• Title/Summary/Keyword: Credentials

Search Result 61, Processing Time 0.029 seconds

A Study on the Application of Micro-Credentials for Vocational Competency Development Training Teachers and Instructors (직업능력개발훈련 교·강사의 자격연계형 마이크로 크리덴셜 적용 방안)

  • Miseok Yang;Ohyoung Kwon;Woocheol Kim
    • Journal of Practical Engineering Education
    • /
    • v.15 no.1
    • /
    • pp.169-181
    • /
    • 2023
  • This study was conducted to examine the remuneration curriculum of vocational ability development training teachers and instructors and to examine ways to apply micro credentials. To this end, the current status of the remuneration curriculum of vocational ability development training instructors and instructors at K University's Competency Education Development Institute, the characteristics of micro credentials, and the possibility of linking the remuneration curriculum to micro credentials are as follows. First, most of the recognition of digital certificates was positive for digital certificates such as digital credit, digital badge issuance, and recognition of the recognized qualification process of maintenance education when completing the training course. In addition, as a method of applying micro credentials to conservative education, various cases were proposed to benefit from conservative education, systematization and grading of the qualification process, and credit of the qualification process. Second, as an institutional supplement to enhance the utilization of conservative education using micro credentials, the need to expand NCS-based major conservative education, provide efficient learning contents and learning methods, and set minimum completion time. In addition, the most common response as a way to improve the understanding of teachers and instructors in vocational ability development training was the micro credential promotion plan. Third, in the role of conservative education institutions and vocational ability development training instructors and instructors, conservative education institutions mention maintaining educational quality the most, and active participation was the role of vocational ability development training instructors. Through this study, it is expected to establish a vocational training environment that can enhance expertise and provide a practical portfolio of practical competency history by linking the remuneration curriculum of vocational competency development training instructors and micro credentials.

A Study for Task Detection Acquiring Abnormal Permission in Linux (리눅스의 비정상 권한 획득 태스크의 탐지방법 연구)

  • Kim, Won-Il;Yoo, Sang-Hyun;Kwak, Ju-Hyun;Lee, Chang-Hoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.11
    • /
    • pp.427-432
    • /
    • 2014
  • The Purpose of local system attacks is to acquire administrator's(root) privilege shell through the execution of the malicious program or change the flow of the program. This acquiring shell through attack is still valid approach method and it is difficult to cope with improving each of vulnerability because the attacker can select various forms of attack. Linux allocate a set of credentials when login, in order to manage user permissions. Credentials were issued and managed by the kernel directly, and also the kernel ensures that any change cannot be occurred outside of kernel. But, user's credentials that acquired root privilege through system attacks occurs a phenomenon that does not remain consistent. In this paper we propose a security module to detect a security threats that may cause to users and tasks by analysis user task execution and inconsistency credentials.

Motivation for Seeking Child Care Teacher Credentials through On-line Education and Factors Influencing Their Career Decision-making (온라인 교육기관을 통한 보육교사 자격취득 동기와 진로의사결정수준)

  • Lee, Minjin;Lee, Wanjeong
    • Korean Journal of Childcare and Education
    • /
    • v.10 no.1
    • /
    • pp.81-94
    • /
    • 2014
  • This study is intended to identify the motivations for seeking child care credentials through online education and factors influencing the career decision-making. The study was conducted among students taking child care courses online, and data was analyzed through t-test, F-test, Scheffe posteriori test, and hierarchical regression analysis. The findings are as follows. 1) Motivation for seeking the credentials varied depending on background variable. Livelihood was a stronger motivation for low-income group than higher come group. Self-realization desire was a stronger motivation for the group with low education level than the group with higher education level. 2) Age affected the participants' career decision-making. The younger they were, the more dependent they were on other people's advice. 3) Different variables influenced the students' rational, intuitional, and dependent career-decision making. Factors influencing their rational career decision-making were age, motivation to acquire the credentials for making a living, and motivation for building a better future. For intuitional career decision-making, age affected the decision. For dependent career decision-making, motivation to seek credentials for making a living was an influencing variable.

A Method of Detecting Real-Time Elevation of Privilege Security Module Using User Credentials (자격증명을 이용한 실시간 권한 상승 탐지 보안 모듈)

  • Sim, Chul Jun;Kim, Won Il;Kim, Hyun Jung;Lee, Chang Hoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.5
    • /
    • pp.247-254
    • /
    • 2017
  • In a Linux system, a user with malicious intent can acquire administrator privileges through attack types that execute shells, and can leak important user information and install backdoor program. In order to solve this problem, the existing method is to analyze the causes of the elevation of privilege, fix the problems, and then patch the system. Recently, a method of detecting an illegal elevated tasks in which information inconsistency occurs through user credentials in real time has been studied. However, since this credential method uses uid and gid, illegal elevated tasks having the root credentials may not be detected. In this paper, we propose a security module that stores shell commands and paths executed with regular privileges in a table and compares them with every file accesses (open, close, read, write) that are executed to solve the case which cannot detect illegal elevated tasks have same credential.

Privacy-preserving credential smart contracts using Zokrates

  • Geunyoung Kim;Yunsik Ham;Jaecheol Ryou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.8
    • /
    • pp.2417-2430
    • /
    • 2024
  • The need for secure user authentication in blockchain-based applications has been growing with the increased adoption of Decentralized Identity (DID) credentials in blockchain. Zokrates, a tool designed to protect user privacy within smart contracts, had a limitation in that it could not accept authenticated user information such as credentials, only allowing the use of manually inputted data. In this paper, we propose a smart contract system that securely validates DID credentials to overcome the limitations of traditional centralized authentication systems. This system ensures the safe identification of users within blockchain-based applications by authenticating their identities in a trusted manner within the blockchain. As the demand for user authentication in blockchain rises, this paper emphasizes the significance of a blockchain-based identity verification system that guarantees both privacy and security. Leveraging the Zero-Knowledge Proof method and utilizing the Zokrates tool, this innovative approach aims to provide solutions for the digital identity verification process, thereby expanding the scope of blockchain technology applications. Moreover, we also provide a CLI for each entity. We help anyone who wants to authenticate their identity using the tool to safely verify it on-chain.

