• Title/Summary/Keyword: Security controls

Search Result 205, Processing Time 0.019 seconds

The Comparative Study on Arbitration System of South Korea, North Korea, and China (남북한 및 중국 중재제도의 비교연구)

  • Shin, Koon-Jae;Lee, Joo-Won
    • Journal of Arbitration Studies
    • /
    • v.17 no.2
    • /
    • pp.101-124
    • /
    • 2007
  • The legal systems and open-door policies to foreign affairs in North Korea have been followed by those of China. Whereas an arbitration system of South Korea accepted most parts of UNCITRAL Model Law, North Korea has succeeded to an arbitration system of a socialist country. China, under the arbitration system of socialist country, enacted an arbitration act reflected from UNCITRAL Model Law for keeping face with international trends. We have used these three arbitration system as a tool for analyzing an arbitration system in North Korea. With an open-door policy, North Korea and China enacted an arbitration act to provide a legal security. Therefore, the core parts of arbitration system in North Korea and China are based on a socialist system while those of South Korea is on liberalism. So, North Korea and China enacted an arbitration act on the basis of institutional arbitration, on the other side, South Korea is based on ad-hoc arbitration. Because of these characters, in terms of party autonomy, it is recognized with the order as South Korea, China and North Korea. Also North Korea enacted separate 'Foreign Economic Arbitration Act' to resolve disputes arising out of foreign economies including commercial things and investments. There are differences in arbitration procedures and appointment of arbitrators : South Korea recognizes parties' autonomy, however parties should follow the arbitration rules of arbitration institutes in North Korea and China. According to an appointment of arbitrators, if parties fail to appoint co-arbitrators or chief arbitrators by a mutual agreement, the court has the right to appoint them. In case of following KCAB's rules, KCAB secretariats take a scoring system by providing a list of candidates. A party has to appoint arbitrators out of the lists provided by arbitration board(or committee) in North Korea. If a party may fail to appoint a chief arbitrator, President of International Trade Arbitration Board(or Committee) may appoint it. In China, if parties fail to appoint a co-arbitrator or a chief arbitrator by a mutual agreement, Secretary general will decide it. If a arbitral tribunal fails to give a final award by a majority decision, a chief arbitrator has the right for a final decision making. These arbitration systems in North Korea and China are one of concerns that our companies take into account in conducting arbitration procedures inside China. It is only possible for a party to enforce a final arbitral award when he applies an arbitration inside North Korea according to International Trade Arbitration Act because North Korea has not joined the New York Convention. It's doubtful that a party might be treated very fairly in arbitration procedures in North Korea because International Trade Promotion Commission controls(or exercises its rights against) International Trade Arbitration Commission(or Board).

  • PDF

Research for the Element to Analyze the Performance of Modern-Web-Browser Based Applications (모던 웹 브라우저(Modern-Web-Browser) 기반 애플리케이션 성능분석을 위한 요소 연구)

  • Park, Jin-tae;Kim, Hyun-gook;Moon, Il-young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.278-281
    • /
    • 2018
  • The early Web technology was to show text information through a browser. However, as web technology advances, it is possible to show large amounts of multimedia data through browsers. Web technologies are being applied in a variety of fields such as sensor network, hardware control, and data collection and analysis for big data and AI services. As a result, the standard has been prepared for the Internet of Things, which typically controls a sensor via HTTP communication and provides information to users, by installing a web browser on the interface of the Internet of Things. In addition, the recent development of web-assembly enabled 3D objects, virtual/enhancing real-world content that could not be run in web browsers through a native language of C-class. Factors that evaluate the performance of existing Web applications include performance, network resources, and security. However, since there are many areas in which web applications are applied, it is time to revisit and review these factors. In this thesis, we will conduct an analysis of the factors that assess the performance of a web application. We intend to establish an indicator of the development of web-based applications by reviewing the analysis of each element, its main points, and its needs to be supplemented.

