• Title/Summary/Keyword: Open Authorization

Search Result 20, Processing Time 0.03 seconds

The Actual Condition and Development Direction of A Community Child Center (전라북도 지역아동센터 현황과 발전방안)

  • Yee, Young Hwan
    • Korean Journal of Childcare and Education
    • /
    • v.7 no.3
    • /
    • pp.67-100
    • /
    • 2011
  • This study assesses the current status of community child centers in Jeollabuk-do by analyzing data from evaluations of 225 centers in 2009. The results are as follows. First, as of 2004, there was a total of 37 Jeollabuk-do community child centers; the number has been increasing at a rate of 20~40% yearly. The number of community child centers has been increasing since government funding was implemented, especially as an authorization is not required to open a center. In order to prevent an excessive amount of childcare centers, and to ensure that new centers meet a standard of quality, it is necessary to examine replacing the current reporting system with an authorization system. Second, out the 6,144 children in the 255 centers, 1,711 children (27.8%) were not from low-income families. This may be positive in that children from various income level families are learning together. However, in order for the community child centers to operate as they were intended, it is necessary to reinforce the itemized regulations. Third, the community child centers scored relatively poorly in utilizing community and human resources. This is because although most Jeollabuk-do childcare centers are using volunteer personnel, they are not fully utilizing community resources. The governments of the cities and counties should support the community child centers by promoting their services and roles, and thereby enable the centers to develop a network of professionals in the community.

Analysis of IoT Open-Platform Cryptographic Technology and Security Requirements (IoT 오픈 플랫폼 암호기술 현황 및 보안 요구사항 분석)

  • Choi, Jung-In;Oh, Yoon-Seok;Kim, Do-won;Choi, Eun Young;Seo, Seung-Hyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.7
    • /
    • pp.183-194
    • /
    • 2018
  • With the rapid development of IoT(Internet of Things) technology, various convenient services such as smart home and smart city have been realized. However, IoT devices in unmanned environments are exposed to various security threats including eavesdropping and data forgery, information leakage due to unauthorized access. To build a secure IoT environment, it is necessary to use proper cryptographic technologies to IoT devices. But, it is impossible to apply the technologies applied in the existing IT environment, due to the limited resources of the IoT devices. In this paper, we survey the classification of IoT devices according to the performance and analyze the security requirements for IoT devices. Also we survey and analyze the use of cryptographic technologies in the current status of IoT open standard platform such as AllJoyn, oneM2M, IoTivity. Based on the research of cryptographic usage, we examine whether each platform satisfies security requirements. Each IoT open platform provides cryptographic technology for supporting security services such as confidentiality, integrity, authentication an authorization. However, resource constrained IoT devices such as blood pressure monitoring sensors are difficult to apply existing cryptographic techniques. Thus, it is necessary to study cryptographic technologies for power-limited and resource constrained IoT devices in unattended environments.

Design of Face Recognition System for Authentication of Internet Banking User (인터넷 뱅킹의 사용자 인증을 위한 얼굴인식 시스템의 설계)

  • 배경율
    • Journal of Intelligence and Information Systems
    • /
    • v.9 no.3
    • /
    • pp.193-205
    • /
    • 2003
  • In this paper, we suggest user authentication and authorization system for internet banking by face recognition. The system is one of Biometrics technology to verify and authorize personnel identification and is more unobtrusive than the other technologies, because they use physiological characteristics such as fingerprint, hand geometry, iris to their system that people have to touch it. Also, the face recognition system requires only a few devices such as a camera and keypad, so it is easy to apply it to the real world. The face recognition algorithms open to the public are separated by their analysis method differ from what characteristic of the human face use. There are PCA (principal Component Analysis), ICA (Independent Component Analysis), FDA (Fisher Discriminant Analysis). Among these, physiological data of encrypted form is translated utilizing PCA which is the most fundamental algorithm that analyze face feature, and we suggests design method of user authentication system that can do send-receive fast and exactly.

  • PDF

A Study on U-Drawing Information System Based on Risk Assessment (위험성 평가 기반의 U-도면정보 시스템에 관한 연구)

  • Ko, Jae-Wook;Yoo, Jin-Hwan;Lee, Heon-Seok
    • Journal of the Korean Institute of Gas
    • /
    • v.11 no.2 s.35
    • /
    • pp.71-77
    • /
    • 2007
  • This research proposes the U-drawing information system (U-DIS) based on risk assessment. One of the most outstanding features of U-DIS is to perform the Quantitative Risk Assessment directly on the screen utilizing the Process Information. U-DIS revolutionizes the existing way to do a risk assessment and helps finding information more efficiently and simply. It is designed to open all CAD drawing files on the web-based environment without having the CAD S/W installed on the PC. The U terminal platform in U-DIS supports IPv6 and wireless broadband network and U-DIS can be accessible through a sensor or personal authorization. This results in providing a systematic safety enhancement tool considering not only the operation of the process but also its risk level in the equipment industry. Additionally to aid the decision making process it offers comprehensive and thorough information based on engineering technical theory.

