• Title/Summary/Keyword: Credentials

Search Result 61, Processing Time 0.026 seconds

Study on Early Childhood Teachers' Professional Development Systems: Focused on America, England, and Australia (영유아교사 전문성 관련체제 고찰: 미국, 영국, 호주를 중심으로)

  • Kim, Myoung Soon;Shin, Yoon Seung;Lee, Se Won;Seo, Jai Wha
    • Korean Journal of Childcare and Education
    • /
    • v.12 no.4
    • /
    • pp.151-181
    • /
    • 2016
  • This study examined professional development systems in America, England, and Australia, and devised ways to enhance early childhood teachers' professional development in Korea. To suggest effective ways to improve current professional development system and its operation, this research aimed to investigate first, advanced professional development systems and policies in three countries, America, England, and Australia, second, the process of teacher qualification and requirements for acquiring teacher credential and its maintenance, and lastly, the effort of quality control for professional development, its operation, and evaluation systems in three countries. Based on the analysis of the three country's systems, five solutions for effective professional development are suggested. First, it is necessary to differentiate requirements for teachers by the level of teacher credentials. Second, an incessant training process for professional development is required. Third, an individualized professional development plan should be set for an individual teacher for the best outcomes in professional competence. Fourth, instructors for professional development trainings are needed to ensure the quality of training. Lastly, individuals, organizations, and policy and its operation systems need to be considered holistically as a whole in the perspective of convergence in policy making and its operation for effective professional development.

A Study of the Education and Licensure System of California Regarding East Asian Medicine and Acupuncture (캘리포니아 침구 및 동양의학 교육과 면허관리 체계 연구)

  • Hong, Jiseong;Han, Raeun;Han, Changhyun;Kang, Yeonseok
    • The Journal of Korean Medical History
    • /
    • v.30 no.1
    • /
    • pp.43-50
    • /
    • 2017
  • In the United States, California is well known for its rigorous education and licensing system regarding East Asian Medicine and acupuncture. As in most other states in America, the State government controls the practice of acupuncture, massage, acupressure therapy, food therapy, and natural therapy using a board established to set, maintain, and uphold licensing credentials for acupuncturists and practitioners of East Asian medicine. In California the system started in the 1970s when the State Legislature passed a bill to measure competency, and license acupuncturists. This study briefly describes the California Acupuncture Board (CAB), which is authorized to control the related education, examination, continuing education, and management of licenses already awarded. This study addresses the essential and minimum educational requirement established by the CAB for licensure, that is mandate classroom lecture with additional 950 hours clinic training, and the 50 hours of continuing education credits earned every two years, for maintaining the license.

Classification of Tor network traffic using CNN (CNN을 활용한 Tor 네트워크 트래픽 분류)

  • Lim, Hyeong Seok;Lee, Soo Jin
    • Convergence Security Journal
    • /
    • v.21 no.3
    • /
    • pp.31-38
    • /
    • 2021
  • Tor, known as Onion Router, guarantees strong anonymity. For this reason, Tor is actively used not only for criminal activities but also for hacking attempts such as rapid port scan and the ex-filtration of stolen credentials. Therefore, fast and accurate detection of Tor traffic is critical to prevent the crime attempts in advance and secure the organization's information system. This paper proposes a novel classification model that can detect Tor traffic and classify the traffic types based on CNN(Convolutional Neural Network). We use UNB Tor 2016 Dataset to evaluate the performance of our model. The experimental results show that the accuracy is 99.98% and 97.27% in binary classification and multiclass classification respectively.

