• Title/Summary/Keyword: Self-Certification

Search Result 139, Processing Time 0.036 seconds

Trustworthy Repositories Audit Criteria: Self-Assessment of OASIS (믿을 수 있는 디지털 아카이브 인증기준: OASIS 적용사례)

  • Lee, So-Yeon
    • Journal of the Korean Society for information Management
    • /
    • v.25 no.3
    • /
    • pp.5-25
    • /
    • 2008
  • Individuals and organizations in the modern society produce diverse digital objects everyday, which are not only valuable information resources at present but also will be invaluable digital heritage for the future generation. TRAC(Trustworthy Repositories Audit & Certification: Criteria & Checklist) is one of the evaluating tools against which digital archives could be assessed for their preparedness to perform the task of long-term preservation. The current study uses TRAC to assess OASIS(Online Archiving & Searching Internet Source). The results show that the web archive has a greater room for strengthening in the object management infrastructure than in organizational and technical infrastructures.

A Novel Electronic Voting Mechanism Based on Blockchain Technology

  • Chuan-Hao, Yang;Pin-Chang Su;Tai-Chang Su
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.10
    • /
    • pp.2862-2882
    • /
    • 2023
  • With the development of networking technology, it has become common to use various types of network services to replace physical ones. Among all such services, electronic voting is one example that tends to be popularized in many countries. However, due to certain concerns regarding information security, traditional paper voting mechanisms are still widely adopted in large-scale elections. This study utilizes blockchain technology to design a novel electronic voting mechanism. Relying on the transparency, decentralization, and verifiability of the blockchain, it becomes possible to remove the reliance on trusted third parties and also to enhance the level of trust of voters in the mechanism. Besides, the mechanism of blind signature with its complexity as difficult as solving an elliptic curve discrete logarithmic problem is adopted to strengthen the features related to the security of electronic voting. Last but not least, the mechanism of self-certification is incorporated to substitute the centralized certificate authority. Therefore, the voters can generate the public/private keys by themselves to mitigate the possible risks of impersonation by the certificate authority (i.e., a trusted third party). The BAN logic analysis and the investigation for several key security features are conducted to verify that such a design is sufficiently secure. Since it is expected to raise the level of trust of voters in electronic voting, extra costs for re-verifying the results due to distrust will therefore be reduced.

A Study on the Improvement of Assessment Criteria through Green Building Certification Cases for Apartment Houses (공동주택 친환경건축물인증 사례를 통한 평가항목 개선안 연구)

  • Kim, Myoung-Shin;Hwang, Jae-Woo;Park, Kyung-Soon;Son, Won-Tug
    • Proceedings of the SAREK Conference
    • /
    • 2008.06a
    • /
    • pp.563-568
    • /
    • 2008
  • The Green Building Certification is issued through self-assessment of applicant, assessment of assessment members and deliberation committee members. These assessments are carried out based on a standard provided Ministry of land transport and maritime affairs and environment. However, opinion difference of assessment standards could be occurred due to diversity of understanding for a standard or subjectivity of committee member. In this paper, We discussed the primary cause of score difference after analyzed assessment standard for the site, transportation, energy and resources, ecological environment, indoor environment in five different Apartment Houses located in Seoul. At a result, score difference was at least 3 points in each section except indoor environment and total score difference of housing complex is by 10 points. To improve these problems, educational program should be activated and guide for assessment standard should be published.

  • PDF

Organization and Qualification Documents for Generation of Composite Materials Property (복합재 물성치 생성을 위한 조직체계 및 인증문서)

  • Rhee, Seung Yun;Suh, Jang Won
    • Journal of Aerospace System Engineering
    • /
    • v.7 no.4
    • /
    • pp.55-61
    • /
    • 2013
  • In recent years, NASA, FAA and the aerospace industry, through MIL-HDBK-17 and the NASA-conceived AGATE(Advanced General Aviation Transport Experiments) program, have worked together to reduce the qualification burden imposed on individual aircraft manufacturers. AGATE is one of the most successful public/private cost-haring partnerships ever conceived, bringing together academia, the FAA, other government agencies and industry to develop affordable new technologies and accompanying industry standards and certification methods. In 2005, NASA established NCAMP(National Center for Advanced Materials Performance) with the purpose of refining and enhancing the AGATE process to a self-sustaining level to serve the entire aerospace industry in partnership with CMH-17, FAA, and SAE. In this paper, I will introduce briefly NCAMP process and explain its organization structure and core NCAMP documents. This paper can provide some help in establishing our certification system for composite materials where the NCAMP process is expected to be the most good model.

A Study on the Utilizing Certificate Awareness for Student Certificate Holders of Private Security Guard (신변보호사 자격취득 학생들의 자격활용 인식에 관한 연구)

  • Kim, Il Gon
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.45-54
    • /
    • 2013
  • Korea Security Association suggested from who Professor An, Hwang Kwon advocated the introduction of a private security guard certification system, and the private security guard certification exam has been conducted seven times since 2005, being authorized by the government. Currently, there are a lot of certified private security guards who have passed the exam. In fact, however, no preference is given to them. In terms of employment, they don't receive any preferential treatment nor are given any extra points. Furthermore, they cannot afford to make use of their certificate. The purpose of this study was to examine the state of utilizing the private security guard certificate among student certificate holders and their awareness of the private security guard system. The findings of the study were as follows: First, it's important to present a vision for certified private security guards, and what equally matters is to make it clear how and where they can show what they can do. Second, it's required to improve the image and reliability of private security guards as professional security guards. Third, candidates for the certification exam should boost their own self-esteem, confidence and professionalism as competent human resources who can make a contribution to society.

