• Title/Summary/Keyword: One-Stop Security

Search Result 27, Processing Time 0.026 seconds

A Study on Securing of Air Cargo Supply Chain by Adapting One-Stop Security - Focusing on ICAO SARPs and EU Case - (원스톱 보안(One-Stop Security) 도입을 통한 항공화물 공급망 보안체계 강화 연구 - ICAO 국제기준 및 EU 사례를 중심으로 -)

  • Park, Man-Hui;Lee, Seung-Yeol;Heo, Beak-Yong;Hwang, Ho-Won
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.28 no.3
    • /
    • pp.18-26
    • /
    • 2020
  • Cost reduction and equality by exempting re-scanning of passengers, baggage and cargo secured from the first airport of departure, mainly in the European Union/European Economic Area(EU/EEA), Switzerland, etc. One-Stop Security(OSS) is being promoted to maintain the level of security while increasing speed and convenience, and movement is expected to expand worldwide. Therefore, this paper establishes the basic concept of OSS through a literature review of ICAO Standards and Recommended Practices(SARPs), and analyzes the actual conditions of OSS implementation in major countries such as the United States and the EU. It is intended to present the political, economic benefits for Korea and highlight the urgency of implementing the OSS system in the aviation industry including the cargo sector. Therefore, the practical implications of strengthening international cooperation through the expansion of government and airport operators OSS implementation to overcome the resource shortage problem of the existing national air cargo security system and to strengthen the status as a global aviation powerhouse were drawn up. There is academic significance that it raised the need for effective implementation of OSS, which was not previously covered.

A Study on the Relief Service Promotion Plan for Natural Disaster Victims (자연재해 이재민의 구호서비스 증진방안에 관한 연구)

  • Seo, Jung Pyo;Cho, Wonchul
    • Journal of Korean Society of Disaster and Security
    • /
    • v.6 no.2
    • /
    • pp.15-22
    • /
    • 2013
  • Recently, 'Government 3.0' has become the topic since the inauguration of the new government. According to Government 3.0 Promotion Master Plan, this means providing bilateral customized administrative service based on the values of opening-up, sharing, and cooperation for the individuals of the people. Currently, if disaster victims, who have private property damaged by natural disasters such as typhoon and torrential rain, want to receive disaster relief service supports such as financial support, tax cut, reduction in electric and communication charges, they have to visit each of applicable organizations and apply for the relief service supports. The application forms and procedures are so diverse and complex that disaster victims undergo many discomforts. So this thesis established the solution of residents' discomforts and the providing of practical benefits through disaster victims' one stop application for service as the research objective. Accordingly, the solution plan was concretely presented through preparing the relief service promotion strategies comprising the establishment of administrative service supporting system and the preparation of legal and institutional device, the establishment of computing system for one stop service and the reinforcement of general publicity for successful promotion of cooperation projects.

Comprehensive Analysis and Evaluation of Mobile S-MAC Protocol in Wireless Sensor Network

  • Alanazi, Adwan Alownie
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.358-366
    • /
    • 2022
  • Wireless sensor networks (WSN) are becoming widely used in collecting and sensing information in different fields such as in the medical area, smart phone industry and military environment. The main concern here is reducing the power consumption because it effects in the lifetime of wireless sensor during commutation because it may be work in some environment like sensor in the battlefields where is not easy to change the battery for a node and that may decrease the efficiency of that node and that may affect the network traffic may be interrupted because one or more nodes stop working. In this paper we implement, simulate, and investigate S-MAC protocol with mobility support and show the sequence of events the sender and receiver go through. We tested some parameters and their impacts of on the performance including System throughput, number of packets successfully delivered per second, packet delay, average packet delay before successful transmission.

The Construction of Electronic Commerce infra for Bank usin Internet (인터넷에서의 금융권 전자상거래 인프라 구축)

  • 신현호;조범준
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.05a
    • /
    • pp.131-137
    • /
    • 1999
  • In order to operate Internet Banking, there is a important thing to precede, That is to carry out a scheme of one-stop to let clients transact anything they want to buy and establish the preservation of public security system between existing banking networks. (of course, that should be designed handily to the clients). In this paper, the protocol which is determined between banking network and Internet to maintain the preservation of public security. In other words, each XPM(X.25 Packet Manager) is a program to manage both system security and service at each other side; manage all packets which are connected by X.25 protocol. If other condition like law and institution is improved, it will be adopted to real operation with various service. Further more, we tan construct Electronic Commerce and adopt various digital money like electronic coin or check.