  • PDF

A memory protection method for application programs on the Android operating system (안드로이드에서 어플리케이션의 메모리 보호를 위한 연구)

  • Kim, Dong-ryul;Moon, Jong-sub
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.93-101
    • /
    • 2016
  • As the Android smart phones become more popular, applications that handle users' personal data such as IDs or passwords and those that handle data directly related to companies' income such as in-game items are also increasing. Despite the need for such information to be protected, it can be modified by malicious users or leaked by attackers on the Android. The reason that this happens is because debugging functions of the Linux, base of the Android, are abused. If an application uses debugging functions, it can access the virtual memory of other applications. To prevent such abuse, access controls should be reinforced. However, these functions have been incorporated into Android O.S from its Linux base in unmodified form. In this paper, based on an analysis of both existing memory access functions and the Android environment, we proposes a function that verifies thread group ID and then protects against illegal use to reinforce access control. We conducted experiments to verify that the proposed method effectively reinforces access control. To do that, we made a simple application and modified data of the experimental application by using well-established memory editing applications. Under the existing Android environment, the memory editor applications could modify our application's data, but, after incorporating our changes on the same Android Operating System, it could not.

An Analysis on Limited Warfare through the Falkland Islands Dispute (포클랜드제도 분쟁을 통한 제한전 분석)

  • Yang, Seong-sil;Lee, Hee-wan;Shin, Jin
    • Maritime Security
    • /
    • v.3 no.1
    • /
    • pp.211-235
    • /
    • 2021
  • As a result of the Falkland Islands War from April 2 to June 14, 1982, Britain overcame severe economic depression and reclaimed the glory of the former British Empire by winning the war. On the other hand, Argentina was greatly affected by the collapse of a military dictatorship and the birth of a democratic government. This study suggests strategies for responding to maritime disputes that may occur in Dokdo Island in the future by applying "DIME on PMESII" to the Falkland Islands dispute. In particular, the study analyzes how DIME (diplomacy, information, military, and economy) capabilities have an effect as a means of the total national power of a country that effectively controls the disputed territory. Based on the results of this study, the response strategies related to the Dokdo maritime dispute are as follows. First, effective control over the disputed territory should be effectively maintained and strengthened like in Britain. This strategy inspires patriotism, supports the government during warfare, secures a just cause for war, and gains international support. Second, 'DIME on PMESII' was effective in modern warfare by focusing our DIME capabilities on the weaknesses of the other country's PMESII system. That is, wars are not won simply by the conflict of armed forces but by a nation's overall national strength, such as diplomatic, information, and economic capabilities. Third, appropriate strategies for neighboring countries are needed to overcome the possibility of limited warfare in the sea through preparations for Dokdo maritime disputes in the future.

  • PDF

Suitability Evaluation Method for Both Control Data and Operator Regarding Remote Control of Maritime Autonomous Surface Ships (자율운항선박 원격제어 관련 제어 데이터와 운용자의 적합성 평가 방법)

  • Hwa-Sop Roh;Hong-Jin Kim;Jeong-Bin Yim
    • Journal of Navigation and Port Research
    • /
    • v.48 no.3
    • /
    • pp.214-220
    • /
    • 2024
  • Remote control is used for operating maritime autonomous surface ships. The operator controls the ship using control data generated by the remote control system. To ensure successful remote control, three principles must be followed: safety, reliability, and availability. To achieve this, the suitability of both the control data and operators for remote control must be established. Currently, there are no international regulations in place for evaluating remote control suitability through experiments on actual ships. Conducting such experiments is dangerous, costly, and time-consuming. The goal of this study is to develop a suitability evaluation method using the output values of control devices used in actual ship operation. The proposed method involves evaluating the suitability of data by analyzing the output values and evaluating the suitability of operators by examining their tracking of these output values. The experiment was conducted using a shore-based remote control system to operate the training ship 'Hannara' of Korea National Maritime and Ocean University. The experiment involved an iterative process of obtaining the operator's tracking value for the output value of the ship's control devices and transmitting and receiving tracking data between the ship and the shore. The evaluation results showed that the transmission and reception performance of control data was suitable for remote operation. However, the operator's tracking performance revealed a need for further education and training. Therefore, the proposed evaluation method can be applied to assess the suitability and analyze both the control data and the operator's compliance with the three principles of remote control.