A Study on FIDO UAF Federated Authentication Using JWT Token in Various Devices (다양한 장치에서 JWT 토큰을 이용한 FIDO UAF 연계 인증 연구)

  • Kim, HyeongGyeom;Kim, KiCheon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.4
    • /
    • pp.43-53
    • /
    • 2020
  • There are three standards for FIDO1 authentication technology: Universal Second Factor (U2F), Universal Authentication Framework (UAF), and Client to Authenticator Protocols (CTAP). FIDO2 refers to the WebAuthn standard established by W3C for the creation and use of a certificate in a web application that complements the existing CTAP. In Korea, the FIDO certified market is dominated by UAF, which deals with standards for smartphone (Android, iOS) apps owned by the majority of the people. As the market requires certification through FIDO on PCs, FIDO Alliance and W3C established standards that can be certified on the platform-independent Web and published 『Web Authentication: An API for Accessing Public Key Credentials Level 1』 on March 4, 2019. Most PC do not contain biometrics, so they are not being utilized contrary to expectations. In this paper, we intend to present a model that allows login in PC environment through biometric recognition of smartphone and FIDO UAF authentication. We propose a model in which a user requests login from a PC and performs FIDO authentication on a smartphone, and authentication is completed on the PC without any other user's additional gesture.

The Reliable Communication Method for Self-Sovereign Identity Ecosystems (자기주권 신원 생태계를 위한 신뢰할 수 있는 통신 방법)

  • Chio, Gyu Hyun;Kim, Geun-Hyung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.3
    • /
    • pp.91-98
    • /
    • 2022
  • With the recent increase in interest in metaverse in which virtual and physical spaces are digitally fused, many activities in physical spaces are expected to take place in web-based virtual spaces. Therefore, there is a need for research on a self-sovereign identity system that can secure privacy and mutual trust in a DID(decentralized identifier)-based virtual space environment. We, in this paper, developed and validated a reliable communication method consisting of DIDComm messages, a procedure for generating distributed identifiers, asymmetric keys, and DID documents based on Hyperledger Indy and DIDComm open sources. The developed communication method can be applied to verify each other by exchanging additional information and verifiable credentials for trust among communication participants.

Research on 5G Core Network Trust Model Based on NF Interaction Behavior

  • Zhu, Ying;Liu, Caixia;Zhang, Yiming;You, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3333-3354
    • /
    • 2022
  • The 5G Core Network (5GC) is an essential part of the mobile communication network, but its security protection strategy based on the boundary construction is difficult to ensure the security inside the network. For example, the Network Function (NF) mutual authentication mechanism that relies on the transport layer security mechanism and OAuth2.0's Client Credentials cannot identify the hijacked NF. To address this problem, this paper proposes a trust model for 5GC based on NF interaction behavior to identify malicious NFs and improve the inherent security of 5GC. First, based on the interaction behavior and context awareness of NF, the trust between NFs is quantified through the frequency ratio of interaction behavior and the success rate of interaction behavior. Second, introduce trust transmit to make NF comprehensively refer to the trust evaluation results of other NFs. Last, classify the possible malicious behavior of NF and define the corresponding punishment mechanism. The experimental results show that the trust value of NFs converges to stable values, and the proposed trust model can effectively evaluate the trustworthiness of NFs and quickly and accurately identify different types of malicious NFs.

Mitigation of Phishing URL Attack in IoT using H-ANN with H-FFGWO Algorithm

  • Gopal S. B;Poongodi C
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.7
    • /
    • pp.1916-1934
    • /
    • 2023
  • The phishing attack is a malicious emerging threat on the internet where the hackers try to access the user credentials such as login information or Internet banking details through pirated websites. Using that information, they get into the original website and try to modify or steal the information. The problem with traditional defense systems like firewalls is that they can only stop certain types of attacks because they rely on a fixed set of principles to do so. As a result, the model needs a client-side defense mechanism that can learn potential attack vectors to detect and prevent not only the known but also unknown types of assault. Feature selection plays a key role in machine learning by selecting only the required features by eliminating the irrelevant ones from the real-time dataset. The proposed model uses Hyperparameter Optimized Artificial Neural Networks (H-ANN) combined with a Hybrid Firefly and Grey Wolf Optimization algorithm (H-FFGWO) to detect and block phishing websites in Internet of Things(IoT) Applications. In this paper, the H-FFGWO is used for the feature selection from phishing datasets ISCX-URL, Open Phish, UCI machine-learning repository, Mendeley website dataset and Phish tank. The results showed that the proposed model had an accuracy of 98.07%, a recall of 98.04%, a precision of 98.43%, and an F1-Score of 98.24%.

