• Title/Summary/Keyword: Delegation System

Search Result 78, Processing Time 0.018 seconds

Study on Introduction of Partial Delegation System for Aircraft Certification (항공기인증의 일부 위임제도 도입방안에 대한 연구)

  • Sanghyuk Park;Gyeongchul Kang;Minkyu Kang;Sunmi Jin;Yunseo Lee;Yonghee Kim;Seunghyeon Lee;Sungjin Kim
    • Journal of Aerospace System Engineering
    • /
    • v.17 no.1
    • /
    • pp.1-9
    • /
    • 2023
  • Recently, aerospace industries in South Korea are expected to continue to grow due to UAM. Accordingly, certification services for aircraft are expected to increase. As a way to cope with the increase of certification work, one could consider a delegation system that can limitedly delegate the unique role of airworthiness authorities. In this paper, we reviewed regulations of FAA's individual delegation (DER, DAR, DMIR, etc.), the organizational delegation system (ODA), and the EASA's organizational delegation system (DOA, POA). We also reviewed regulations and actual status of delegation system in South Korea. On the basis of these, considering circumstances of aerospace industries in South Korea, we presented a method to introduce certification delegation system gradually and to improve domestic certification regulation.

Fine-Grained and Traceable Key Delegation for Ciphertext-Policy Attribute-Based Encryption

  • Du, Jiajie;HelIl, Nurmamat
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3274-3297
    • /
    • 2021
  • Permission delegation is an important research issue in access control. It allows a user to delegate some of his permissions to others to reduce his workload, or enables others to complete some tasks on his behalf when he is unavailable to do so. As an ideal solution for controlling read access on outsourced data objects on the cloud, Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has attracted much attention. Some existing CP-ABE schemes handle the read permission delegation through the delegation of the user's private key to others. Still, these schemes lack the further consideration of granularity and traceability of the permission delegation. To this end, this article proposes a flexible and fine-grained CP-ABE key delegation approach that supports white-box traceability. In this approach, the key delegator first examines the relations between the data objects, read permission thereof that he intends to delegate, and the attributes associated with the access policies of these data objects. Then he chooses a minimal attribute set from his attributes according to the principle of least privilege. He constructs the delegation key with the minimal attribute set. Thus, we can achieve the shortest delegation key and minimize the time of key delegation under the premise of guaranteeing the delegator's access control requirement. The Key Generation Center (KGC) then embeds the delegatee's identity into the key to trace the route of the delegation key. Our approach prevents the delegatee from combining his existing key with the new delegation key to access unauthorized data objects. Theoretical analysis and test results show that our approach helps the KGC transfer some of its burdensome key generation tasks to regular users (delegators) to accommodate more users.

Reliable Cascaded Delegation Scheme for Mobile Agent Environments (이동 에이전트 환경을 위한 안전한 연속 위임 구현 기법)

  • Lee, Hyun-Suk;Eom, Young-Ik
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.31-38
    • /
    • 2004
  • In mobile agent environments, migration of an agent occurs continuously due to the mobility of agents. So cascaded delegation can occur among places for delegating the privilege to execute the agent. Because the existing delegation scheme considers only the delegation between two places that participate in migration of an agent, it does not support secure cascaded delegation. In this paper, we propose a cascaded delegation scheme that provides agents with secure cascaded delegation in mobile agent environments. Depending on the trust-relationship among places, the proposed scheme achieves the goal by nesting each delegation token or by nesting only initial token signed by creator of the agent within the signed part of the next immediate delegation token. And we prove that the proposed scheme is secure against the attack of replaying a message and the attack of substituting a delegation token.

A Specification for Restricted Delegation to suitable on Distributed Computing (분산 컴퓨팅에 적합한 제한적인 위임 명세)

  • Eun Seung-Hee;Kim Yong-Min;Noh Bong-Nam
    • The KIPS Transactions:PartC
    • /
    • v.12C no.7 s.103
    • /
    • pp.1015-1024
    • /
    • 2005
  • A delegation of privileges is one of important processes that empower authority to relevant node to process job that user wants in large-stale distributed environment such as Grid Computing. However, existing delegation methods do not give suitable privilege about Job, and do not atomize range of delegation and exists delegation of access privilege for only resources itself that is not delegation about executing process of job itself. Also, they do not apply about process that needs delegation before and after. execution of job such as reservation of system resources or host access before and after execution. Therefore, this paper proposes a method and specification for restricted delegation in distributed environment. Proposed method separates delegation for job side and privilege side, and express specification and procedure of delegation using XML schema and UML and present restricted delegation scenario in distributed computing environment.

Analysis of Self-Regulations Relating to Delegation of Social Welfare Facilities to Private Sector by Local Governments: Focused on Seoul Autonomous Region (기초자치단체의 사회복지시설 민간위탁 자치법규 내용에 관한 분석 : 서울특별시 자치구를 중심으로)

  • Oh, Se-Min;Park, Ji-hyun;Lee, Sang-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.12
    • /
    • pp.165-176
    • /
    • 2015
  • In this study, as recently there is active discussion in academia and relevant industries relating to delegation of social welfare facilities to the private sector, self-regulations relating to such delegation by Seoul was analyzed for systematic supply of social welfare service and find ways to improve self-regulations that will be enacted or amended by local governments. The data was collected from self-regulations of Seoul based on the self-regulation information system as of May 1, 2015, and analyzed according to the steps of delegation to the private sector proposed by Hyangsun Choi, in terms of presence of clauses and contents. Based on the analysis, the study prosed: first, clarity in description of application criteria and relevant facilities and dual system of the delegation agencies; second, improvement in criteria for selecting the delegation agencies and the head of committee; third, clauses related to supervision of an administrative agency; fourth, overall improvement of clauses related to evaluation nd review of delegation and institutional arrangement for more transparent evaluation.

