• Title/Summary/Keyword: Credentials

Search Result 60, Processing Time 0.024 seconds

Comparison of Parenting Stress between Married Migrants and Korean Women (결혼이주여성과 한국여성의 양육 스트레스 비교)

  • Kim, Hae Kyeong;Lee, Eun Hee
    • Perspectives in Nursing Science
    • /
    • v.11 no.2
    • /
    • pp.101-108
    • /
    • 2014
  • Purpose: The purpose of this study was to compare parenting stress between married migrant women and Korean women. Methods: Subjects were 68 married migrant women and 70 Korean women raising children aged seven years or younger, living in three different cities in Gangwon Do. To measure parenting stress, we used Kim's (1997) questionnaire that had been modified from Richard & Abidin's (1990) Parenting Stress Index (PSI). Results: There were significant differences between the two groups in age, academic credentials, job, monthly income, and achievement of maternal role. No statistically significant differences were found for parenting stress scores (p<.355), but there was a significant difference in the child characteristics of parenting stress (p<.007) between the two groups. There were no differences in the demographic variables influencing parenting stress between the two groups. Conclusion: The development of multi-cultural parenting and family support programs should consider the nationality and marital satisfaction of the family.

Reduction of Energy and Food Security in DPRK due to Deforestation

  • SHIN, Eunsoo Justin;Ahn, Ji Whan
    • Journal of Energy Engineering
    • /
    • v.27 no.3
    • /
    • pp.63-67
    • /
    • 2018
  • The Democratic People's Republic of Korea, or the DPRK, is one of the poorest country in world facing chronic economic, energy and food security issues. Prolonged improper management of economic and natural resources has led to extreme poverty, malnutrition and critically vulnerability to nature's forces. Presistent deforestation and forest degradation in the DPRK has national and global consequences which has attracted attention from international community, whose offering financial and technical assistance for targeted interventions. Through REDD+ programs, the DPRK has the opportunity to establish its credentials as a responsible nation while improving the quality of life of its population. This study offers an enabling context under which suitable climate change action related to forestry can be identified and implemented in the DPRK.

An Inter-provider Roaming Authentication and Key Establishment Protocol Providing Anonymity in IEEE 802.16e Networks (IEEE 802.16e 네트워크에서 익명성을 제공하는 사업자간 로밍 인증 및 키 설정 프로토콜)

  • Park, Young-Man;Park, Sang-Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.11C
    • /
    • pp.1023-1029
    • /
    • 2006
  • In this Paper, we present a novel authentication and key exchange(AKE) protocol for inter-NSP(provider) roaming in IEEE 802.16e networks. The proposed protocol allows performing both user and device authentication jointly by using two different authentication credentials and Provides user anonymity and session key establishment. Also, this protocol requires only two round number message exchange between foreign network and home network.

Cookie-Based Identification of the Public Keys of TLS/SSL Certificates (쿠키 기반의 TLS/SSL 인증서 공개키의 확인)

  • Park, Jun-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.1
    • /
    • pp.101-103
    • /
    • 2016
  • We propose a HTTP cookie-based identification of the public keys of Web sites for the case of failure to validate certificates. The proposed scheme effectively protects users from the phishing attacks of inducing them to access bogus sites. It incurs little performance overhead on the browser and the server of Web sites. It requires to implement the input processing of user credentials and the encryption and verification of cookie values, though.

IETF공개키 기반구조 및 PKI-기반 응용 표준화 동향

  • 염흥열
    • Review of KIISC
    • /
    • v.14 no.2
    • /
    • pp.23-37
    • /
    • 2004
  • 지금까지 IETF에서 공개키 기반구조에 대한 표준화 작업은 PKIX 작업반$^{[5]}$에서 주로 수행되었지만, 최근 들어 4개의 새로운 작업반이 만들어졌다. 새로 생성된 작업반은 IPSEC을 위한 공개키 기반구조 표준을 개발하는 PK14IPSEC(PKI for IPSEC) 작업반$^{[36]}$, 장기간 서명 데이터의 존재와 디지털 서명된 데이터의 타당성과 존재성을 증명하기 위한 표준을 개발하고 있는 LTANS(Long-Term Archive and Notary Service) 작업반$^{[32]}$, 공개키/개인키와 인증서 등으로 구성되는 크리덴셜(Credential)을 획득하기 위한 등록 과정에 대한 모델을 표준화하기 위한 ENROLL(Credential and Provisioning) 작업반$^{[41]}$, 그리고 안전하게 크리덴셜을 한 장치에서 다른 장치로 안전하게 전달하기 위한 표준을 개발하는 SACRED(Securely available Credentials) 작업반$^{[28]}$ 등이다. 본 논문에서는 IETF 보안영역에서 수행되고 있는 공개키 기반구조에 바탕을 둔 여러 작업반에서 최근 수행중인 표준화 동향을 분석한다.

Digital Identity Trend for Digital Trust Society (디지털 신뢰 사회 실현을 위한 디지털 아이덴티티 동향)

  • Kwon, D.S.;Lee, H.;Park, J.D.
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.3
    • /
    • pp.114-124
    • /
    • 2019
  • The Internet was designed for machines, not humans, and hence, nobody owns a digital identity. Instead, a digital identity is rented from a website and an application. This lack of unique and secure digital identities has resulted in confusion in the online/cyber world. Digital identities pose one of the oldest and most difficult problems with regard to the Internet. There is still no way to use digital credentials to prove, own, and control an online identity, namely a self-sovereign identity, in the same manner we do in the offline world, particularly without a trusted third party. This article discusses the current open standards for digital identities, proposes solutions pertaining to digital identities in the future, and introduces the concept of a blockchain-based self-sovereign digital identity without the need of trusted third parties.

