• Title/Summary/Keyword: Framework of Policy

Search Result 1,442, Processing Time 0.03 seconds

The legal regime of air charter in china

  • Cheng, Chia-jui
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.22 no.1
    • /
    • pp.163-186
    • /
    • 2007
  • Charter flight in international air law has, from very beginning, not precisely defined by the International Civil Aviation Organization (lCAO) since 1947 when it came into being. By practice, the operation of charter traffic is, in its very beginning, the subject to the regulations of national rules and bilateral charter agreements (charter annex clause) within the framework of normal bilateral agreement of international air services. Taiwan had signed a series of bilateral air service agreement under the name of the Government of the Republic of China when Taiwan was recognized by the United Nations and major members of international community as the sole legal government representing China before 1971, but that situation was changed since then. Taiwan has only maintained diplomatic relations with 25 States, but maintained semi-official relations with major powers of the world. The former agreements were signed within the framework of the Vienna Convention on the Law of Treaties of 1969 while the latter agreements were signed within the framework of administrative and civil law of two countries which were not in the form of bilateral treaty signed by two sovereign States in its proper sense of international law. The legal regime of charter flights between Taiwan and Mainland China is regulated by special arrangements negotiated by delegated airlines and airlines association or private law institutions.

  • PDF

A study on development of health indicator system in Korea (한국의 보건지표 체계 개선에 관한 연구)

  • 윤치근;윤병준;이준협;김윤신
    • Health Policy and Management
    • /
    • v.13 no.2
    • /
    • pp.44-66
    • /
    • 2003
  • I. Background and Purpose Health Indicator system and measurement of health status are an important fields in national health fields. This study reviewed the overall concepts of health and health indicators, health indicator system. The purposes of this study are to build the conceptual health framework, and suggest a health indicator system, in order to correspond to the situation of national health and the demand of International organizations. II. Scope and Contents The scope of this study ; - Review of tile conceptual health framework, health indicators, and health Indicator system - Selection and development of tile new individual health indicators - Suggestion of tile revised health indicator system III. Results of Study This study intented to build the conceptual and framework of national health and provide the measurement tools of health status. This study developed the health indicator system through the conceptual and hierarchial approach to national health. The health indicator system contains 6 concern: areas and each sub-areas. The major concern areas are health state and behavior, deathㆍdiseaseㆍdisability, health care utilization, health resources, health expenditure and finance, other affecting factors on health. This health indicator system is corresponding to the situation of health status patterns and the demand of international organizations. And this health indicator system is considering the present health data production system and the availability of health data.

Impact of Chemical Pesticides Use in a Social Accounting Matrix Framework: A Case Study of Thailand

  • PUTTACHAI, Wachirawit;SINGHAPREECHA, Charuk;SIRISRISAKULCHAI, Jirakom
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.2
    • /
    • pp.297-307
    • /
    • 2021
  • Although there are several studies on the impact of pesticides use, there is no consistent conclusion about such evidence on capturing the socioeconomic independence. The propose of this paper is to investigate the economy-wide impact of pesticide use in Thailand. The research data and methodology in this paper are depended on a social accounting matrix framework incorporating the pesticide-related illness as an additional sector, following Resosudarmo and Thorbecke (1998), to explain the impact of the pesticides on the related agricultural sector, food sector, and the social welfare of different households. Thus, the main characteristics of the Thai economy can be comprehensively described by providing information contained in this framework. In this respect, the several data sets are constructed to include the economic and social structure interdependencies, which are necessary to analyze the policy implications, especially industrial policy. The results were analyzed according to the general equilibrium theory and the Leontief multiplier matrix. It reveals that the food industry and the economy are significantly affected by the pesticides. One of the most interesting findings of this paper suggest that the food sector needs to determine its output to avoid bottleneck situations and create equality across the food production system.

Application Design and Execution Framework in Role-Based Access Control Systems (역할기반 접근통제 시스템에서 응용 프로그램의 설계 및 시행지원 프레임워크)

  • Lee, Hyeong-Hyo;Choe, Eun-Bok;No, Bong-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11
    • /
    • pp.3020-3033
    • /
    • 1999
  • Role-Based Access Control(RBAC) security policy is being widely accepted not only as an access control policy for information security but as both a natural modeling tool for management structure of organizations and flexible permission management framework in various commercial environments. Important functions provided by the current RBAC model are to administrate the information on the components of RBAC model and determine whether user's access request to information is granted or not, and most researches on RBAC are for defining the model itself, describing it in formal method and other important properties such as separation of duty. As the current RBAC model which does not define the definition, design and operation for applications is not suitable for automated information systems that consist of various applications, it is needed that how applications should be designed and then executed based on RBAC security model. In this paper, we describe dynamic properties of session which is taken for a passive entity only activated by users, as a vehicle for building and executing applications in an automated information systems. And, a framework for session-oriented separation of duty property, application design and operation is also presented.