Report of 2050 Energy Technology Perspectives 2015 and Activities on IEA/ECERC Delegation of Korea (2050 에너지기술전망 (2015판) 및 국제에너지기구 활동 보고)

  • Bae, Choongsik
    • 한국연소학회:학술대회논문집
    • /
    • 2015.12a
    • /
    • pp.279-282
    • /
    • 2015
  • Energy Technology Perspectives (ETP) has provided the current status of energy system, technology developments and external events that have changed ETP scenario since 2006. The three scenarios are presented in four different fields (power generation, transport, industry, building). Energy efficiency improvement of energy system and the new system that can solve the increasing energy demand and the emissions are introduced. The activities on IEA/ECERC delegation of Korea will be also reported in this presentation.

  • PDF

A Study on the Effects of Hospital Internal Marketing Factors on the Internal Customer Satisfaction

  • Ahn, Jong-Min
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.45 no.4
    • /
    • pp.188-192
    • /
    • 2013
  • This study was conducted to develop the strategy for more effective internal marketing and promoting internal customer satisfaction by grasping the level of internal marketing operations targeting employees within hospital and empirically analyzing the effect of internal marketing operations on internal customer satisfaction. The findings reveal that there is a significant correlation between factors for internal marketing components and internal customer satisfaction. The average factor score for internal customer satisfaction is 3.230 out of 5, which is a little higher than normal levels. Counting down the five factors is as follows: internal communication, education and training, delegation of authority, welfare, compensation system, with compensation system shown as the lowest level and internal communication as the highest level. In addition, the result of multiple regression analysis conducted to inspect the effect of factors for internal marketing components on internal customer satisfaction indicates that among 5 factors, delegation of authority, education and training, and welfare have positive influences on internal customer satisfaction; whereas, compensation system has little effect on it.

  • PDF

A Study on The Delegation of Role in Role Based Access Control (역할 기반 접근 제어에서 역할 위임에 관한 연구)

  • Lee, Hee-Kyu;Lee, Jea-Kwang
    • The KIPS Transactions:PartC
    • /
    • v.10C no.3
    • /
    • pp.265-272
    • /
    • 2003
  • RBAC is an Access Control Mechanism for security administration of system resource and technique attracting in commercial fields because of reducing cost and complexity of security administration in large network. Many RBAC's research is progressive but several problems such as the delegation of role have been pointed out concerning the mechanism. It is necessary that a person's role delegate someone with reliability by reasons of a leave of absence, sick leave and the others. But the existing RBAC standards don't give definition of the delegation of roles. In this paper, we propose RBAC model that delegator can delegate subset of role and permission to a delegatee so that more efficient access control may be available.

The relationship between internal marketing and incremental innovation in small business (중소기업에서의 내부마케팅과 구성원들의 점진적 혁신의 관계에 대한 연구)

  • Ahn, Kwan-Young
    • Journal of the Korea Safety Management & Science
    • /
    • v.13 no.4
    • /
    • pp.171-177
    • /
    • 2011
  • This paper reviewed the relationship between internal marketing and incremental innovation, and the moderating effect of firm size. The results of hierarchical multiple regression analysis, based on the responses from 322 employees in small business, showed that almost internal marketing factors effects positively on incremental innovation. All internal marketing factors(CEO support, compensation system, education & training, internal communication, authority delegation) appeared to be related positively with process innovation and service innovation. And all other factors(compensation system, education & training, internal communication, authority delegation) except CEO support showed to have positive relationship with operation innovation. In the moderating effects, internal communication effects more positively on incremental innovation in large firm-size than in small firm-size. But delegation effects more positively on incremental innovation in small firm-size than in large firm-size.

OAuth based Proxy Delegation Service (OAuth 기반의 대리 인증서 위임 서비스)

  • Heo, Daeyoung;Hwang, Suntae
    • Journal of Internet Computing and Services
    • /
    • v.13 no.6
    • /
    • pp.55-62
    • /
    • 2012
  • Grid web applications by standard Web technology are increasingly used to provide grid service to users as normal Web user interface and service. It is however difficult to integrate a grid security system such as Grid Security Infrastructure (GSI) into Web applications because the delegation way of standard Web security is not the same as the one of Grid security. This can be solved by allowing Web applications to get a Grid credential by using an online credential repository system such as MyProxy. In this paper, we investigate the problem that occurs when MyProxy, which assumes mutual trust between a user and Grid web application, is adapted for achieving security integration between Web and Grid, and we propose a new Grid proxy delegation service to delegate a Grid credential to the Web without assuming mutual trust. In the service, the X.509 proxy delegation process is added to OAuth protocol for credential exchange, and authentication can be done by an external service such as OpenID. So, users can login onto the Grid web application in a single sign-on manner, and are allowed to securely delegate and retrieve multiple credentials for one or more Virtual Organizations.