• Title/Summary/Keyword: Private Key

Search Result 694, Processing Time 0.025 seconds

Analysis Of Childcare Policy From a Caring Democracy Perspective ('돌봄민주주의' 관점에서 본 보육정책)

  • Baek, Kyungheun;Song, Dayoung;Jang, Soojung
    • Korean Journal of Family Social Work
    • /
    • no.57
    • /
    • pp.183-215
    • /
    • 2017
  • This study analyzes Korean childcare policy from a caring democracy perspective by using the normative policy analysis method. In the midst of emergent new social risks engendered by low fertility and aging population, feminist scholars proposed a transformative paradigm shift from economic growth to caring oriented development on a macro scale but researches on how this grand principle can be reflected into each policy have hardly been discussed. Thus, this study intends to contribute to such policy-driven discussion by analysing childcare policy on the basis of three normative values of freedom, equality and justice re-interpreted by caring democracy theory. Following are key findings. First, childcare policy does not guarantee public value and social solidarity due to the limitations of free choice from the perspective of freedom. Secondly, gender and class stratification has been worsened in a multiple and more complicated way by adding generational and racial dimensions to the existing gender inequality and vicious circulation of private care is observed from equality perspective. Thirdly, structural inequality aggravated injustice previously accumulated in the past rather than providing flat ground by adjustment.

A Study on Obstacles and Promotion of Faculty Technology Entrepreneurship (교수 기술창업 장애요인 및 활성화 방안에 관한 연구)

  • Park, Keon Chul;Lee, Chi Hyung
    • Journal of Digital Convergence
    • /
    • v.17 no.8
    • /
    • pp.81-88
    • /
    • 2019
  • This study suggests the ways to promote the technology startups founded by professor, who differs from student or researcher in social status, risk-taking tendency, and motivation. Literatures were reviewed to understand the advantage of faculty's tech start-up, foreign cases, and related researches. In addition, key stakeholders were interviewed. The study shows that domestic faculty entrepreneurship is currently in infant stage while facing obstacles in institutional, financial and practical aspects. In order to promote faculty entrepreneurship, the study suggests that university and professor set up the benefit sharing structure in advance, that the public sector establishes a holding company or investment fund dedicated to support a faculty startup, that proactive effort be made to attract passive professors to the startup world, and that private companies join faculty startups in the process of concept proofing and product commercialization. The study is expected to provide government, university, and industry with practical implication in promoting faculty startup.

Effects of pre-applied orthodontic force on the regeneration of periodontal tissues in tooth replantation

  • Park, Won-Young;Kim, Min Soo;Kim, Min-Seok;Oh, Min-Hee;Lee, Su-Young;Kim, Sun-Hun;Cho, Jin-Hyoung
    • The korean journal of orthodontics
    • /
    • v.49 no.5
    • /
    • pp.299-309
    • /
    • 2019
  • Objective: This study aimed to investigate the effect of pre-applied orthodontic force on the regeneration of periodontal ligament (PDL) tissues and the underlying mechanisms in tooth replantation. Methods: Orthodontic force (50 cN) was applied to the left maxillary first molars of 7-week-old male Sprague-Dawley rats (n = 32); the right maxillary first molars were left untreated to serve as the control group. After 7 days, the first molars on both sides were fully luxated and were immediately replanted in their original sockets. To verify the effects of the pre-applied orthodontic force, we assessed gene expression by using microarray analysis and real-time reverse transcription polymerase chain reaction (RT-PCR), cell proliferation by using proliferating cell nuclear antigen (PCNA) immunofluorescence staining, and morphological changes by using histological analysis. Results: Application of orthodontic force for 7 days led to the proliferation of PDL tissues, as verified on microarray analysis and PCNA staining. Histological analysis after replantation revealed less root resorption, a better arrangement of PDL fibers, and earlier regeneration of periodontal tissues in the experimental group than in the control group. For the key genes involved in periodontal tissue remodeling, including CXCL2, CCL4, CCL7, MMP3, PCNA, OPG, and RUNX2, quantitative RT-PCR confirmed that messenger RNA levels were higher at 1 or 2 weeks in the experimental group. Conclusions: These results suggest that the application of orthodontic force prior to tooth replantation enhanced the proliferation and activities of PDL cells and may lead to higher success rates with fewer complications.