  • PDF

Proposal of a Model for Co-processing of Real Estate Mortgage Registration in China's Internet Environment

  • Wang, Long;Shin, Seung-Jung
    • International journal of advanced smart convergence
    • /
    • v.10 no.2
    • /
    • pp.53-58
    • /
    • 2021
  • In this paper, based on the real estate registration model in the Chinese internet environment, we propose a model for the joint business of banking collateral registration. This is to increase the efficiency and service level of the real estate mortgage registration process. And it can solve the problems that in the process of registering a mortgage loan, difficulty of data sharing between the real estate registration agency and the bank, and ordinary users and bank clerks duplicate unnecessary work. In addition, it realizes joint processing and data sharing of real estate registration work with real estate registration agencies and banks, increases the efficiency and level of government affairs services, and offers an optimized solution to realize a one-stop service for real estate security registration. The results of this study are expected to provide theoretical support for the application and innovation of the Internet environment real estate registration model.

An assessment of sanctions on North Korea and the prospect (대북 제재 조치 평가 및 전망)

  • Cheon, Seong- Whu
    • Strategy21
    • /
    • s.31
    • /
    • pp.5-26
    • /
    • 2013
  • The South Korean society has experienced many changes since the sinking of ROKS Cheonan. The government reviewed its defense posture and adopted the 5·24 Measure in its relations with North Korea. As a result, the people of South Korea became more conscious of security situations on the Korean peninsula while North Korea's economy suffered badly. Meanwhile, the South Korean government has taken a flexible stance toward North Korea in terms of exchange and cooperation since September 2011. The flexible stance was to manage inter-Korea relations in a stable manner and relieve the hardships of the North Korean people while preserving the spirits and purposes of the 5·24 Measure. The UN Security Council adopted twenty-six resolutions and statements on North Korea since June 25, 1950. They include thirteen U.N. Security Council resolutions including those concerning nuclear weapons or missile programs, nine Presidential statements, and four press statements. Resolution 82, the first U.N. resolution on North Korea, came when the Korean War broke out. Resolution 825, the first one related to nuclear or missile programs, was adopted in response to North Korea's withdrawal from the NPT. Apart from these U.N. resolutions, the United States has imposed separate sanctions against North Korea. North Korea's nuclear weapons program can be considered in comparison with that of Iran in terms of the consequences they create for the regional security. The Security Council has adopted six resolutions on Iran so far. One should note that the resolutions on Iran have had much stronger sanctions compared to those imposed on North Korea. That is, while the North Korea case may be viewed as a more serious threat to international security from the perspective of nuclear weapons development or proliferation, tougher sanctions have been placed on Iran. There are two approaches that South Korea should take in addressing the related issues. First, we should aim to reduce the gap between sanctions imposed on Iran and North Korea. It is difficult to understand that a country with more serious problems is rewarded with lighter sanctions. We should take measures through the Security Council Sanctions Committee to make individuals and groups in North Korea that play a central role in developing nuclear weapons and missiles subject to additional sanctions. Second, we have to change. Other countries in the international community have become tired of North Korea's nuclear issue and now they look to South Korea for initiative. We should correctly understand this current situation and play a leading role within our capacity. Knowingly and unknowingly, the notion that the North Korean nuclear issue may be left to South Korea has been spread around the international community. Although the situation is grave, we should try to open a new horizon in ushering in the unification era by taking the initiative with confidence that there is a looming hope ahead of us. For these tasks, we should stop thinking in the old way that has been ossified for the last two decades. We should not be pushed around by neighboring great powers in dealing with North Korea related issues anymore; we should take the initiative with resolution that we will play our role at the center of four great powers and with confidence that we can do it. Based on the confidence that the Republic of Korea has become a country with enough capacity to take the initiative, we should establish a 'National Grand Strategy' representing South Korea's strategic vision that the unification is the ultimate solution to the problems related to North Korea's nuclear weapons program.