Security Threat Identification and Prevention among Secondary Users in Cognitive Radio Networks

  • Reshma, CR.;Arun, kumar B.R
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.168-174
    • /
    • 2021
  • The Cognitive radio (CR) is evolving technology for managing the spectrum bandwidth in wireless network. The security plays a vital role in wireless network where the secondary users are trying to access the primary user's bandwidth. During the allocation the any malicious user either he pretends to be primary user or secondary user to access the vital information's such as credentials, hacking the key, network jam, user overlapping etc. This research paper discusses on various types of attack and to prevent the attack in cognitive radio network. In this research, secondary users are identified by the primary user to access the primary network by the secondary users. The secondary users are given authorization to access the primary network. If any secondary user fails to provide the authorization, then that user will be treated as the malicious user. In this paper two approaches are suggested one by applying elliptic curve cryptography and the other method by using priority-based service access.

A Study on Zero-Knowledge Proof Technology in Blockchain-based SSI System (블록체인 기반 자기주권 신원 시스템의 영지식 증명 기술 연구)

  • Hwang, Jin-Ju;Kim, Geun-Hyung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.355-358
    • /
    • 2021
  • 개인의 신원정보 보호에 대한 중요성이 높아지면서 개인이 직접 자신의 신원정보를 관리하고 데이터의 주권을 신원정보 소유자에게 부여하는 자기주권 신원 시스템에 대한 관심이 높아지고 있다. 자기주권 신원 시스템 내에서 개인은 스스로 자신을 식별할 수 있는 분산 식별자(DID: decentralized identifier)를 생성하고 분산 식별자 별 개인의 자격을 증명해주는 자격증명(VC: verifiable credentials) 정보를 발급받아 개인이 보유하며 자격증명의 검증을 요구하는 검증자에게 선택적으로 자격증명 정보를 제시한다. 개인의 프라이버시를 보호하기 위해 개인의 자격증명을 제시할 때 신원정보의 실제 데이터는 감추고 자격증명의 유효성은 입증시키는 영지식 증명의 개념을 적용하고 있다. 본 논문에서는 영지식 증명 기술을 살펴보고 하이퍼레저 인디(Hyperledger Indy) 기반 자기주권 신원 시스템에서 영지식 증명 기술 도입 예를 보인다.

Perception on the Importance of Items on Psychosocial Assessment among Hospice and Palliative Care Social Workers (호스피스·완화의료 사회복지사의 심리사회적 사정항목에 대한 중요도 인식)

  • Kim, Won-Chul;Hwang, Myung Jin
    • Journal of Hospice and Palliative Care
    • /
    • v.17 no.4
    • /
    • pp.259-269
    • /
    • 2014
  • Purpose: This preliminary study is aimed at developing standardized tools for psycho-social assessment of patients in needs for hospice/palliative care. To accomplish the purpose, investigators examined effects of perceptions of social workers on the importance of psycho-social domains of assessment in hospice/palliative care settings. Moreover, investigators paid attention to variances of perceptions of social workers' along with types of institution and credentials of those family settings. Methods: A form of questionnaire was first explored from an initial interview assessment of 10 government-certified hospice care providers and a literature review, second constructed with eight domains and 80 items, and sent by e-mail to 55 institutions and hospitals providing hospice/palliative cares in Korea. Lastly, a total of 31 agencies returned with a completed responses and consent form (56% response rate). SPSS program (version 18.0) was used for data analysis. Results: Study found that social workers perceived patients' family background (m=4.53, 5-point scale) as the most important assessment domain, whereas economic conditions (4.06 point) the least important. Social workers' perception varied by credentials (i.e., license types, training, full-time position, types of care facility). Conclusion: Based upon study findings, investigators can conclude strong needs for developing a assessment tool that measures multiple domains (i.e., psychological, social and ecological aspects) of patients. A standardized assessment tool should be structured with 2 axis (center/core and expanded/peripheral) and tailored for institution type. Second, professional trainings must be provided by strengthening legal institutionalization and fostering qualified social workers with full responsibilities of hospice and palliative care patients.

IAM Architecture and Access Token Transmission Protocol in Inter-Cloud Environment (Inter-Cloud 환경에서의 IAM 구조 및 액세스 토큰 전송 프로토콜)

  • Kim, Jinouk;Park, Jungsoo;Yoon, Kwonjin;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.573-586
    • /
    • 2016
  • With the adoption of cloud computing, the number of companies that take advantage of cloud computing has increased. Additionally, various of existing service providers have moved their service onto the cloud and provided user with various cloud-based service. The management of user authentication and authorization in cloud-based service technology has become an important issue. This paper introduce a new technique for providing authentication and authorization with other inter-cloud IAM (Identity and Access Management). It is an essential and easy method for data sharing and communication between other cloud users. The proposed system uses the credentials of a user that has already joined an organization who would like to use other cloud services. When users of a cloud provider try to obtain access to the data of another cloud provider, part of credentials from IAM server will be forwarded to the cloud provider. Before the transaction, Access Agreement must be set for granting access to the resource of other Organization. a user can access the resource of other organization based on the control access configuration of the system. Using the above method, we could provide an effective and secure authentication system on the cloud.