• Title/Summary/Keyword: Protection Criteria

Search Result 541, Processing Time 0.022 seconds

A Study on Establishment of Basic Safety and Essential Performance Criteria of Mobile Computed Tomography (이동형 전산화단층촬영장치의 기본 안전 및 필수 성능 기준을 마련하기 위한 연구)

  • Kim, Eun Hye;Park, Hye Min;Kim, Jung Min
    • Journal of radiological science and technology
    • /
    • v.44 no.3
    • /
    • pp.261-267
    • /
    • 2021
  • As the number of Coronavirus Disease-19 (COVID-19) patients increases in a global pandemic situation, the usefulness of mobile computed tomography (CT) is gaining attention. Currently, mobile CT follows the basic safety and essential performance evaluation criteria of whole-body or limited-view X-ray CT in order to obtain device approval and evaluation in the Republic of Korea. Unlike stationary CT, mobile CT is not operated in shielded areas but rather areas such as intensive care units, operating rooms, or isolation rooms. Therefore, it requires a different basic safety and essential performance evaluation standard than stationary CT. In this study, four derived basic safety evaluation criteria related to electrical, mechanical, and radiation safety were included (dose indication test, protection against stray radiation, safety measures against excessive X-rays, half-value layer measurement); and seven essential performance evaluation criteria were included (tube voltage accuracy, mAs accuracy, radiation dose reproducibility, CT number of water, noise, uniformity, and spatial resolution); total eleven basic safety and essential performance evaluation criteria were selected. This study aims to establish appropriate basic safety and essential performance evaluation criteria for simultaneously obtaining images with diagnostic value and reducing the exposure of nearby patients, medical staff, and radiologic technologists during the use of mobile CT.

A Study on Establishment of Essential Performance Evaluation Criteria for C-arm Computed Tomography (C-arm CT의 필수 성능평가 기준 마련을 위한 연구)

  • Kim, Eun-Hye;Park, Hye-Min;Kim, Jung-Min
    • Journal of radiological science and technology
    • /
    • v.45 no.2
    • /
    • pp.127-134
    • /
    • 2022
  • In order to overcome the image quality limitations of the conventional C-arm, a flat panel detector (FPD) is used to enhance spatial resolution, detective quantum efficiency, frame rate, and dynamic range. Three-dimensional (3D) visualized information can be obtained from C-arm computed tomography (CT) equipped with an FPD, which can reduce patient discomfort and provide various medical information to health care providers by conducting procedures in the interventional procedure room without moving the patient to the CT scan room. Unlike a conventional C-arm device, a C-arm CT requires different basic safety and essential performance evaluation criteria; therefore, in this study, basic safety and essential performance evaluation criteria to protect patients, medical staff, and radiologists were derived based on International Electrotechnical Commission (IEC) standards, the Ministry of Food and Drug Safety (MFDS) standards in Korea, and the rules on the installation and operation of special medical equipment in Korea. As a result of the study, six basic safety evaluation criteria related to electrical and mechanical radiation safety (leakage current, collision protection, emergency stopping device, overheating, recovery management, and ingress of water or particulate matter into medical electrical (ME) equipment and ME systems: footswitches) and 14 essential performance evaluation criteria (accuracy of tube voltage, accuracy of tube current, accuracy of loading time, accuracy of current time product, reproducibility of radiation output, linearity and consistency in radiography, half layer value in X-ray equipment, focal size and collimator, relationship between X-ray field and image reception area, consistency of light irradiation versus X-ray irradiation, performance of the mechanical device, focal spot to skin distance accuracy, image quality evaluation, and technical characteristic of cone-beam computed tomography) were selected for a total of 20 criteria.

Engineering Technology Far-end Telecontrol Cathodic Protection on the Structure of Jetty Bridge Cap Beams

  • Liu, Yi-Hsiung;Lim, Pau-Yee;Shih, Chien-Chis
    • Corrosion Science and Technology
    • /
    • v.2 no.1
    • /
    • pp.47-52
    • /
    • 2003
  • 23 cap beams on the 1 Km length jetty bridge in Shin-da power plant (Taipower co., Taiwan) utilize far-end telecontrol cathodic protection technology which is the first case ever used in Taiwan. The system comprises cathodic protection system and te1econtrol monitoring system. The control and monitoring such as protection current adjustment, protection potential and depolarization measurement of the 23 cap beams can be adjusted through system telecontrol operations. Thereby allows monitoring and control of the 23 anode zones in a convenient and cost effective way. This system is at present still in its best running condition since Sept. 1997 when it was completed. All the 23 cap beams can achieve the 100 mV depolarization potential criteria of protection. It meet the specifications of reinforced concrete cathodic protection standard and proved to be very excellent.

Electrical Environmental Effects of Power System (전력설비의 전기환경장해)

  • ;申玖容
    • The Proceedings of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.13 no.2
    • /
    • pp.156-156
    • /
    • 1999
  • This paper describes the characteristics and the criteria of electrical environmental effects produced from power system especially transmission line. Audible noise radio and TV interference, electric and magnetic inductions which are main items for optimal conductor selection as well as major contributors to the community complaint of electrical environmental problem, are surveyed and studied comparing with the criteria or the environmental protection regulation of domestic and foreign countries. As a result a domestic criteria of electrical environmental on power system was suggested.

A Protection Profile for Access Control Based Database Security System (접근제어형 데이터베이스 보안 시스템의 보호프로파일)

  • Jeon, Woong-Ryul;Jo, Hea-Suk;Kim, Seung-Joo;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.109-113
    • /
    • 2007
  • With increasing the mont of processed information over the network, the importance of database system increases rapidly. There are two types of security system for database, access control and data encryption. However, it is hard to evaluate security of database systems using the Common Criteria(CC) as there is no protection profile(PP) for these systems. In this paper, we propose a protection profile for secure database systems which can be used in formal evaluation using the Common Criteria. The proposed protection profile can be used by both developer and consumer to evaluate security of database systems.

