• Title/Summary/Keyword: Proxy

Search Result 1,306, Processing Time 0.039 seconds

Analysis and countermeasure of causes of inducing violence of private security companies on the actual sites of administrative execution by proxy (행정대집행 현장에서 민간경비업체의 폭력 유발 원인 분석과 대책)

  • Choi, Kee-Nam
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.119-141
    • /
    • 2009
  • Administrative execution by proxy is one of forced executions of administration and is also called as "enforced execution by proxy" in which administration institutions or the third party executes by proxy on behalf of parties who did not execute obligations under administration law and files claims to compensate expenses required in the proxy execution. Despite the actual site of administrative execution by law, social problems are generated because various violence and behaviors of infringement of human rights between executer and obligator are rampant and thus causing human damages since forced execution by physical force is carried out and cases of police indictments and petition to human rights committee are gradually increasing. Majority of people mobilized in this actual site of violence are supplied by private security companies which provide service contract and mobilization of people without qualification of guards or security service and irrational execution by proxy and violent actions by so-called service hooligans connected to violence organizations are now becoming social issues. In these actual sites of violence, structurally very complicated problems such as economic rights, right of residence, struggle for living, and intervention by outsiders are contained. This thesis has analyzed causes of outbreaks of violence and discussed about improvement countermeasure by paying attention to mobilization of people by private security companies. As the result, through revision and improvement of laws and systems, execution institution and policemen must be present at actual sites of execution by proxy to control physical execution of private security companies to be carried out legally and when violent collisions are occurring, it shall be stipulated that police should immediately intervene. Practices of execution by proxy of execution administration institutions shall be avoided and causes of occurrences of violence shall be eliminated by discrete decisions of execution by proxy, elimination of service contract conditions focused on accomplishments, and stipulation of responsibility of execution institutions when problems occur. Practices of solving petitions through collective actions of obligators shall be eliminated and strict enforcement of laws such as disturbance of official execution or compensation claims for expenses of execution by proxy must be carried out and intervention by the third parties must be intercepted. Mobilization of manpower by security companies shall be limited to people with prior registration who have acquired and finished qualification and education by security business law and before putting them on actual sites, it shall be obliged that execution plan with clear written records of working location, mission, and work rules must be submitted in advance to police station in charge and also they must be controlled to follow laws and statutes such as uniform and equipments. In addition, personal criminal responsibility for violent actions must be clearly stipulated and advanced securing soundness of security companies such as limits of service contracts with records of accidents is required. Order placement behaviors of special organizations under the pretext of rehabilitation business must be eradicated and companies with capability and strong intention of observation of laws must be able to receive orders by intercepting chains of contracts and sub-contracts. Issues of improvement countermeasure of social problem, living, and compensation including rights of residence and environment are excluded from the discussion.

  • PDF

Extended Multi-level Proxy Signature based on Proxy Certificate (위임 인증서를 기반으로 한 다단계 대리서명 방식의 확장)

  • 이여진;김중태;정일용
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.11a
    • /
    • pp.116-119
    • /
    • 2003
  • 대리 서명은 디지털 서명 기술의 응용으로서 Mambo에 의하여 최초로 제안이 되었고, Araki에 의하여 다단계 대리 서명으로 확장되었다. 본 논문에서는 위임 인증서와 서명 검증자의 서명 생성 여부를 원 서명자가 추후 확인하는 프로토콜을 이용하여 부인 봉쇄 및 원 서명자의 보호가 이루어지는 효율적이고 안정적인 다단계 대리 서명 방식을 제안한다.

  • PDF

Proxy Re-encryption 기술

  • Song, You-Jin;Park, Kwang-Young
    • Review of KIISC
    • /
    • v.19 no.5
    • /
    • pp.95-104
    • /
    • 2009
  • 최근 대용량 데이터의 급속한 생성, 유통으로 인해 데이터 서비스 사용자가 증가하고 있다. 이때, 대용량 데이터를 분산 데이터베이스 시스템에 저장 관리하는 경우, 데이터에 대한 위협문제가 발생된다. 본 논문에서는 대용량 데이터를 암호화 하여 관리할 때 복호권한을 위임함으로써 보다 안전하게 데이터를 관리하는 Proxy Re-encryption 기법에 대해 검토한다.