  • PDF

Development of SAML Software for JAVA Web Applications in Korea (국내 자바 웹 응용을 위한 SAML 소프트웨어의 개발)

  • Jo, Jinyong;Chae, Yeonghun;Kong, JongUk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.9
    • /
    • pp.1160-1172
    • /
    • 2019
  • Federated authentication is a user authentication and authorization infrastructure that spans multiple security domains. Many overseas Web applications have been adopting SAML-based federated authentication. However, in Korea, it is difficult to apply the authentication because of the high market share of a specific Web (application) server, which is hard to use open-source SAML software and the high adoption of Java-based standard framework which is not easy to integrate with SAML library. This paper proposes the SAML4J, which is developed in order to have Web applications easily and safely integrated with the Java-based framework. SAML4J has a developer-friendly advantage of using a session storage independent of the framework and processing Web SSO flows through simple API. We evaluate the functionality, performance, and security of the SAML4J to demonstrate the high feasibility of it.

Critical Review of the Former Korean Regulations for Consumer Chemicals and the Humidifier Disinfectant Disaster (가습기 살균제 참사와 관련된 당시 생활화학물질 관리 법령에 대한 비판적 고찰)

  • Cho, Dae Hwan;Zoh, Kyung Ehi;Park, Taehyun;Choi, Yeyong;Park, Dong-Uk
    • Journal of Environmental Health Sciences
    • /
    • v.48 no.3
    • /
    • pp.183-194
    • /
    • 2022
  • Background: No study has examined the regulatory factors associated with fatal health problems due to the use of humidified disinfectants (HD) in South Korea. Objectives: This study aimed to identify and discuss the deficiencies and limitations found in the Toxic Chemical Control Acts (TCCA) that failed to prevent the health risk of chemicals in HD products. Methods: The South Korean TCCA was reviewed focusing on acts in operation from 1994 through the end of 2011, the period when HD was allowed in manufacturing and marketing. Results: The TCCA was the act intended to regulate the toxicity of chemicals in HD products. We found the TCCA to lack three key legal clauses which would have been essential to controlling the health risk of HD. First, there was the exemption of toxic and hazard testing for existing chemicals, including chloromethylisothiazolinone (CMIT), methylisothiazolinone (MIT), and benzalkonium chloride (BKC). Secondly, there were no articles requiring industry to provide animal inhalation test result for polymers such as polyhexamethylene guanidine (PHMG) and Oligo(2-)ethoxyethoxyethyl guanidine chloride (PGH). Finally, there was a lack of articles on examining the risk of products as well as on addressing changes in the usage of products. These articles were found to be generally provided in the US Toxic Substance Chemical Act (TSCA) and the EU Registration, Evaluation and Authorization of Chemicals (REACH). Conclusions: In conclusion, the Ministry of Environment of South Korea had not updated key articles for regulating hazardous chemicals, causing large-scale health problems due to HD which had been fundamentally addressed in chemical-related acts in other countries.

Improvement Devices of Urban Center′s Green Function of the Public Open Space Attached Building in Incheon, Korea (인천시 공개공지의 도심 녹지 기능 개선 방안)

  • Cho, Woo;Lee, Yong-Joo;Lee, Kyung-Jae
    • Korean Journal of Environment and Ecology
    • /
    • v.17 no.3
    • /
    • pp.258-267
    • /
    • 2003
  • The purpose of this study is to present improvement devices of urban center's green function in the Public Open Space Attached Building(P.O.S.) in Incheon, Korea. Study sites were the P.O.S. of office building(10 place), transportation facility building(3 places), government office building(2 places) that were made up 1994∼2002 and analyzed establishment, using and planting status. And P.O.S.'s planting area structure of Osaka and Kawasaki in Japan that is operating P.O.S. system similar to Korea was compared with study sites of Incheon. P.O.S. of Incheon is not managing as valuable urban center's green and establishing to satisfy legal requirement. The strengthening devices of P.O.S. function are as follows. First, it is desirable that planting area rate of P.O.S. in order to develop small park in urban center is increasing by 40% that is children's park level. Second, it must be conferred about planting basis, tree selection and planting method etc. of P.O.S. with green and park development department at building authorization. Third, by the 'landscape planting standard of plottage' that is becoming planting standard of P.O.S is heightened and must increase quality and amount of green. Fourth, it is required mandatory establishing of sign so that citizens can search easily and utilize of P.O.S. Fifth, legal regulation should be decided to prevent that P.O.S. is used unlike purpose originally.