  • PDF

Mediated ID based signature scheme and key updating signature scheme (중재자를 이용한 ID기반 전자서명과 키 업데이팅 전자서명 기법)

  • Ju, Hak-Soo;Kim, Dae-Youb
    • The KIPS Transactions:PartC
    • /
    • v.14C no.6
    • /
    • pp.463-470
    • /
    • 2007
  • Revocation is one of the main difficulties faced in implementing Public Key Infrastructures(PHs). Boneh, Ding and Tsudik first introduced a mediated cryptography for obtaining immediate revocation of RSA keys used in PKIs. Their method is based on the idea that each user's private key can be split into two random shares, one of which is given to the user and the other to an online security mediator(SEM). Thus any signature or decryption must be performed as a cooperation between a user and his/her associated SEM and revocation is achieved by instructing the mediator SEM to stop cooperating the user. Recently, Libert and Quisquater showed that the fast revocation method using a SEcurity Mediator(SEM) in a mRSA can be applied to the Boneh-Franklin identify based encryption and GDH signature schemes. In this paper we propose a mediated identity based signature(mIBS) with batch verification which apply the SEM architecture to an identity based signature. Libert's GDH siganture scheme is not forward secure even though forward security is an important and desirable feature for signature schemes. We propose an efficient key udating mediated signature scheme, mKUS based on mIBS and analyze its security and efficiency.

BlueTooth Snarfing attacks and security aspects (BlueTooth Snarfing 공격 및 보안측면)

  • Park, Hyun Uk;Kim, Hyun Soo;Kim, Ki Hawn;Lee, Hoon-jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.811-814
    • /
    • 2015
  • There are many modern societies use the digital products in everyday life in the Middle, convenience, give him plenty of Bluetooth is one of the users. Bluetooth (IEEE 802.15.1) means equipment in the close range between the low-power wireless communication standard for the connection to use the technology. Currently, Bluetooth earphone, Bluetooth speaker, wearable mounted devices also used a lot because it takes people to exploit the benefits had been lifted and thereby increases your damage. So, reducing the damage the user's further research about the security technique that can stop completely. I am sure that many Bluetooth hacking techniques, a Bluetooth device firmware vulnerability within the stored data to allow the approach to attacking the BlueTooth Snarfing and want to analyze.

  • PDF

An Architecture of One-Stop Monitor and Tracking System for Respond to Domestic 'Lone Wolf' Terrorism (국내 자생테러 대응을 위한 원-스톱 감시 및 추적 시스템 설계)

  • Eom, Jung-Ho;Sim, Se-Hyeon;Park, Kwang-Ki
    • Convergence Security Journal
    • /
    • v.21 no.2
    • /
    • pp.89-96
    • /
    • 2021
  • In recent years, the fear of terrorism due to 'Lone Wolf' terrorism is spreading in the United States and Europe. The lone wolf terrorism, which carries out terrorism independently, without an organization behind it, threatens social security around the world. In Korea, those who have explosive national/social dissatisfaction due to damage caused by national policies, and delusional mental disorders can be classified as potential 'Lone Wolf' terrorists. In 'Lone Wolf' terrorism, unlike organized terrorism, it is difficult to identify signs of terrorism in advance, and it is not easy to identify terrorist tools and targets. Therefore, in order to minimize the damage caused by 'Lone Wolf' terrorism, it is necessary to architect an independent monitoring and tracking system for the police's quick response. In this paper, we propose to architect response system that can collect information from organizations that can identify the signs of potential 'Lone Wolf' terrorism, monitor the continuity of abnormal behavior, and determine the types of 'Lone Wolf' terrorism that can happen as continuous abnormal behaviors.

A Study on Establishment and Management of Training Curriculum Integrated Information Network (훈련과정종합정보망 구축 및 운영 방안에 관한 연구)

  • Rha, Hyeon-Mi
    • Journal of Engineering Education Research
    • /
    • v.13 no.1
    • /
    • pp.78-86
    • /
    • 2010
  • Training Curriculum Integrated Information Network is allowed to searching the all curriculums and courses related with training but also is a one stop handling integrated learning system to cover a course registration, learning and analysis of learning performance. Through developing and managing the Training Curriculum Integrated Information Network, it is available to get the various curriculum thus it is for trainers able to enforce the self oriented course choice and then high quality of training could be proposed by the diverse training curriculums and competitions. To manage Training Curriculum Integrated Information Network more effectively, active public relations marketing activities, high reliable correct information service and rich contents are required. It is essential to manage the learner and learning contents supplier, stable financial resources, personal security issue and protecting a copyright of training curriculum to be a successful network system.

  • PDF