• Title/Summary/Keyword: Public Authority

Search Result 506, Processing Time 0.027 seconds

A Study on the Authority of Private Security Personnel (민간경비원의 권한에 대한 연구)

  • Choi, Sun-Woo
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.177-199
    • /
    • 2009
  • In this study, I would try to observe the scopes and related matters of the authority of private security personnel based on the basic discussion about the identity of private security. Everybody knows, the problems of private personnel have been mainly discussed in the relations of the public police. Because the roles of private personnel are similar to the police, and in the perspective of the law, private security are regulated by the police. When we compared with the police, the scopes of authorities of private personnel are considered in several points. First, most private personnel are just only 'citizen', so they can exercise the authority as citizen. It can include self-defense, self-help. flagrante delicto arrest. But when discuss the authority in the scopes of a possessionary right or managemental right, the authority of private personnel can be extended somewhat. Moreover, when private personnel are delegated by the special laws, their authority are extended much more. Finally, when the whole authority are delegated by such as the privatization, private personnel authority can be nearly same to the police. But, it can be considered that the degrees of the delegated authority are flexible. And the exercise of the authority must be performed in the limit that not infringe the individual freedom and rights. It seems to me that the degrees of fairness in use of authorities and it's a permitted limit are set forth a premise not only the legitimate base but also judicial judgement. Therefore, the attitudes of the courts related the exercise of authority are very important. And the growth of private security and the extension of authority followed are inevitably accompany the various problems of responsibility, so it must be considered about that in many perspectives.

  • PDF

Development of a Pleasure Public Motor Boat (기술논문 - 해양레저용 보급형 모터보트 개발(I))

  • Kwon, Soo-Yeon;Jeong, U.C.
    • Journal of Korea Ship Safrty Technology Authority
    • /
    • s.32
    • /
    • pp.30-45
    • /
    • 2012
  • 본 연구는 국내 보급을 위한 해양레저용 모터보트 개발을 목표로 하여 모터보트 개발 전과정에 대한 기반기술을 구축하고자 한다. 이번 호에서는 해양레저에 대한 국내외현황 및 보급을 위한 국내 선호도 조사결과, 개발선의 주요제원의 선정, 선형설계, 모형시험 및 특허출원에 대한 부분에 대해 기술하였다.

  • PDF

Development of a Pleasure Public Motor Boat (해양레저용 보급형 모터보트 개발(II))

  • Kwon, Soo-Yeon;Lee, Kyoung-Hoon
    • Journal of Korea Ship Safrty Technology Authority
    • /
    • s.33
    • /
    • pp.2-11
    • /
    • 2012
  • 본 연구는 국내 보급을 위한 해양레저용 모터보트 개발을 목표로 하여 모터보트 설계부터 건조까지 개발 전과정에 대한 기반기술을 구축하고자 한다. 이번 호에서는 지난 호에 이어 일반배치도 및 구조도면 작성부분과 선박의 구매나 판매시 고객의 의견을 바로 가시화하여 확인할 수 있어 활용도가 높을 것으로 예상이 되는 맞춤형시스템 개발에 대한 부분에 대해 기술하고자 한다.

  • PDF

Development of a Pleasure Public Motor Boat(III) (해양레저용 보급형 모터보트 개발(III))

  • Kwon, Soo-Yeon
    • Journal of Korea Ship Safrty Technology Authority
    • /
    • s.34
    • /
    • pp.33-45
    • /
    • 2013
  • 본 연구는 국내 보급을 위한 해양레저용 모터보트 개발을 목표로 하여 모터보트 설계부터 건조까지 개발 전 과정에 관한 기반기술을 구축하고자 한다. 이번 호에서는 지난 호에 이어 보급형 모터보트 시제선의 건조작업 및 건조 영상매뉴얼 개발, 시제선을 홍보하는데 활용될 워킹뷰 시스템 개발 부분에 관해 기술하고자 한다.

  • PDF

A Study on the Certification System in Electromic Commerce (전자상거래(電子商去來)의 인증체계(認證體系)에 관한 고찰(考察))

  • Ha, Kang Hun
    • Journal of Arbitration Studies
    • /
    • v.9 no.1
    • /
    • pp.367-390
    • /
    • 1999
  • The basic requirements for conducting electronic commerce include confidentiality, integrity, authentication and authorization. Cryptographic algorithms, make possible use of powerful authentication and encryption methods. Cryptographic techniques offer essential types of services for electronic commerce : authentication, non-repudiation. The oldest form of key-based cryptography is called secret-key or symmetric encryption. Public-key systems offer some advantages. The public key pair can be rapidly distributed. We don't have to send a copy of your public key to all the respondents. Fast cryptographic algorithms for generating message digests are known as one-way hash function. In order to use public-key cryptography, we need to generate a public key and a private key. We could use e-mail to send public key to all the correspondents. A better, trusted way of distributing public keys is to use a certification authority. A certification authority will accept our public key, along with some proof of identity, and serve as a repository of digital certificates. The digital certificate acts like an electronic driver's license. The Korea government is trying to set up the Public Key Infrastructure for certificate authorities. Both governments and the international business community must involve archiving keys with trusted third parties within a key management infrastructure. The archived keys would be managed, secured by governments under due process of law and strict accountability. It is important that all the nations continue efforts to develop an escrowed key in frastructure based on voluntary use and international standards and agreements.