A solution of ID-overlapping in using Myproxy Server in GRID Portal (그리드 포탈에서 Myproxy 이용시 동일 ID 중복문제 해결방안)

  • 이관옥;안동언;정성종;장행진
    • Proceedings of the IEEK Conference
    • /
    • 2003.11b
    • /
    • pp.219-222
    • /
    • 2003
  • Increasingly, Grid technics are developed and demonstrated widely. These days, a point to be considered is that clients use Grid resources more easily. Grid Portals, based on standard Web technologies, are increasingly used to provide user interfaces for using Grid resources. But, due to lack of delegation capabilities in using Grid resources through Grid Portals, it is requested of the security mechanisms. That solution is to using Myproxy Server. Myproxy Server allows Grid user to use Grid resources being interact with Grid Portals. But, while users log in Grid Portals, we are faced with over the overlap of users credentials. This paper describes relationship between Portals and Myproxy, and proposes the way to solve the problem of the overlap of users credentials.

  • PDF

A Proactive Authentication Using Credentials based on Chameleon Hashing in MIH Environments (MIH 환경에서 카멜레온 해쉬 기반의 인증값을 이용한 선행 인증 기법)

  • Chae, Kang-Suk;Choi, Jae-Duck;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.5B
    • /
    • pp.840-848
    • /
    • 2010
  • This paper proposes a proactive authentication scheme using credentials based on chameleon hashing in MIH environments. There is a proactive authentication structure defined by IEEE 802.21 Security Study Group for the link access in MIH environment. Both schemes based on EAP and on PKI can be applied to such structure, but the former has caused network traffic due to the complicated authentication procedure and the latter has complex structure for managing certificates. The proposed scheme performs the proactive authentication procedure only between a mobile node and a MIH Key Holder by using credentials based on chameleon hashing. Our scheme reduces the network traffic since authentication with the server is unnecessary in MIH environment and PKI structure is not required as well. In addition, the proposed scheme provides secure PFS and PBS features owing to the authenticated Diffie-Hellman key exchange of the chameleon-based credential.

Proposal for a Peer Decentralized Identity System Using Short-Range Wireless Communications (단거리 무선 통신을 이용한 개인 간 분산 신원증명 시스템 제안)

  • Yeo, Kiho;Park, Keundug;Youm, Heung Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.959-972
    • /
    • 2021
  • Decentralized Identity is based on the concept of self-sovereign identity, in which holders manage and provide their own credentials. However, a procedure is required to obtain credentials from issuers, and there is a risk of mess personal information leaking due to negligence of the issuers. In this paper, we propose a peer decentralized identity system based on Peer DID technology that allows only participants to verify their identity in 1:1 or 1:N small groups by matching the holder with the issuer. It is directly connected to a mobile device using short-range wireless communications such as bluetooth, and the holders create and provide their own credentials in person to the other party, thus fully realizing the self-sovereignty identity. The proposed system can simplify the identification process, improve security and privacy, and reduce costs. Furthermore, an extended architecture is possible to connect the proposed system and the distributed ledger to identify users in other domains. In the future, based on various technologies, it is also necessary to expand research on identity systems that can be utilized for human-to-thing and things-to-things authentication.

FinDID : A DID service supporting the standard service scheme for the financial sector

  • Lee, Young-Eun;Kim, Hye-Won;Lee, Myung-Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.5
    • /
    • pp.127-138
    • /
    • 2022
  • In this paper, we present FinDID (Financial Decentralized IDentity), a blockchain-based DID(Decentralized IDentity) service that can flexibly control personal information or credentials through a systematic verification method while complying with the standard service scheme of decentralized identity for the financial sector. DID is an identity management system used in a decentralized environment without a specific certification authority, and as a technology that allows users to control their own information, it can realize self-sovereignty over users' own personal information. Through FinDID, users receive credentials that authenticate their various personal information from the issuer, select only the claims required by the target financial service using their personal electronic wallet, create presentations from credentials. Then they submit it to the financial service, leading to their qualification from the service. FinDID consists of electronic wallet, credential issuer, credential storage, DID service including DID management contract and credential management contract, and financial services using this service scheme. The DID service manages each user's DID and supports all verification processes of the associated identity management scheme.

How to Evade Information Protection in O365's Rights Management: Device's Data Protection Perspective (기기 내 데이터 보호 관점에서 O365 권한 관리 서비스 우회 기술)

  • Min-Kyeong Kang;Hyoung-Kee Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.5
    • /
    • pp.1007-1019
    • /
    • 2024
  • Microsoft RMS(Rights Management Services) restricts access to organizational files by specifying which users can access them and managing detailed permissions on a per-user basis. To prevent unauthorized access and data leakage, RMS must ensure a high level of security. This paper evaluates the security of RMS from the perspective of data protection within devices. The credentials required to support access control in RMS are stored locally on the user's device. These credentials must be protected under all circumstances, including when the device is acquired by an unauthorized entity. In this paper, we analyze the protection mechanisms for credentials within the user's device. Based on our analysis, we propose two attacks that can bypass these protections, compromising protected documents on locked devices. The vulnerabilities that lead to data leakage through these attacks are verified across nine different Windows RMS operating environments.