A RBAC-based Access Control Framework in OSGi Service Platform (OSGi 서비스 플랫폼에서 RBAC 기반의 사용자 접근제어 프레임워크)

  • Cho, Eun-Ae;Moon, Chang-Joo;Baik, Doo-Kwon
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.5
    • /
    • pp.405-422
    • /
    • 2007
  • Recently, according to the network environment, there are many researches for home network. Nowadays, in home network, the method that access control policy is managed for each home device by using ACL is popular, and EAM (Extranet access management) is applied as a solution. In addition, the research about secure OS is ongoing based on open operating system and the research of user authentication mechanisms for home network using home server is also in progress. However, these researches have some problems as follows; First, the transmission scope of expected access technology in home network is wide, so unauthenticated outside terminal can access the home network. Second, user is inconvenient because user need to set the necessary information for each device. Third, user privacy and convenience are not considered. OSGi provides a service platform for heterogeneous technologies in home network environment. Here, user access control is one of the core parts which should have no problems such as above items, but there are no concrete researches yet. Thus in this paper, we propose an access control policy management framework and access control operation based on RBAC for user access control in home network environment in which OSGi service platform is operated. First, we list the consideration which is not clearly mentioned in OSGi standard, and then we solve these above problems through new framework. In addition, we propose the effective and economical operation method which reduces the policy change frequency for user access control by using RBAC concept though limited resource of home gateway. Besides, in this paper, these proposed policies are defined separately as user-role assignment policy and permission-role assignment policy, and user decide their own policies. In conclusion, we provide the scheme to enhance the user convenience and to solve the privacy problem.

A Study on the theory Substantial Compliance under UCP 600 (UCP 600상 상당일치론의 적용에 관한 연구)

  • Kang, Ho-Kyung;Lim, Mok-Sam
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.41
    • /
    • pp.79-102
    • /
    • 2009
  • L/C transaction, the most important issue for the seller and the buyer is the theory of documentary transaction and the theory of strict compliance which are the principles of L/C transactions. According to the leading cases in England and America where the practice of L/C transactions was created and developed, the descriptions of the commodities specified on all the documents which are submitted based on an L/C, should be identical to the descriptions of commodities specified in the L/C. And further, many leading cases of L/C continuously repeat to emphasize strict compliance. However, the recent leading cases in and out of the country show that the principle of strict compliance is being weakened. The leading cases in America show two trends of weakening the principle of strict compliance. That is, on the contrary to strict compliance, tends to apply substantial compliance (which puts more value on the substance of the documents). These leading cases reflect the attitudes of the judicial and the legislative authorization that don't want to approve formal approach to the commercial law. Recently, the Supreme Court of Korea is giving a decision on the principle of strict compliance, "The documents attached to an L/C should strictly comply with the conditions in the L/C, but it doesn't mean that they should be perfectly identical without any mistake in words. In case the bank can understand through reasonable care that a small mistake in words is too trivial to give different meaning or to give damage to the conditions of the L/C, the documents are regarded to comply with the conditions of the L/C. However, the judgment should be based on whether the difference between the documents and the L/C can be admitted by the international standard bank transaction practice or not." This decision tells that the principle of strict compliance is quite much modified so application of this modification can't be ignored. However, from the viewpoint of the party who requests to open an L/C, there is a criticism that a bank's arbitrary judgement can be involved. Therefore, reviewing the original purpose of L/C transactions (activating international transactions), the principle of strict compliance may be thought old-fashioned because it emphasizes a form, but in reality, for prompt transaction and payment, the principle of strict compliance should be observed in L/C transactions. And further, if a legislative device is prepared to systematically compensate for several side-effects, the principle of strict compliance will improve dynamic flow of prompt and low-costly L/C transactions. On the other hand, it will be able to protect the interested parties.

  • PDF

The secured mobile wallet system using by integrated ID (통합 아이디를 이용한 안전한 모바일 월렛 시스템)

  • Nam, Choon-Sung;Jeon, Min-Kyung;Shin, Dong-Ryeol
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.9-20
    • /
    • 2015
  • Nowadays, Smart Wallet technology trend that is able to save users' consuming costs and also retain users' redundant behaviors such as Single-tapping, One-way communication, Integrated ID, has been issued in recent Mobile Industrial Fields. As one of Smart Wallet functions, Integrated ID is proposed for users' convenience, handiness, and immediate responses. It is designed for the effective management of users' IDs which are easy to be forgot because of its unusual structures. To be detail, instead of user, Integrated ID system can certificate users identification from various online sites (where user resisted) authorization requests via one-clicking, not putting identification data in each sites. So, this technology would be helpful much to a certain user who has lots ID and its Password in multiple Online shopping companies by establishing integrated ID. However, although Integrated ID has lots advantages to be used, most Mobile Service Companies has hesitated to apply Integrated ID service in their shopping systems because this technology requires them sharing their users' data. They have worried that this service would be not helpful to gain their profits. Furthermore, Users who join in multiple shopping companies and use Integrated ID services also are difficult to decide which company they have to save their points in before payment because this system could not show any financial benefit analysis data to their users. As following facts, via this paper majorly we propose the advanced Integrated ID system which concern shopping point management. Basically, this system has a strong security payment service and secure network services like other mobile Shopping systems. Additionally, this system is able to service (or to support) shopping -point -saving guide for customers' financial benefits and conveniences.