Attitude of the Korean dentists towards radiation safety and selection criteria

  • Lee, Byung-Do;Ludlow, John B.
    • Imaging Science in Dentistry
    • /
    • v.43 no.3
    • /
    • pp.179-184
    • /
    • 2013
  • Purpose: X-ray exposure should be clinically justified and each exposure should be expected to give patients benefits. Since dental radiographic examination is one of the most frequent radiological procedures, radiation hazard becomes an important public health concern. The purpose of this study was to investigate the attitude of Korean dentists about radiation safety and use of criteria for selecting the frequency and type of radiographic examinations. Materials and Methods: The study included 267 Korean dentists. Five questions related to radiation safety were asked of each of them. These questions were about factors associated with radiation protection of patients and operators including the use of radiographic selection criteria for intraoral radiographic procedures. Results: The frequency of prescription of routine radiographic examination (an example is a panoramic radiograph for screening process for occult disease) was 34.1%, while that of selective radiography was 64.0%. Dentists' discussion of radiation risk and benefit with patients was infrequent. More than half of the operators held the image receptor by themselves during intraoral radiographic examinations. Lead apron/thyroid collars for patient protection were used by fewer than 22% of dental offices. Rectangular collimation was utilized by fewer than 15% of dental offices. Conclusion: The majority of Korean dentists in the study did not practice radiation protection procedures which would be required to minimize exposure to unnecessary radiation for patients and dental professionals. Mandatory continuing professional education in radiation safety and development of Korean radiographic selection criteria is recommended.

A Threats Statement Generation Method for Security Environment of Protection Profile (PP의 보안환경을 위한 위협문장 생성방법)

  • 고정호;이강수
    • The Journal of Society for e-Business Studies
    • /
    • v.8 no.3
    • /
    • pp.69-86
    • /
    • 2003
  • A Protection Profile(PP) is a common security and assurance requirements for a specific class of Information Technology security products such as firewall and smart card. A PP should be included "TOE(Target of Evaluation) Security Environment", which is consisted of subsections: assumptions, treat, organizational security policies. This paper presents a new threats statement generation method for developing TOE security environment section of PP. Our survey guides the statement of threats in CC(Common Criteria) scheme through collected and analysed hundred of threat statements from certified and published real PPs and CC Tool Box/PKB that is included a class of pre-defined threat and attack statements. From the result of the survey, we present a new asset classification method and propose a threats statement generation model. The former is a new asset classification method, and the later is a production rule for a well formed statement of threats.

  • PDF

A Study on Protection Profile for Multi-function Devices (다기능 주변기기에 대한 보호프로파일에 관한 연구)

  • Lee, Dongubm
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1257-1268
    • /
    • 2015
  • Multi-functional devices was originally an equipment performing image processing, but function transmitting image data digitized by combining fax function and function of network are added and it was rapidly developed. Also, functions of internet application, application expansion, remote sharing and image treatment were added to multi-functional devices. But, multi-functional devices can cause security vulnerability such as data exposure, eavesdropping, etc. because of the threatening by network connection. Therefore, common criteria of multi-functional devices are necessary, but there is no protection profile for multi-functional devices now. Therefore, concrete standards of evaluation are not applied to evaluate secure for products, so it was difficult to maintain uniformity of evaluation quality. Therefore, this paper developed protection profile for multi-functional devices based on common criteria of evaluation so as to analyze threats of multi-functional devices and use secure multi-functional devices.

Analysis on Vulnerability of Secure USB Flash Drive and Development Protection Profile based on Common Criteria Version 3.1 (보안 USB 플래시 드라이브의 취약점 분석과 CC v3.1 기반의 보호프로파일 개발)

  • Jeong, Han-Jae;Choi, Youn-Sung;Jeon, Woong-Ryul;Yang, Fei;Won, Dong-Ho;Kim, Seung-Joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.6
    • /
    • pp.99-119
    • /
    • 2007
  • The USB flash drive is common used for portable storage. That is able to store large data and transfer data quickly and carry simply. But when you lose your USB flash drive without any security function in use, all stored data will be exposed. So the new USB flash drive supported security function was invented to compensate for the problem. In this paper, we analyze vulnerability of 6 control access program for secure USB flash drives. And we show that exposed password on communication between secure USB flash drive and PC. Also we show the vulnerability of misapplication for initialization. Further we develop a protection profile for secure USB flash drive based on the common criteria version 3.1. Finally, we examine possible threat of 6 secure USB flash drives and supports of security objectives which derived from protection profile.

Security Evaluation Criteria for Firewalls in Kirea

  • Lee, Cheol-Won;Hong, Ki-Yoong;Kim, Hak-Beom;Oh, Kyeong-Hee;Kwon, Hyun-Jo;Sim, Joo-Geol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.8 no.3
    • /
    • pp.63-78
    • /
    • 1998
  • Recently, to use the evaluated firewall is recognized as a solution to achieve the security and reliability for government and organizarions in Korea. Results of firewall evaluation using ITSEC(Information Technology Security Evaluation Criteria) and CCPP(Common Criteria Protection Peofile)have been announced. Because there are problems to apply ITSECor CCPP for the firewall evaluation in korea environment, korea government and korea Information security Agency (KISA) decided to develop our own security dvaluation critrtia fir firewalls.As a result of the efforts, Korea firewall security evaluation criteria has been published on Feb. 1998. In this paper, we introduce Korea security evaluation criteria for firewalls. The ceiteria consists of functional and assurance requirements that are compatible with CC Evaluation Assurance Levels(EALs)