An Open API Proxy Server System for Widget Services (위젯 서비스를 위한 오픈 API 프록시 서버 시스템)

  • Ahn, Byung-Hyun;Lee, Hyuk-Joon;Choi, Yong-Hoon;Chung, Young-Uk
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.9
    • /
    • pp.918-926
    • /
    • 2010
  • A widget is a small application running by the users' favorite services, so they are provided with web contents without explicitly visiting the web site. Although widgets can be easily implemented with Open APIs, only a few web sites provide them because of refactoring the structures of web resource to supply Open APIs to the widget developers. This paper presents an Open API Proxy Server System for widget services. The system consists of two components: an Open API Source Code Generator and an Open API Proxy Server. The Open API Source Code Generator provides a Graphical User Interface (GUI) for users to generate the Open APIs of user's choice and sends the Open API source code generation request to the Open API Proxy Server. The Open API Proxy Server using the HTML Table Processing Library receives the HTML web page from web site and extracts useful information from the target HTML table. The proxy server converts the extracted data into the corresponding XML document which becomes available through the Open API. We verify the operation of the proposed system through experiments with the HTML tables in the example web sites.

A Study on the Agreement and Bias between Parents' Proxy report and Self-report of People with Developmental Disabilities (발달장애인 부모의 대리 의사표시의 정합도와 편향에 관한 연구)

  • Chun, Dong-il;Jeon, Ji-Hye
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.5
    • /
    • pp.201-209
    • /
    • 2019
  • The purpose of this study is to analyze whether parents with developmental disabilities are well represented by the persons with developmental disabilities. Analysis data is based on the data from the Survey on Disability Survey in 2014. We analyzed the consistency and biases of the parent's proxy respondents' opinions by the degree of agreement between the contents of the person with developmental disabilities and the value of items that the parents answered on behalf of the development disabled. First, the parents' proxy respondents responded well to the actual situation such as life satisfaction for the developmental disabled, while the parental proxy respondents showed the positive bias to overestimate the cost items and the negative bias to recognize the discrimination. Second, in relation to independent living, the majority of the parents of the developmental disabled respondents had a high agreement with the developmental disabled person. However, about 5 ~ 10% of the parents' proxy respondents seem to have a tendency to distort the independent living policy by preferring non-standard housing types, unlike those with developmental disabilities. Based on this, it was proposed that the respondents should be able to receive the answers of the possible parties in the future research on desire and independent living related intention toward the developmental disabled, and the research on the matching of the proxy response is needed in a multidimensional manner.

Design of a effective Authorization Mechanism based on Kerberos (커버로스 기반의 효율적인 허가 메커니즘 설계)

  • Kim, Eun-Hwan;Jun, Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.10C no.3
    • /
    • pp.287-294
    • /
    • 2003
  • Authentication and authorization are essential functions for the security of distributed network environment. Authorization is determining and to decide whether a user or process is permitted to perform a particular operation. In this paper, we design an authorization mechanism to make a system more effective with Kerberos for authentication mechanism. In the authorization mechanism, Kerberos server operates proxy privilege server. Proxy privilege server manages and permits right of users, servers and services with using proposed algorithm. Also, privilege attribute certificate issued by proxy privilege server is used in delegation. We designed secure kerberos with proposed functions for effective authorization at the same time authentication of Kerberos mechanism.

