-963
    • /
    • 2017
  • Nowadays, fintech becomes the key technology of the mobile banking and payments. Financial market is moved to fintech-based non-face-to-face trade/payment from traditional face-to-face process in Korea. Core of this transition is the smartphones, which have several sensitive sensors for personal identifications such as fingerprint and iris recognition sensors. But it has some originated security risks by data path attacks, for instance, hacking and pharming. Multi-level certification and security systems are applied to avoid these threats effectively, while these protections can be cause of some inconvenience for non-face-to-face certifications and financing processes. In this paper, I confirmed that it have sensible differences correspond with the data connection paths such as WiFi networks and mobile communication networks of the smartphones, and I propose a gradual certification method which alleviates the inconvenience by risk-level definitions of the data-paths.

Employment Effectiveness of Innovation-certified SMEs and General SMEs: A Comparative Analysis (혁신인증 중소기업과 일반 중소기업의 고용효과 비교·분석)

  • Lee, Jun-won
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.17 no.3
    • /
    • pp.257-267
    • /
    • 2022
  • The employment effect of innovation-certified SMEs (venture certification, inno-biz certification and main-biz certification) and general SMEs was compared and analyzed. Through propensity score matching, general SMEs with similar tendencies to SMEs for each innovation certification were selected. The employment effect was approached from two perspectives: the absolute employment effect, the employment growth rate, and the relative employment effect, the sales-employment coefficient. As a result of the analysis, it was confirmed that venture certified SMEs and inno-biz certified SMEs, which are technology innovation-type certifications, have an advantage in absolute employment effect. In addition, it was concluded that innovation-certified SMEs have more room for employment than general SMEs by achieving sales growth that exceeds employment growth. Therefore, there is a possibility to enhance the employment effect of innovation-certified SMEs by strengthening employment-related incentives for innovation-certified SMEs.