A Study on the Self-extinguishing for Aircraft Wire (항공기용 배선의 자가소화성에 관한 연구)

  • Jeong, Duck-Young;Yi, Baeck-Jun;Lee, Jong-Hee
    • Journal of Aerospace System Engineering
    • /
    • v.5 no.1
    • /
    • pp.13-16
    • /
    • 2011
  • All components such as structure, engine, electrical equipment, wire etc. should have certified qualities and functions for safe flight. The wire like a blood vessel of man is connected with most components and supply a electrical signal or power to them and only certified wire through a lot of tests such as rating, flame resistance, self-extinguishing, protection of EMI etc. must be used in aircraft. In other words, the wire should observe many certification requirements because it is one of the most important components.

Blockchain and Cryptocurrency Distributed Testing Methods

  • Lee, Taegyu
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.1-9
    • /
    • 2022
  • Recently, a large number of cryptocurrencies and block chains have been continuously released. However, these cryptocurrencies and block chains are open to users without authorized verification and testing procedures, causing various reliability problems. Existing cryptocurrencies and blockchain test methods build a blockchain Testnet for a certain period of time by the developer without external verification by a third party, and after repeatedly self-testing and self-operating processes, commercialization is in progress by switching to the Mainnet. This self-verification method does not guarantee objectivity and publicness, and high reliability of customers cannot be realized. This study proposes a cryptocurrency and blockchain test interface and test control system as a third-party open test method.

Home Network Observation System Using Activate Pattern Analysis of User and Multimedia Streaming (사용자의 행동 패턴 분석과 멀티미디어 스트리밍 기술을 이용한 홈 네트워크 감시 시스템)

  • Oh Dong-Yeol;Oh Hae-Seok;Sung Kyung-Sang
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.9
    • /
    • pp.1258-1268
    • /
    • 2005
  • While the concept of Home Network is laying by and its interests are increasing by means of digitalizing of the information communication infrastructure, many efforts are in progress toward convenient lives. Moreover, as information household appliances which have a junction of connecting to the network are appearing over the past a few years, the demands against intellectual Home Services are increasing. In this paper, by being based upon Multimedia which is an essential factor for developing of various application services on ubiquitous computing environments, we suggest a simplified application model that could apply the information to the automated processing system after studying user's behavior patterns using authentication and access control for identity certification of users. In addition, we compared captured video images in the fixed range by pixel unit through some time and checked disorder of them. And that made safe of user certification as adopting self-developed certification method which was used 'Hash' algorism through salt function of 12 byte. In order to show the usefulness of this proposed model, we did some testing by emulator for control of information after construction for Intellectual Multimedia Server, which ubiquitous network is available on as a scheme so as to check out developed applications. According to experimental results, it is very reasonable to believe that we could extend various multimedia applications in our daily lives.

  • PDF

An Analysis on the Status of Barrier Free Design Certifications in Center for Elderly (경로당 건축물의 장애물 없는 생활환경 인증실태 분석)

  • Lee, Jeong-Soo;Oh, Young-Sook;Eun, Dong-Shin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.12
    • /
    • pp.313-320
    • /
    • 2018
  • The purposes of this study were to verify the status of Barrier Free Design Certification in the center for the elderly. To achieve these purposes, the architectural characteristics of the center for elderly and the status of Barrier Free Design Certification was analyzed. The results of this study were as follows. (1) The functional composition of centers for the elderly are similar regardless of the location, but the area and shape of the plot are very different according to the location. (2) According to an analysis on the status of Barrier Free Design Certification in centers for elderly, the sanitation and intermediate facilities are necessarily considerable adjustment. (3) For the accessability and conveniences of Barrier Free Design Certification in a small building, such as centers for the elderly, they are necessary to simplify the self-assessment documents, minimize the period for judging, and reducing the fees for certification.

A "Paradoxical" ID-Based Key Distribution Protocol for Mobile Communication Systems (이동통신 시스템을 위한 "역설적인" ID-Based 키분배 방식)

  • 최연이;김성덕;양형규;원동호
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1995.11a
    • /
    • pp.307-313
    • /
    • 1995
  • 본 논문에서는 기존에 제안된 이동통신용 키분배 방식의 문제점을 분석하고, Girault가 제안한 자체인증 공개키(Self-certified public keys) 개념을 이용한, 인증자에 기반을 둔(Certification-based) 방식이 아닌 개인식별정보에 기반을 둔(Identity-based) 방식이면서도 사용자가 자신의 비밀키를 선택할수 있는, 이동 퉁신망에 적용가능한 "역설적인" ID-based 키분배 방식을 제안한다. 제안한 방식의 안전성은 고차 잉여류 문제(${\gamma}$$^{th}$ -residuosity problem)와 이산대수(discrete logarithm) 문제에 근거한다. 문제에 근거한다.

  • PDF