• Title/Summary/Keyword: Credential Model

Search Result 11, Processing Time 0.026 seconds

A Study on the Credential System of Librarian in Korea (사서자격제도 개선안 연구)

  • Jeong, Dong-Youl
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.41 no.2
    • /
    • pp.5-29
    • /
    • 2007
  • The purpose of this study is to suggest alternative credential system of librarian in Korea. For this purpose, the study analyzes various aspects of credential system in order to find out characteristics, strengths, and weaknesses. The data used in this study are drawn from current situations and problems analysis, critical literature review case study of six countries, and questionnaire survey analysis. Four different kinds of model are suggested. Those are 'Internal Competency Model', 'Minimum Credits Model', ‘Licence Examination Model', 'Graduate School Model'. This study also suggests further research to develop more adequate credential system of librarian in Korea.

A Study on Secure and Improved Single Sign-On Authentication System against Replay Attack (재전송 공격에 안전하고 개선된 Single Sign-On 인증 시스템에 관한 연구)

  • Kim, Hyun-Jin;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.769-780
    • /
    • 2014
  • In general, internet users need to remember several IDs and passwords when they use diverse web sites. From an effective management perspective, SSO system was suggested to reduce user inconvenience. Kerberos authentication, which uses centralized system management, is a typical example of a broker-based SSO authentication model. However, further research is required, because the existing Kerberos authentication system has security vulnerability problems of password and replay attacks. In SSO authentication systems, a major security vulnerability is the replay attack. When user credentials are seized by attackers, an authorized session can be obtained through a replay attack. In this paper, an improved SSO authentication model based on the broker-based model and a secure lightweight SSO mechanism against credential replay attack is proposed.

A Systematic Review on the Certified Geriatric Pharmacist Program of the U.S.: Certification, Education and Outcomes (미국의 노인전문약사 제도에 대한 체계적 고찰: 인증, 교육 및 성과)

  • Nam, Hye Yeon;Cho, Eun
    • YAKHAK HOEJI
    • /
    • v.58 no.2
    • /
    • pp.129-140
    • /
    • 2014
  • Background: As elderly population has been increasing, pharmacists need to possess special knowledge and skills to provide enhanced pharmaceutical care for senior patients. Purpose: This study aims to systematically review on (1) the certified geriatric pharmacists (CGP) system, (2) the curriculum related to geriatric pharmacy education, and (3) the CGP's performance in terms of clinical, economic and humanistic outcomes in the U.S. Method: The information related to CGP system and curriculum was obtained through the official websites of 'American Society of Consultant Pharmacists', 'Commission for Certification in Geriatric Pharmacy' and the selected pharmacy school samples. Articles about on the outcomes of pharmacist-provided cognitive services including Medication Therapy Management were searched through PubMed. Results: To gain the CGP credential, pharmacists need 2-year experience as pharmacist in advance and take the CGP examination. This certification must be renewed every 5 year. Most pharmacy schools provide geriatric-related curriculum through didactic or pharmacy practice classes for pharmacy students and certificate or dual degree in gerontology are given on completion. Most previous outcomes research reported that pharmacists have played a role in yielding favorable results regarding clinical, economic and humanistic outcomes for nursing facilities, hospitals and community pharmacy settings. Conclusion: Considering the organized CGP certification system and concrete educational courses established the basis for pharmacists to exert their ability for senior patients of the U.S., it is suggested to build a geriatric pharmacist credential model for pharmacists to provide the increasing elderly patients with the requisite safe and effective pharmacy care in Korea.

A Study on the Design and Implementation of E-AV Models for University Academic Qualification Verification (대학 학력 검증을 위한 E-AV 모델 설계와 구현 방법에 관한 연구)

  • Jung-Oh Park
    • Journal of Industrial Convergence
    • /
    • v.21 no.5
    • /
    • pp.133-142
    • /
    • 2023
  • In recent years, the problem of academic credential falsification is not simply the manipulation of certificates generated by educational institutions, but also the difficulty of trusting automated relationship verification and verification itself, such as falsely recording completion as graduation while still in school. This is due to the lack of sharing of educational background databases among university institutions and the establishment/operation of independent systems that make it difficult to track educational backgrounds. This study designs and implements an E-AV model for academic credential verification centered on university institutions. It summarizes and stores the linked information on the existing academic background in an encrypted database and implements it with web standard technology considering the compatibility and scalability of the existing system. The results of sample data verification show that it improves safety against forgery and complies with storage space and execution performance. This study aims to contribute to the improvement of online verification services such as academic records management in domestic universities.

Design of User Data Management System for Grid Service (그리드 서비스를 위한 사용자 데이터 관리 시스템 설계)

  • Oh, Young-Ju;Kim, Beob-Kyun;An, Dong-Un;Chung, Seung-Jong
    • Proceedings of the KIEE Conference
    • /
    • 2005.05a
    • /
    • pp.224-226
    • /
    • 2005
  • Grid computing enables the fundamental computing shift from a localized resource computing model to a fully-distributed virtual organization with shared resources. In the grid computing environment, grid users usually get access rights by mapping their credential to local account. The mapped total account is temporally belongs to grid user. So, data on the secondary storage, which is produced by grid operation, can increase the load of system administration or can issue grid user's privacy. In this paper, we design a data management system for grid user to cover these problems. This system implements template account mechanism and manages local grid data.