A Study on Alcoholics Living like a Family in the Jokbang Village: Focusing on 'Relationship' and 'Emotional Bond' (가족처럼 살아가는 쪽방촌 알코올 의존자들의 일상 탐구: '관계'와 '유대감'을 중심으로)

  • Choi, Mi Kyung;Sang, Chong Ryel
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.5
    • /
    • pp.235-242
    • /
    • 2019
  • we explored the case of 'H-Community', a private organization that supports alcohol-dependent homeless people living in the Jokbang village, based on the awareness that "the key to social assistance for alcohol-dependent homeless may be an influential relationship to replace the role of their families." The data collection and analysis followed the research that Spradley presented, and the result was 'living in the balance rather than the great affection'. However, the density of the relationship and emotional bond appeared different, which had something to do with their respective life processes and their health, age and economic conditions. These differences were categorized and suggested as arguments through 'a family-alternative relationship', 'emotional bond' and 'participation'. Based on the results, the conclusions presented the implications needed for alcohol-dependent homeless people.

Military Application of Two-factor Authentication to Data Leakage and Access Prevention (데이터 유출 및 접근방지를 위한 이중 인증방식의 군(軍) 적용방안)

  • Jung, Ui Seob;Kim, Jee Won;Kim, Jae Hyun;Jeong, Chan ki
    • Convergence Security Journal
    • /
    • v.18 no.5_2
    • /
    • pp.21-27
    • /
    • 2018
  • Most of the Internet users in Korea are issued certificates and use them for various tasks. For this reason, it is recommended that accredited certification authorities and security related companies and use public certificates on USB memory and portable storage devices rather than on the user's desktop. Despite these efforts, the hacking of the certificate has been continuously occurring and the financial damage has been continuing. Also, for security reasons, our military has disabled USB to general military users. Therefore, this study proposes a two-factor method using the unique information of the USB memory and the PC which is owned by the user, and suggests a method of managing the private key file secure to the general user. Furthermore, it will be applied to national defense to contribute to the prevention of important data and prevention of access by unauthorized persons.

  • PDF

Exploring Discourse and Issue on the Policy of England Greenbelt - Delivering Opportunities for Housing Development and Recreation - (잉글랜드 그린벨트 정책 담론과 쟁점 분석 - 주택 개발과 여가 기회를 중심으로 -)

  • Nam, Jin-Vo
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.24 no.3
    • /
    • pp.1-18
    • /
    • 2021
  • England's green belt policy as it delivered its framework to designating the development restriction zones(DRZ) in Korea is the key to address issues which try to change green belt boundary or/and housing development. Therefore it should necessarily be reviewed on the understanding of how England has been formulating a national policy to deal with the issues focusing on opportunities for housing development and recreation. This study explored the discourse and framework of England's green belt policy as well as driver changes of housing development and recreation. Results show several characteristics of England's green belt policy which are civil society consensus on conservation and management, limited small-scale housing development through management of release rates, a systematic procedure for application and approval, open-recreation space expansion and utilisation under the premise of conservation of natural green areas, and management structure by the involvement of NGO organisations. Therefore, five suggestions can be delivered to developing Korea's DRZ frameworks: first, preceding social consensus on the preservation value of development-restricted zones, second, addressing housing shortages in different alternatives e.g.) environmental-friendly small-scale housing, third, institutionalising the total proportion of release, fourth, establishing an open-recreation space, fifth, introducing expanded public-private partnerships. Ultimately securing the legitimacy of the nation's development-restricted zone system can contribute positively to the environment preservation and human health by promoting public leisure activities in terms of the recent increase in external activities caused by the Covid-19 crisis. Concluding remarks are here that the understanding of England's green belt policy can be delivered to and help formulate domestic policy addressing current issues.