"Blackness" Revisited: The Rhetoric of Slavery and Freedom in E.D.E.N. Southworth's The Hidden Hand

  • An, Jee Hyun
    • Journal of English Language & Literature
    • /
    • v.56 no.3
    • /
    • pp.409-427
    • /
    • 2010
  • In this paper, I revisit and problematize "blackness" in THH by building on Toni Morrison's call for the theorization of "blackness" in American literature. THH has received much critical attention in the decades that followed its revival, but this paper argues that the meaning of "Africanist presence" has not been adequately addressed in 19th-century women writers' works. This paper is an effort to fill in this gap, and examines the ways in which "blackness" informed and shaped this most popular text of 19th-century America. This paper argues that THH demonstrates contemporary America's fear of "blackness," and rather than celebrating Capitola's feminist credentials or criticizing the lack of sensitivity to racial issues in THH, shows that the significance of the text lies in the ways in which it prophesies an impending national crisis mediated through the disruptive force of Capitola and Black Donald. THH certainly reiterates the popular, contemporary racial paradigms and excludes blacks from the conceptualization of "manhood," and it may seem that the issue of race is subsumed under gender issues when the text continuously privileges gender over race. However, at the same time, Black Donald and Capitola's disruptive energies signify the fear of explosive "blackness," and the disruptive stirrings of "blackness" permeate the novel as the energy that might rupture the seemingly tranquil order of antebellum South. The novel encodes and reflects the fear of blackness in the minds of its readers, and the popularity of this novel foretells nothing less than the explosion of Civil War.

Design of A One-time Password Generator on A Mobile Phone Providing An Additional Authentication for A Particular Transaction (특정 트랜잭션용 추가 인증을 제공하는 휴대폰 상의 일회용 암호 생성기 설계)

  • Park, Jun-Cheol
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.6
    • /
    • pp.552-557
    • /
    • 2009
  • One-time passwords are used just once and discarded, which makes it more secure than the repeatedly used conventional passwords. This paper proposes a challenge-response based one-time password generator on a user's mobile phone always carried with the user. The generator can provide an additional authentication for a user to issue a money transfer request within his Internet banking session on a PC. A currently used device for Internet banking generates a password that changes every 30 seconds or so, which allows a man-in-the-middle to use it for stealing money within the 30 seconds. Unlike such a device, the proposed generator resists against the man-in-the-middle attack by a novel challenge-response scheme, provides better accessability and protection against stolen devices. As the currently used devices do, it prevents any unauthorized transfer even if the victim's all other credentials are revealed through his PC infected with spyware such as a keyboard logger.

USMLE Application and Overseas expansion of TKM doctors (한의사의 USMLE 지원과 해외 진출)

  • Cho, Hyun-Joo;Choi, Hyug-Yong;Choi, Hyeon;Ahn, Sang-Young
    • Korean Journal of Oriental Medicine
    • /
    • v.14 no.3
    • /
    • pp.149-154
    • /
    • 2008
  • With sophisticated clinical skills and the effectiveness of Traditional Korean Medicine(TKM), many TKM doctors look forward to over seas expansion. About 450 TKM doctors had NCCAOM certificate, but only 40 TKM doctors arc in US now. Because The status of NCCAOM certificate in USA is not adequate enough for TKM doctors to perform medical treatments. In case of US, State medical boards depend to a large extent on the Educational Commission for Foreign Medical Graduates(ECFMG) for certification of international medical graduates (IMGs) seeking licensure in the United States. In addition to receiving certification that includes verification of education credentials, IMGs must pass Steps I and II of the USMLE. In order to obtain a license to practice in the United States, IMGs must successfully complete a residency in a program approved by the American Council of Graduate Medical Education(ACGME) and the complete Step III, the final step in the USMLE. TKM doctors, in the prospective of overseas expansion, applied to ECFMG and their applications have been rejected. This circumstance happened because Korea is unique country in the world with two different medical licensing system, Oriental and Western, both being physician workforce. Rejection by ECFMG occurred because of their minimal understanding of Korea's situation, while the responsibility to inform, propagate and protect TKM doctors own rights depend exclusively to Korean government, TKM doctor oneself and its related organizations, all the members should endeavor on it.

  • PDF