• Title/Summary/Keyword: Protection requirements

Search Result 562, Processing Time 0.021 seconds

Black box-assisted fine-grained hierarchical access control scheme for epidemiological survey data

  • Xueyan Liu;Ruirui Sun;Linpeng Li;Wenjing Li;Tao Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.9
    • /
    • pp.2550-2572
    • /
    • 2023
  • Epidemiological survey is an important means for the prevention and control of infectious diseases. Due to the particularity of the epidemic survey, 1) epidemiological survey in epidemic prevention and control has a wide range of people involved, a large number of data collected, strong requirements for information disclosure and high timeliness of data processing; 2) the epidemiological survey data need to be disclosed at different institutions and the use of data has different permission requirements. As a result, it easily causes personal privacy disclosure. Therefore, traditional access control technologies are unsuitable for the privacy protection of epidemiological survey data. In view of these situations, we propose a black box-assisted fine-grained hierarchical access control scheme for epidemiological survey data. Firstly, a black box-assisted multi-attribute authority management mechanism without a trusted center is established to avoid authority deception. Meanwhile, the establishment of a master key-free system not only reduces the storage load but also prevents the risk of master key disclosure. Secondly, a sensitivity classification method is proposed according to the confidentiality degree of the institution to which the data belong and the importance of the data properties to set fine-grained access permission. Thirdly, a hierarchical authorization algorithm combined with data sensitivity and hierarchical attribute-based encryption (ABE) technology is proposed to achieve hierarchical access control of epidemiological survey data. Efficiency analysis and experiments show that the scheme meets the security requirements of privacy protection and key management in epidemiological survey.

Development of Walk-down Performance Procedures for Fire Modeling of Nuclear Power Plants based on Deterministic Fire Protection Requirements (결정론적 화재방호요건을 기반으로 한 원자력발전소 화재모델링 현장실사 수행절차 개발)

  • Moon, Jongseol;Lee, Jaiho
    • Fire Science and Engineering
    • /
    • v.33 no.6
    • /
    • pp.43-52
    • /
    • 2019
  • A walk-down procedure for fire modeling of nuclear power plants, based on deterministic fire protection requirements, was developed. The walk-down procedure includes checking the locations of safety shutdown equipment and cables that are not correctly indicated on drawings and identifying the existence and location of combustibles and ignition sources. In order to verify the performance of the walk-down procedure developed in this study, a sample of important equipment and cables were selected for hypothetical multiple spurious operation (MSO) scenarios. In addition, the hypothetical fire modeling scenarios were derived from the selected safe shutdown equipment and cables and an actual walk-down was conducted. The plant information collected through the walk-down was compared to the information obtained from the drawings, so that the collected information may be used as input values for the fire modeling.

Evaluation of International BIM Standard Contracts to establish BIM Copyrights and Operational Protocols in Korea (국제 BIM 표준계약서 분석을 통한 국내 BIM 저작권 보호 및 운용 체계 수립에 관한 연구)

  • Koo, Bonsang;Shin, Byungjin
    • Korean Journal of Construction Engineering and Management
    • /
    • v.17 no.6
    • /
    • pp.24-30
    • /
    • 2016
  • Building Information Modeling, and its associated work practices, requires project participants to share not only 3D geometric data, but also information in the model that may be considered proprietary and even trade secrets. Thus protection of intellectual property, or BIM copyrights, must be in place for participants to share proprietary information among project stakeholders. Currently Korea does not have adequate copyright laws or mechanisms to provide such protection. This research examined three BIM copyright legal documents, namely U.S.' ConsensusDOCS 301, AIA Document E203/G202, and U.K.'s CIC BIM Protocol to determine how copyright protection is realized, and to formulate appropriate stipulations within the Korean construction context. The resultant requirements include stipulating ownership at to the BIM originator, adopting a license-sublicense scheme, employing a federated model, and use of a formal model delivey table to allocate responsibilities. Given Korea's adoption stage, liability should be minimal, and license revocation should be allowed if payments are not met. The three BIM legal documents focus on practical measures that allow participants to customize requirements for individual projects, and such conventions should be emulated in Korea.

