• 제목/요약/키워드: Full security

검색결과 292건 처리시간 0.028초

World Bank와 ILO/ISSA의 사회보장연금 민영화 논쟁에 관한 연구 (The Social Security Pension Reform Debate between the World Bank and the ILO/ISSA)

  • 원석조
    • 한국사회복지학
    • /
    • 제46권
    • /
    • pp.290-318
    • /
    • 2001
  • In 1981, Chile has fundamentally reformed the public pension system from the pay-as-you-go system (PAYGs) to the full funding defined contribution system managed by the private funding companies. The Chilean privatization reform influenced not only the neighbor South American countries but also the advanced countries. The United Kingdom contracted out the state earning related pension system. Australia and Sweden recently introduced the private investment accounts system. And now the hot debates on the privatization of the social security pension is going on in the United States of America. This wind of privatizing the public pension system is being backed up by the New Liberalism, the nowadays' strongest ideology. Besides, the theoretical and idealogical debate between the World Bank and the ILO/ISSA was happened in the middle of 1990s. The World Bank, the supporter of the international financial capital, insisted the introducing of the full funding individual accounts system and the abolition of the existing PAYGs. The ILO/ISSA apposed the World Bank's policies and advocated the moderate reform of the PAYGs. In this paper, I reviewed the Chilean reform, the World Bank's report and the opposing argument of the ILO/ISSA against it, and analysed the core issues of the two sides. Also, I tried to present the suggestions to the Korean public pension systems. Through the discussing the debate, we made certain of the importance of the basic issues in the social security system like equity vs. adequacy, inter-generational redistribution vs. intra-generational redistribution and welfare vs. economy, once again.

  • PDF

′가사노동 전담자′인 전업주부에게 취업은 대안인가 아닌가\ulcorner (A Qualitative Study on the Full-Time Housewife′s Employment)

  • 김선미
    • 가정과삶의질연구
    • /
    • 제22권5호
    • /
    • pp.29-45
    • /
    • 2004
  • This ethnographic case-study explores the interpretation and behavior in job considering among full-time housewives. The participants of this study are eleven middle class full-time housewives in their thirties and forties. In-depth interviews based on an unstructured Questionnaire were conducted for this study. Findings are as follows: Six full-time housewives tend to think their full-time housewife-lives more convenient, something unable to substitute and more profitable compared to the counter partner's lives. But they are classified into two groups according to the satisfaction for full-time housewife life. One group has found out more positive meaning in their life but the other group has not yet and they are doubtful about real life and other opportunity. In Contrast, other five full-time housewives tend to interpret employment as a more productive source to secure family resource for their children's education and repay the loan used to buy larger apartment. And the job is considered to confirm her own individuality and the feeling for the social entity as a competent social entity. But two of them who have never been employed do not try to get a job as a new identity alternative. And the various elements like household income, job experience, health, children's age and husband's attitude to his wife's employment etc. are defined to influence the interpretation and the job considering behavior among full-time housewives.

WeChat 메신저의 향상된 복호화 방안과 SQLite Full Text Search 데이터를 이용한 삭제된 메시지 복구에 관한 연구 (Study on Improved Decryption Method of WeChat Messenger and Deleted Message Recovery Using SQLite Full Text Search Data)

  • 허욱;박명서;김종성
    • 정보보호학회논문지
    • /
    • 제30권3호
    • /
    • pp.405-415
    • /
    • 2020
  • 스마트폰의 보급률이 늘어남에 따라 모바일 포렌식은 현대 디지털 포렌식 수사에서 필수적인 요소다. 모바일 메신저 데이터는 사용자의 생활패턴, 심리상태 등의 정보를 획득할 수 있기 때문에 모바일 포렌식에서 매우 중요한 데이터이다. 메신저 데이터 분석을 위해서는 암호화된 메신저 데이터의 복호화 기술이 필요하며, 대부분의 메신저가 메시지 삭제 기능을 제공하므로 삭제된 메시지를 복구하는 기술이 요구된다. 전 세계 약 10억 명이 사용하고 있는 메신저인 WeChat은 IMEI (International Mobile Equipment Identity) 정보를 이용하여 데이터를 암호화하며, 메시지 삭제 기능을 제공한다. 본 논문에서는 IMEI 정보가 존재하지 않는 경우의 데이터 복호화 방안을 제시하였으며, SQLite 데이터베이스의 전문 검색기능을 위하여 생성된 FTS (Full Text Search) 데이터베이스를 사용하여 삭제된 메시지를 복구하는 방법에 대하여 제안한다.