  • PDF

A Development of Comprehensive Framework for Continuous Information Security (기업의 지속적 정보보안 강화를 위한 접근법 개발)

  • Jeong, Tae-Seok;Yim, Myun-Seong;Lee, Jae-Beom
    • Journal of Digital Convergence
    • /
    • v.10 no.2
    • /
    • pp.1-10
    • /
    • 2012
  • The growth in computer use has ushered increased concerns of information security throughout the world. Historically, researchers interested in the security of information systems have long investigated extensively themselves with building technological countermeasures in order to prevent several information security problems. However, due to infusion of more procedures and logical or physical devices within the information environment, no system can be completely secure. Therefore, keeping IT environment safe demands a more comprehensive understanding of the phenomenon, which requires broadening information security far beyond the technical aspects. This study is aimed at proposing a information security framework from holistic view.

Energy-efficient Joint Control of Epidemic Routing in Delay Tolerant Networks

  • Wu, Yahui;Deng, Su;Huang, Hongbin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.2
    • /
    • pp.234-252
    • /
    • 2013
  • Due to the uncertain of connections in Delay Tolerant Networks (DTNs), most routing algorithms in DTNs need nodes to forward the message to others based on the opportunistic contact. The contact is related with the beaconing rate. In particular, nodes have more chances to encounter with each other with bigger beaconing rate, but more energy will be used. On the other hand, if the nodes forward the message to every node all the time, the efficiency of the routing algorithm is better, but it needs more energy, too. This paper tries to exploit the optimal beaconing rate and forwarding rate when the total energy is constraint. First, a theoretical framework is proposed, which can be used to evaluate the performance with different forwarding rate and beaconing rate. Then, this paper formulates a joint optimization problem based on the framework. Through Pontryagin's Maximal Principle, this paper obtains the optimal policy and proves that both the optimal forwarding and beaconing rates conform to threshold form. Simulation results show the accuracy of the theoretical framework. Extensive numerical results show that the optimal policy obtained in this paper is the best.

Policy-based Security System Modeling using Vulnerable Information (취약성 정보를 활용한 정책 기반 보안 시스템 모델링)

  • Sea, Hee-Suk;Kim, Dong-Soo;Kim, Hee-Wan
    • Journal of Information Technology Services
    • /
    • v.2 no.2
    • /
    • pp.97-109
    • /
    • 2003
  • As the importance and the need for network security is increased, many organization uses the various security systems. They enable to construct the consistent integrated security environment by sharing the vulnerable information among firewall, intrusion detection system, and vulnerable scanner. And Policy-based network provides a means by which the management process can be simplified and largely automated. In this article we build a foundation of policy-based network modeling environment. The procedure and structure for policy rule induction from vulnerabilities stored in SVDB (Simulation based Vulnerability Data Based) is conducted. It also transforms the policy rules into PCIM (Policy Core Information Model).

A Workable Framework or a Fuzzy Concept? The Regional Resilience Approach to the Evolution and Adaptability of Regional Economies

  • Cho, Cheol-Joo
    • World Technopolis Review
    • /
    • v.3 no.2
    • /
    • pp.66-77
    • /
    • 2014
  • This paper aims at exploring a conceptual framework of analyzing the evolutionary processes of regional economies by reconciling the notion of regional resilience and the concepts prevailing in the disciplines of evolutionary economics and geography. The resilience framework appears to offer a promising outlet with which combination of the seemingly contradictory conceptions is made possible. It can address why some regions manage to adapt to external shocks, renew themselves, or lock out themselves, while others are more locked in decline. In addition, it can also explain how the spatial organization of economic production, distribution, and consumption is transformed over time. Then, regional economic resilience, together with its accompanying vehicle of panarchy, emerges as a workable framework of explaining regional differentiation in regional economic performance and trajectories. Despite the risk of being a fuzzy concept, the resilience conception can be properly operationalized to provide policy principles of regional economic innovation adjusted to region-specific contexts.

Maintenance and Development of National Framework Data (국가기본지리정보 구축 및 유지관리 방안)

  • 조현태;김명호;박홍기;김감래
    • Proceedings of the Korean Society of Surveying, Geodesy, Photogrammetry, and Cartography Conference
    • /
    • 2004.04a
    • /
    • pp.329-335
    • /
    • 2004
  • Until now, The our concept about a national geospatial data infrastructure have been concentrated on a field of producer. This concept is the trend which the focus have been inverted currently with the use to process data in an user viewpoint and to the compatibility of the database. But the standard of our national framework data is defective yet. Also, The law and policy are not clear and the concept recognition of users lacks. This paper is showed improvement plan of development and maintenance of the national framework data, and researched the relationship between the national framework data.

  • PDF

New framework for adaptive and agile honeypots

  • Dowling, Seamus;Schukat, Michael;Barrett, Enda
    • ETRI Journal
    • /
    • v.42 no.6
    • /
    • pp.965-975
    • /
    • 2020
  • This paper proposes a new framework for the development and deployment of honeypots for evolving malware threats. As new technological concepts appear and evolve, attack surfaces are exploited. Internet of things significantly increases the attack surface available to malware developers. Previously independent devices are becoming accessible through new hardware and software attack vectors, and the existing taxonomies governing the development and deployment of honeypots are inadequate for evolving malicious programs and their variants. Malware-propagation and compromise methods are highly automated and repetitious. These automated and repetitive characteristics can be exploited by using embedded reinforcement learning within a honeypot. A honeypot for automated and repetitive malware (HARM) can be adaptive so that the best responses may be learnt during its interaction with attack sequences. HARM deployments can be agile through periodic policy evaluation to optimize redeployment. The necessary enhancements for adaptive, agile honeypots require a new development and deployment framework.