A Study of Protection Profile and Analysis of Related Standard for Internet Banking Systems (인터넷 뱅킹 시스템 관련 표준 분석 및 보호프로파일 개발에 관한 연구)

  • Jo, Hea-Suk;Kim, Seung-Joo;Won, Dong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.17C no.3
    • /
    • pp.223-232
    • /
    • 2010
  • Due to the advance of Internet, offline services are expanded into online services and a financial transaction company provides online services using internet baning systems. However, security problems of the internet banking systems are caused by a lack of security for developing the internet banking systems. Although the financial transaction company has applied existing internal and external standards, ISO 20022, ISO/IEC 27001, ISO/IEC 9789, ISO/IEC 9796, Common Criteria, etc., there are still vulnerabilities. Because the standards lack in a consideration of security requirements of the internet banking system. This paper is intended to explain existing standards and discusses a reason that the standards have not full assurance of security when the internet baning system is applied by single standard. Moreover we make an analysis of a security functions for the internet baning systems and then selects the security requirements. In this paper, we suggest a new protection profile of the internet baning systems using Common Criteria V.3.1 from the analysis mentioned above.

Development of Managing Security Services System Protection Profile (보안관제시스템 보호프로파일 개발)

  • Son, Seung-Wan;Kim, Kwang-Seok;Choi, Jung-Won;Lee, Gang-Soo
    • Journal of Digital Contents Society
    • /
    • v.16 no.2
    • /
    • pp.345-353
    • /
    • 2015
  • Security Management System is a system which operates in the security control center for security control. All living things across the Internet in recent years, with the rapid increase in the subscriber base has increased the need for network security dramatically depending on yirueojim through web services, thus cyber security sheriff, I have a big issue to build a security management system, each agency and perform control tasks. But the security functional requirements for security management system would not specified exactly, in developing a security management system to build and design a situation that PP's needs require a lot of trouble. In this paper, we develop a Managed Security System Protection Profile for the security functional requirements specification of the security management system.

Optimal Monitoring Intervals and MDA Requirements for Routine Individual Monitoring of Occupational Intakes Based on the ICRP OIR

  • Ha, Wi-Ho;Kwon, Tae-Eun;Jin, Young Woo
    • Journal of Radiation Protection and Research
    • /
    • v.45 no.2
    • /
    • pp.88-94
    • /
    • 2020
  • Background: The International Commission on Radiological Protection (ICRP) has recently published report series on the occupational intakes of radionuclides (OIR) for internal dosimetry of radiation workers. In this study, the optimized monitoring program including the monitoring interval and the minimum detectable activity (MDA) of major radionuclides was suggested to perform the routine individual monitoring of internal exposure based on the ICRP OIR. Materials and Methods: The derived recording levels and the critical monitoring quantities were reviewed from international standards or guidelines by the International Atomic Energy Agency (IAEA), the International Organization for Standardization (ISO), and the European Radiation Dosimetry Group (EURADOS). The OIR data viewer provided by ICRP was used to evaluate the monitoring intervals and the MDA, which are derived from the reference bioassay functions and the dose coefficients. Results and Discussion: The optimal monitoring intervals were determined taking account of two requirement conditions on the potential intake underestimation and the MDA values. The MDA requirement values of the selected radionuclides were calculated based on the committed effective dose from 0.1 mSv to 5 mSv. The optimized routine individual monitoring program was suggested including the optimal monitoring intervals and the MDA requirements. The optimal MDA values were evaluated based on the committed effective dose of 0.1 mSv. However, the MDA can be adjusted considering the practical operation of the routine individual monitoring program in the nuclear facilities. Conclusion: The monitoring intervals and the MDA as crucial factors for the routine monitoring were described to suggest the optimized routine individual monitoring program of the occupational intakes. Further study on the alpha/beta-emitting radionuclides as well as short lived gamma-emitting nuclides will be necessary in the future.

Performance Evaluation of Protective Clothing Materials for Welding in a Hazardous Shipbuilding Industry Work Environment (조선업의 유해 작업환경 대응을 위한 용접 보호복 소재의 성능평가 연구)

  • Kim, Min Young;Bae, Hyun Sook
    • Fashion & Textile Research Journal
    • /
    • v.15 no.3
    • /
    • pp.452-460
    • /
    • 2013
  • This study conducted a performance evaluation of protective clothing materials used for welding in a hazardous shipbuilding industry work environment. The welding process was selected as the one that most requires industrial protective clothing according to work environment characteristics. Flame proofing and convection heat protection performance (HTI) in the heat transfer characteristics of protective clothing material were indicated in the order of SW1(Oxidant carbon)>SW2(silica coated Oxidant carbon)>SW4(Oxidant carbon/p-aramid)>SW3(flame proofing cotton). However, radiant heat protection performance (RHTI) and the heat transfer factor (TF) were indicated in the order of SW1>SW4>SW2>SW3 and showed different patterns from the convection heat protection performance. SW1 showed superior air permeability and water vapor permeability. The tensile strength and tear strength of welding protective clothing material were indicated in the order of SW4>SW2>SW3>SW1 and showed that a blend fabric of p-aramid was the most superior for the mechanical properties of SW4. SW1 had excellent heat transfer properties in yet met the minimum performance requirements of tensile strength proved to be inappropriate as being a material for welding protective clothing. The abrasion resistance of woven fabric proved superior compared to nonwoven fabric; however, seam strength and dimensional change both met the minimum performance requirements and indicated that all samples appeared non-hazardous. Finally, oxidant carbon/p-aramid blend fabric appeared appropriate as a protective clothing materials for welding.