공공부문 정규직 전환 및 의무경찰제도 폐지에 따른 보안산업 변화에 대한 인식 (Perceptions of the Security Management at Critical Facilities in South Korea: College students' attitudes toward increasing demand for security personnel and the alternatives to police)

  • 왕석원;최연준
    • 시큐리티연구
    • /
    • 제61호
    • /
    • pp.87-107
    • /
    • 2019
  • "공공부문 정규직 전환"이라는 정부의 정책 변화에 따라 국회, 정부청사, 인천공항 등 국가중요시설에 대한 보안산업에 상당한 변화가 일어나고 있다. 또한, 현역병 지원감소 등의 이유로 2023년 의무경찰 제도가 폐지하게 되어 국회, 정부청사, 경찰청 등 국가중요시설뿐만 아니라 경찰관서, 국회의장 등의 공관 및 전직 대통령 사저 등에서 기존 의무경찰이 담당하던 시설경비업무를 대체할 수 있는 인력 마련이 시급한 현실이다. 이에 따라 본 연구에서는 대체 인력으로 거론되고 있는 청원경찰, 특수경비원, 방호원의 법적근거 및 관리감독, 고용형태 및 임금, 직무범위 및 직무권한에 대한 비교분석을 실시하였으며, 수도권 5개 대학(2년제 전문대학 3개, 4년제 대학교 2개)의 경호 및 보안 관련 학과에 재학 중인 학생 234명을 대상으로 설문조사를 실시한 결과 청원경찰로 대체하는 것이 가장 효과적인 방안이라 할 수 있다. 이러한 보안산업의 변화에 따라 경호 및 보안 관련 학과에서는 청원경찰로의 취업 등 우수한 인력을 양성하기 위해 '위급상황 대처능력', '무도능력'을 중심으로 학생들의 다양한 능력을 향상시키기 위해 노력해야 한다. 또한, '무도 단증'과 '응급구조 및 심폐소생술', '경비지도사 및 신변보호사' 등의 자격증을 취득하기 위한 '무도실기', '청원경찰법', '응급구조 및 심폐소생술' 등의 과목을 경호 및 보안 관련 학과 교육과정에 적극적으로 반영할 필요성이 있다.

Session Resume의 기한 연장을 이용한 SSL/TLS Handshake 프로토콜의 성능 개선 (Performance Improvement of SSL/TLS Handshake Protocol through extension of a Session Resume)

  • 박지철;한명진;이경현
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2002년도 가을 학술발표논문집 Vol.29 No.2 (1)
    • /
    • pp.610-612
    • /
    • 2002
  • 전송계층에서의 안전한 통신을 위한 Secure Sockets Layer(SSL)와 Transport Layer Security(TLS)의 Handshake 프로토콜에서 Session ID의 저장이 매우 짧은 시간 동안 저장됨으로 전체적인 Full Handshake의 횟수가 증가한다. 따라서, 안전한 Session resume 보장함으로 서버의 session cache 기한을 연장할 수 있으며 전체적인 Full Handshake 프로토콜의 횟수를 줄일 수 있다. 본 논문에서는 Handshake 프로토콜의 성능 개선을 위하여 S/key와 같은 해쉬의 일방향 성질을 이용하는 개선된 Session resume의 방안을 제안한다.

  • PDF

ZigBee Security Using Attribute-Based Proxy Re-encryption

  • Seo, Hwajeong;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • 제10권4호
    • /
    • pp.343-348
    • /
    • 2012
  • ZigBee Network is enabling technology for home automation, surveillance and monitoring system. For better secure network environment, secure and robust security model is important. The paper proposes an application, attribute-based proxy re-encryption on ZigBee networks. The method can distribute the authority to designated sensor nodes to decrypt re-encrypted ciphertext with associated attributes. However, a previous method is required to compute complex pairing operations. The high complexity is not suited to low resource device sensor networks, and it does not provide routing security either. To resolve these problems, we present a novel mechanism. The method can reduce overhead by imposing overhead to full function devices and ensure routing paths as well.