  • PDF

Certificate Issuing Protocol Supporting WAKE-KR (WAKE-KR을 지원하는 인증서 발행 프로토콜)

  • 이용호;이임영
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.2
    • /
    • pp.288-300
    • /
    • 2003
  • As the importance of information security gets recognized seriously, ciphers technology gets used more. Particularly, since public key ciphers are easier to control the key than symmetric key ciphers and also digital signature is easily implemented, public key ciphers are increased used. Nowadays, public key infrastructure is established and operated to use efficiently and securely the public key ciphers. In the public key infrastructure, the user registers at the certificate authority to generate the private key and public key pair and the certificate authority issues the certificate on the public key generated. Through this certificate, key establishment between users is implemented and encryption communication becomes possible. But, control function of session key established in the public key infrastructure is not provided. In this thesis, the certificate issuing protocol to support the key recovery of the session key established during the wireless authentication and key establishment is proposed.

  • PDF

A Study on Introducing Autonomous Public Transportation On-demand Service in Real Time Using Delphi Method (델파이 기법을 활용한 실시간 수요대응 자율주행 대중교통서비스 도입 방안 연구)

  • Joung, Junyoung;Shim, Sangwoo;Kim, Minseok
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.5
    • /
    • pp.183-196
    • /
    • 2022
  • Public transportation accessibility has been evaluated through minimum level of service for public transportation. However it is evaluated based operators rather than users. This study analyzed the users' accessibility(first-mile, last-mile) to public transportation using altteul transport card data. As a result of user's accessibility of public transportation, rural areas was lower than that in the urban areas. This study calssified type 1 and 2 based average approach time, and average approach time of Type 1 and 2 were more than average approach time of total area. We propsed an efficient introduction of autonomous public transportation on-demand service using delphi survey. As a result of delphi survey, experts agreed on 9 items regarding function, service item, route operation, approach distance, route mileage, punctuality.

The Governance and Agent Problems of Public Agency: Focused on the Port Authority of New York and New Jersey (공기업 거버넌스 제도와 대리인 문제: 뉴욕.뉴저지 항만공사를 중심으로)

  • Kang, Yun-Ho
    • Journal of Navigation and Port Research
    • /
    • v.33 no.10
    • /
    • pp.743-756
    • /
    • 2009
  • This paper tries to analyze how the governance institutions of the Port Authority of New York and New Jersey overcome agent problems in public agencies based on the Principal-Agent Theory, and find the implications that will be helpful to the governance of port authorities in Korea. The Port Authority's governance is characterized by decentralization of personnel rights, open meetings policy, freedom of information policy, public hearings, and fiscally self-supporting system. Those characteristics are helpful in overcoming the agent problems of public agency, such as adverse selection, moral hazard, and complicated external structure, through reinforcing of monitoring agent by principal, easing of information asymmetry between principal and agent, and clarification of organizational ownership structure. Those characteristics may give many implications for the design of governance structures of port authorities in Korea.

MAC Layer Based Certificate Authentication for Multiple Certification Authority in MANET

  • Sekhar, J. Chandra;Prasad, Ramineni Sivarama
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.3 no.5
    • /
    • pp.298-305
    • /
    • 2014
  • In this study, a novel Randomly Shifted Certification Authority Authentication protocol was used in ad hoc networks to provide authentication by considering the MAC layer characteristics. The nodes achieve authentication through the use of public key certificates issued by a CA, which assures the certificate's ownership. As a part of providing key management, the active CA node transfers the image of the stored public keys to other idle CA nodes. Finally the current active CA randomly selects the ID of the available idle CA and shifts the CA ownership by transferring it. Revoking is done if any counterfeit or duplicate non CA node ID is found. Authentication and integrity is provided by preventing MAC control packets, and Enhanced Hash Message Authentication Code (EHMAC) can be used. Here EHMAC with various outputs is introduced in all control packets. When a node transmits a packet to a node with EHMAC, verification is conducted and the node replies with the transmitter address and EHMAC in the acknowledgement.

Evaluation of Websites of Public Libraries of India under Ministry of Culture: A Webometric Analysis

  • Brahma, Krishna;Verma, Manoj Kumar
    • Journal of Information Science Theory and Practice
    • /
    • v.6 no.3
    • /
    • pp.16-24
    • /
    • 2018
  • The purpose of this paper is to investigate the domain authority, number of webpages, links, and calculate the web impact factor of six public libraries of India which are fully funded by Ministry of Culture with the supervision of administration. The data for the study were collected from websites of concerned libraries with the help of a suitable search engine, Open Site Explorer. The study found that the highest domain and page authority was recorded by Khuda Baksh Oriental Public Library and National Library, respectively. It also further revealed that excepting the two libraries, i.e., Khuda Baksh Oriental Public Library and Delhi Public Library, the internal equity-passing links and total internal links of rest of the libraries is zero. National Library leads with maximum total links and total equity-passing links, also with the highest followed linking root domains, total linking root domains, and linking C blocks, and concludes with the web impact factor of Central Secretariat Library recording the maximum, followed by National Library and Khuda Baksh Oriental Public Library.