A Study on Data Compliance Measures of Digital Healthcare Service - Focusing on Personal Information Lifecycle (디지털 헬스케어 서비스의 데이터 컴플라이언스 방안에 관한 연구 - 개인정보 라이프사이클을 중심으로)

  • Jung, Jaeeun;Yang, Jinhong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.2
    • /
    • pp.134-143
    • /
    • 2022
  • 'Data' is the key component that leads Digital Healthcare. Most of the Healthcare Data is personal information of data subject and includes Sensitive Information. It is very important for companies to use data lawfully and safely during the lifecycle of data collection, use, provision, and destruction. However, small and medium-sized enterprises(SMEs), ventures, and startups, which account for 78% of the Healthcare Services Industry, have had difficulties in performing tasks related to personal information protection. The personal Information Protection Act's requirements depending on the purpose of using Personal Information are different. Also, the requirements for each personal information lifecycle are varied. Therefore, this study suggests six purposes for companies to use healthcare data. It examines the considerations during the lifecycle in which personal information is collected to be destroyed.

Evaluation of Respiratory Protection Program in Petrochemical Industries: Application of Analytic Hierarchy Process

  • Kolahi, Hadi;Jahangiri, Mehdi;Ghaem, Haleh;Rostamabadi, Akbar;Aghabeigi, Mandana;Farhadi, Payam;Kamalinia, Mojtaba
    • Safety and Health at Work
    • /
    • v.9 no.1
    • /
    • pp.95-100
    • /
    • 2018
  • Background: Respiratory protection equipment (RPE) is the last resort to control exposure to workplace air pollutants. A comprehensive respiratory protection program (RPP) ensures that RPE is selected, used, and cared properly. Therefore, RPP must be well integrated into the occupational health and safety requirements. In this study, we evaluated the implementation of RPP in Iranian petrochemical industries to identify the required solutions to improve the current status of respiratory protection. Methods: This cross-sectional study was conducted among 24 petrochemical industries in Iran. The survey instrument was a checklist extracted from the Occupational Safety and Health Administration respiratory protection standard. An index, Respiratory Protection Program Index (RPPI), was developed and weighted by analytic hierarchy process to determine the compliance rate (CR) of provided respiratory protection measures with the RPP standard. Data analysis was performed using Excel 2010. Results: The most important element of RPP, according to experts, was respiratory hazard evaluation. The average value of RPPI in the petrochemical plants was $49{\pm}15%$. The highest and lowest of CR among RPP elements were RPE selection and medical evaluation, respectively. Conclusion: None of studied petrochemical industries implemented RPP completely. This can lead to employees' overexposure to hazardous workplace air contaminants. Increasing awareness of employees and employers through training is suggested by this study to improve such conditions.

Characteristics of Rainfall Protection for Stacks (굴뚝의 우수유입방지 특성)

  • Kim, Jong-Chul;Kim, Tae-Hyeung
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.10 no.1
    • /
    • pp.18-31
    • /
    • 2000
  • A stack must be designed to 1) reduce or eliminate rainfall or snowfall into a industrial exhaust system, 2) minimize a resistance to flow, 3) maximize the vertical dispersion of the contaminated air and 4) minimize maintenance. The weather cone stacks and the elbow-type stacks are very popular in Korea. But they add some resistance to the exhaust system resulting in reduction of air flow rate, but also deflect the noxious contaminants downward in undiluted form. To solve these problems, ACGIH (American Conference of Governmental Industrial Hygienists) suggested the vertical discharge stack with concentric space between the upper stack with larger diameter and the lower stack with smaller diameter. The preliminary test showed that the vertical discharge stacks did not have the good rainfall protection. The reversed cone were newly devised to satisfy the requirements for the good stack. Subsequently, the amount of rain being penetrated through the stacks was measured while the stacks were simultaneously and naturally exposed to rain in the same area outside. Test results indicate that none of the stacks tested completely exclude rain. The efficiency of rainfall protection and the pressure loss coefficient were compared. The temporary conclusion was reached to the point that the reversed cone stack is the best one. Further research is underway.

  • PDF