A Call Service Content Using WIPI (WIPI를 이용한 콜 서비스 콘텐츠)

  • Kim, Sang-Min;Kim, Su-Yong;Lee, Han-Na;An, Beong-Ku
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.1
    • /
    • pp.107-112
    • /
    • 2010
  • In this paper, we design and implement the contents transferring the location information between a customer and a proxy driver by utilizing 'WIPI.' Customers are able to request a call-service through a client in order to call a proxy driver. And, once a proxy driver who is most adjacent to the customer accepts the order of a call-service from him or her through a location-management server using the concepts of LBS and GPS, 'WIPI' sends the information about the location of the customer to the driver, and also sends information to the custome by calculating the distance from the driver to the customer. This content was modeled based on how information is transferred between a customer and a proxy driver under the mobile circumstance, and also a server and a client, made up from JAVA, were modeled by using SKT emulator.

A Network-based Movement Detection Scheme for Proxy Mobile IPv6 over IEEE802.11 Networks (IEEE 802.11 네트워크에서 Proxy Mobile IPv6의 네트워크기반 이동성 감지 기법)

  • Kim, A-Ram;Han, Youn-Hee;Choi, Hyung-Young;Min, Sung-Gi;You, Heung-Ryeol
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10d
    • /
    • pp.505-509
    • /
    • 2007
  • Proxy Mobile IPv6 (PMIPv6)는 Mobile Node (MN)가 스스로 이동성을 지원하지 않더라도 Mobile Access Gate가 MN대신 이동성을 처리하여 IPv6 이동성을 지원하는 기술이다. 좀 더 향상된 핸드오버 성능을 얻기 위해 Proxy Mobile IPv6에서도 버퍼링을 통한 패킷 손실을 줄이는 기법을 사용할 수 있다. 하지만, IEEE 802.11 네트워크에서는 Handover 발생 직전에 MN이 어떠한 통보도 AP로 하지 않기 때문에 Handover시에 패킷 손실을 줄이기 위한 패킷 버퍼링 방법을 사용하기가 어렵다. 본 논문에서 PMIPv6에서 MAG와 AP가 MN의 이동성을 감지하여 버퍼링을 시작하고 Handover가 발생하였을 경우에 대비해 버퍼링을 하는 Cross-layer 버퍼링 방법을 제안한다. 이를 통해 PMIPv6에서도 MN의 변경 없이 Handover시에 발생하는 패킷 손실을 최소화 할 수 있다. 또한 간단한 성능 비교를 통하여 제안 방법이 기존 PMIPv6보다 우수함을 알 수 있다.

  • PDF

A Proxy-Based Fast Handover Scheme in Mobile WiMAX Networks (Mobile WiMAX에서 Proxy 기반의 고속 핸드오버 방안)

  • Lee, Hwa-Sub;Kim, Bok-Ki;Min, Sang-Won
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.4
    • /
    • pp.65-72
    • /
    • 2009
  • In this paper, we propose a proxy-based fast handover scheme to improve a performance in the mobile WiMAX network using PMIPv6 for supporting the network-layer mobility. In our proposed scheme, we define three link-layer messages and one network-layer message to reduce the handover latency, and propose a buffering mechanism to minimize packet loss and solve out-of-sequence problem. A performance evaluation indicates that the proposed scheme works more efficiently than PMIPv6 in terms of the handover latency and packet loss.

  • PDF

A Web Browser System for Internet TVs based on a Proxy Server (프락시 서버 기반의 인터넷 TV용 웹 브라우저 시스템)

  • Cho, Soo-Sun;Kim, Kyoung-Ill;Mah, Pyeong-Soo
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.8
    • /
    • pp.2442-2451
    • /
    • 2000
  • Recently, there have been some trials to use a TV system as an Internet terminal for easier and more convenient use of Internet. Because a TV Web browser system has a TV display with a set-top box as an execution environment, it has some limits and there are specific requirements. The efficient implementation of the Web browser for TV needs the proxy server that includes HTML conversions for TV environments as well as general cash functions. In order to implement a Web environment on general TV and set-tops, we introduce a distributed structure using a proxy server and propose TV - HTML conversions as an important feature of the proxy server.

  • PDF