Non-Interactive Oblivious Transfer Protocol based on EIGamal in WAP (WAP에서 사용 가능한 ElGamal 기반의 비대화형 불확정 전송 프로토콜)

  • 정경숙;홍석미;정태충
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.11-18
    • /
    • 2003
  • As the Internet moves to mobile environment, one of the most serious problems for the security is to required a new security Protocol with safety and efficiency. To solve the problem. we Propose a new Protocol that reduces the communication franc and solves the problem associated with the private security keys supplied by the trusted third party. The protocol is a non-Interactive oblivious transfer protocol, based on the EIGamal public-key algorithm. Due to its Non-Interactive oblivious transfer protocol, it can effectively reduce communication traffic in server-client environment. And it is also possible to increase the efficiency of protocol through the mechanism that authentication probability becomes lower utilizing a challenge selection bit. The protocol complexity becomes higher because it utilizes double exponentiation. This means that the protocol is difficult rather than the existing discrete logarithm or factorization in prime factors. Therefore this can raise the stability of protocol.

Security Analysis of ElGamal-Type Signature Scheme Using Integer Decomposition (정수의 분해를 이용한 ElGamal형 서명기법의 안전성 분석)

  • 이익권;김동렬
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.2
    • /
    • pp.15-22
    • /
    • 2004
  • For an ElGamal-type signature scheme using a generate g of order q, it has been well-known that the message nonce should be chosen randomly in the interval (0, q-1) for each message to be signed. In (2), H. Kuwakado and H. Tanaka proposed a polynomial time algorithm that gives the private key of the signer if two signatures with message nonces 0<$k_1$, $k_2$$\leq$Ο(equation omitted) are available. Recently, R. Gallant, R. Lambert, and S. Vanstone suggested a method to improve the efficiency of elliptic curve crytosystem using integer decomposition. In this paper, by applying the integer decomposition method to the algorithm proposed by Kuwakado and Tanaka, we extend the algorithm to work in the case when |$k_1$ |,|$k_2$, |$\leq$Ο(equation mitted) and improve the efficiency and completeness of the algorithm.

A Study on Timeliness Advance Increment of Certificate Verification Using an Observer (Observer를 이용한 인증서 검증의 적시성 증대에 관한 연구)

  • 권오인;김진철;오영환
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.4
    • /
    • pp.25-37
    • /
    • 2004
  • A certificate is expected to use for its entire validity period. However, a false information record of user and compromise of private key may cause a certificate to become invalid prior to the expiration of the validity period. The CA needs to revoke the certificate. The CA periodically updates a signed data structure called a certificate revocation list(CRL) at directory server. but as CA updates a new CRL at directory server. the user can use a revoked certificate. Not only does this paper analyzes a structure of CRL and a characteristic of certificate status conviction, OCSP method but also it proposes a new certificate status verification method adding an observer information in handshake process between user and server.

Message Authentication Code based on k-invertible Matrices (k-역행렬을 이용한 메시지 인증 기법)

  • Lee Hee Jung;Kim Tae Gwon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.105-110
    • /
    • 2004
  • MAC is used for data origin authentication or message integrity protection. In Crypto'03 Cary and Venkatesan introduced new MAC based on unimodular matrix groups. It is to encrypt messages using private keys and to encrypt them again using public keys which are matrices whose determinants are $\pm$1. These matrices have property called k-invertible. This k effects on the collision probability of this new MAC. The smaller k is, the less collisions occur. Cary shows 6-invertible matrices, and 10-invertible matrices whose components are only 1, 0, -1. In this paper we figure out sufficient conditions about choosing 4 matrices among special 22 matrices. Also, we introduce 5-invertible matrices whose components are 1, 0, -1. Those have better efficiency and security.