  • PDF

Dental Utilization Associated Factors among Elderly (노인의 치과의료서비스 이용에 영향을 미치는 요인)

  • Ahn, Eunsuk;Hwang, Ji-Min;Shin, Myong-Suk
    • Journal of dental hygiene science
    • /
    • v.15 no.1
    • /
    • pp.60-66
    • /
    • 2015
  • The purpose of this study was to examine the relationship of predisposing, enabling, need factors and oral health care factors to the dental utilization in 4,521 senior citizens based on the 5th National Health and Nutrition Examination Survey data. As for the relationship of predisposing, enabling and need factors to the necessity of denture, higher academic credential and higher income level that were respectively one of predisposing and need factors led to a higher necessity of denture, and the relationship of these factors was statistically significant. As to influential factors for their dental utilization in Model 1, there were significant differences according to gender, marital status and whether to subscribe to private health insurance or not. In Model 2, the need factors of Model 1 were adjusted. As a result, the respondents who didn't receive any unsatisfactory dental treatment made 1.35-fold more dental utilization, and the respondents who complained about mastication difficulty made 1.34-fold more dental utilization. There were significant differences according to gender, age, marital status, academic credential, whether to subscribe to private health insurance, unsatisfactory dental treatment experience and mastication difficulty. Age, unsatisfactory dental treatment experience and whether to complain about mastication difficulty or not made statistically significant differences to the dental utilization in Model 3 that involved oral health status. The above-mentioned findings illustrated that the predisposing factors, the enabling factors and the need factors exerted an influence on the elderly dental utilization. As there are a variety of factors to affect elderly dental utilization, its required to make an effort to boost the accessibility of the elderly to dental service in order to improve their oral health of the elderly.

Design of an Authentication System Based on Personal Identity Verification Card (전자신분증 기반의 개인 신분확인을 위한 인증시스템 설계)

  • Park, Young-Ho;Kong, Byung-Un;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.8
    • /
    • pp.1029-1040
    • /
    • 2011
  • Electronic identity (e-ID) card based on smartcard is a representative identity credential for on-line and off-line personal identification. The e-ID card can store the personal identity information securely, so that the information can be accessed fast, automated identity verification and used to determine the cardholder's authorization to access protected resources. Due to such features of an e-ID card, the number of government organizations and corporate enterprises that consider using e-ID card for identity management is increasing. In this paper, we present an authentication framework for access control system using e-ID cards by discussing the threat environment and security requirement against e-ID card. Specifically, to accomplish our purpose, we consider the Personal Identity Verification system as our target model.

PRI: A Practical Reputation-based Incentive Scheme for Delay Tolerant Networks

  • Zhang, Xi;Wang, Xiaofei;Liu, Anna;Zhang, Quan;Tang, Chaojing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.4
    • /
    • pp.973-988
    • /
    • 2012
  • Delay tolerant networks (DTNs) characterized by the lack of guaranteed end-to-end paths exploit opportunistic data forwarding mechanism, which depends on the hypothesis that nodes are willing to store, carry, and forward the in-transit messages in an opportunistic way. However, this hypothesis might easily be violated by the presence of selfish nodes constrained with energy, bandwidth, and processing power. To address this problem, we propose a practical reputation-based incentive scheme, named PRI, to stimulate honest forwarding and discipline selfish behavior. A novel concept of successful forwarding credential and an observation protocol are presented to cope with the detection of nodes' behavior, and a reputation model is proposed to determine egoistic individuals. The simulation results demonstrate the effectiveness and practicality of our proposal.

A proposal of assurance model based on i-PIN assurance level (아이핀 보증 등급에 기반한 보증 모델)

  • Youm, Heung-Youl
    • Journal of Digital Convergence
    • /
    • v.14 no.9
    • /
    • pp.287-299
    • /
    • 2016
  • The electronic transactions over the Internet are growing across the world recently. There have been a lot of identity theft incidents during these online transactions nowaday. Therefore, a high level of identity proofing shall be carried out when using online services to deal with these matter. To prevent this kind of incident, i-PIN was introduced in Korea, which is used as an Internet Personal Identification Number. The i-PIN is designated to provide an online identification of the Internet users. As such, the unique identification numbers are provided to the internet service providers. This paper is to analyze the capabilities that the i-PIN provides, to propose the assurance security model for i-PIN. Furthermore, the security analysis results are presented. The result of this paper can be applicable to improve the applicabilities of the i-PIN.

A Study of the Index Development and Measurement for School Health Promoting Behaviors (학교건강증진 지표개발 및 측정에 관한 연구)

  • Kim, Young Im
    • Journal of the Korean Society of School Health
    • /
    • v.11 no.2
    • /
    • pp.189-201
    • /
    • 1998
  • The objectives of this study are first to develop the index of school health promoting behaviors, two, to measure those, third, to analysis the relative importance of factors that effect on school health promoting behaviors. School health promotion indexes were composed of 60 components of six areas which modify the element of health promoting schools are developed by world health organization. The survey data were collected by questionnaires from June to September in 1998. The number of subjects was 294 school nurses. The SAS-PC program was used for the statistical analysis. The major results were as follows: 1. The six areas of school health promoting behaviors are: school health politics (20 components), the school physical environment (17 component), the school social environment (7 component), community relationships (6 component), personal health skills (7 component) and health services (3 component). 2. The mean of total school health promotion indexes was highest at elementary school as 3.46. The order of area was health services, the school physical environment, school health politics, the school social environment, personal health skills, community relationships. 3. The regression model used in this analysis presented significant relationships between school health promoting behaviors and independent variables. The important variable affecting the area of school physical environment was education level of school nurses. The important variable affecting the area of the school social environment and personal health services were the location of school, credential education program. Age or career also were significant variables affect the community relationships and health services. In summary, The health promoting behavior of elementary school was higher than other school. It is mean that have to perform active promoting behavior at middle school and high school. Health service level was highest among areas of school health promoting behaviors. It is mean also that school nurse teachers is interested in activity for other areas to improve of school health. Furthermore, it is necessary to develop the specific program for school health promoting behavior.

  • PDF