Provably-Secure Public Auditing with Deduplication

  • Kim, Dongmin;Jeong, Ik Rae
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권4호
    • /
    • pp.2219-2236
    • /
    • 2017
  • With cloud storage services, users can handle an enormous amount of data in an efficient manner. However, due to the widespread popularization of cloud storage, users have raised concerns about the integrity of outsourced data, since they no longer possess the data locally. To address these concerns, many auditing schemes have been proposed that allow users to check the integrity of their outsourced data without retrieving it in full. Yuan and Yu proposed a public auditing scheme with a deduplication property where the cloud server does not store the duplicated data between users. In this paper, we analyze the weakness of the Yuan and Yu's scheme as well as present modifications which could improve the security of the scheme. We also define two types of adversaries and prove that our proposed scheme is secure against these adversaries under formal security models.

Combined Relay Selection and Cooperative Beamforming for Physical Layer Security

  • Kim, Jun-Su;Ikhlef, Aissa;Schober, Robert
    • Journal of Communications and Networks
    • /
    • 제14권4호
    • /
    • pp.364-373
    • /
    • 2012
  • In this paper, we propose combined relay selection and cooperative beamforming schemes for physical layer security. Generally, high operational complexity is required for cooperative beamforming withmultiple relays because of the required information exchange and synchronization among the relays. On the other hand, while it is desirable to reduce the number of relays participating in cooperative beamforming because of the associated complexity problem, doing so may degrade the coding gain of cooperative beamforming. Hence, we propose combined relay selection and cooperative beamforming schemes, where only two of the available relays are selected for beamforming and data transmission. The proposed schemes introduce a selection gain which partially compensates for the decrease in coding gain due to limiting the number of participating relays to two. Both the cases where full and only partial channel state information are available for relay selection and cooperative beamforming are considered. Analytical and simulation results for the proposed schemes show improved secrecy capacities compared to existing physical layer security schemes employing cooperative relays.

Physical Layer Security in Underlay CCRNs with Fixed Transmit Power

  • Wang, Songqing;Xu, Xiaoming;Yang, Weiwei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권1호
    • /
    • pp.260-279
    • /
    • 2015
  • In this paper, we investigate physical layer security for multiple decode-and-forward (DF) relaying underlay cognitive radio networks (CRNs) with fixed transmit power at the secondary network against passive eavesdropping attacks. We propose a simple relay selection scheme to improve wireless transmission security based on the instantaneous channel information of all legitimate users and the statistical information about the eavesdropper channels. The closed-form expressions of the probability of non-zero secrecy capacity and the secrecy outage probability (SOP) are derived over independent and non-identically distributed Rayleigh fading environments. Furthermore, we conduct the asymptotic analysis to evaluate the secrecy diversity order performance and prove that full diversity is achieved by using the proposed relay selection. Finally, numerical results are presented to verify the theoretical analysis and depict that primary interference constrain has a significant impact on the secure performance and a proper transmit power for the second transmitters is preferred to be energy-efficient and improve the secure performance.

Joint Beamforming and Jamming for Physical Layer Security

  • Myung, Jungho;Heo, Hwanjo;Park, Jongdae
    • ETRI Journal
    • /
    • 제37권5호
    • /
    • pp.898-905
    • /
    • 2015
  • In this paper, we consider a joint beamforming and jamming design to enhance physical layer security against potential multiple eavesdroppers in a multiple-input and single-output cellular broadcast channel. With perfect channel state information at the base station, we propose various design approaches to improve the secrecy of the target user. Among the proposed approaches, the combined beamforming of maximum ratio transmission and zero-forcing transmission with a combination of maximum ratio jamming and zero-forcing jamming (MRT + ZFT with MRJ + ZFJ) shows the best security performance because it utilizes the full transmit antenna dimensions for beamforming and jamming with an efficient power allocation. The simulation results show that the secrecy rate of this particular proposed approach is better than the rates of the considered conventional approaches with quality-of-service and outage probability constraints.