• Title/Summary/Keyword: authorization

Search Result 507, Processing Time 0.033 seconds

A survey of Specialists Cognition on Authorization of Credits for the Same Subjects in Entering a Same Department of the College Among Technical High School Graduates (공업고등학교 졸업생의 대학 동일계 학과 진학시 동일 과목 학점 인정에 관한 전문가 인식 조사)

  • Lee, Sang Hyuk;Kim, Ho Dong
    • 대한공업교육학회지
    • /
    • v.33 no.2
    • /
    • pp.26-43
    • /
    • 2008
  • The purpose of this study is to survey of specialists cognition to authorize credits for the same subjects in entering a department of the same area in college among technical high school graduates. Today with generalized college education, about 80% of technical high school graduates enter college. Therefore, authorization of credits for the same subjects is necessary to reduce educational waste in terms of articulation among technical high schools, junior colleges and universities. In this study, a survey was conducted with 100 specialists in technical education, including technical high school teachers, researchers, and professors at junior college or technical college in university, getting answers from 84 subjects (81.25%). The results of this research can be summarized as follows: First, it is valid to authorize credits for all practical subjects completed in technical high school when technical high school graduates enter the same department at college but most of junior college professor unsuitable response. Second, it is valid to authorize credits through its own prescribed test for the same subjects when technical high school graduates enter the same department of engineering at junior college or technical college in university but opposed 62.5% of junior college professor. Third, it is most of respondent valid to authorize credits for the same subjects if results of its own examination for authorization by university are at a fixed level or higher when technical high school graduates are admitted as a junior at the same department in technical college of university after graduation from the same department at junior college.

A Study on Aviation Safety and Third Country Operator of EU Regulation in light of the Convention on international Civil Aviation (시카고협약체계에서의 EU의 항공법규체계 연구 - TCO 규정을 중심으로 -)

  • Lee, Koo-Hee
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.29 no.1
    • /
    • pp.67-95
    • /
    • 2014
  • Some Contracting States of the Chicago Convention issue FAOC(Foreign Air Operator Certificate) and conduct various safety assessments for the safety of the foreign operators which operate to their state. These FAOC and safety audits on the foreign operators are being expanded to other parts of the world. While this trend is the strengthening measure of aviation safety resulting in the reduction of aircraft accident. FAOC also burdens the other contracting States to the Chicago Convention due to additional requirements and late permission. EASA(European Aviation Safety Agency) is a body governed by European Basic Regulation. EASA was set up in 2003 and conduct specific regulatory and executive tasks in the field of civil aviation safety and environmental protection. EASA's mission is to promote the highest common standards of safety and environmental protection in civil aviation. The task of the EASA has been expanded from airworthiness to air operations and currently includes the rulemaking and standardization of airworthiness, air crew, air operations, TCO, ATM/ANS safety oversight, aerodromes, etc. According to Implementing Rule, Commission Regulation(EU) No 452/2014, EASA has the mandate to issue safety authorizations to commercial air carriers from outside the EU as from 26 May 2014. Third country operators (TCO) flying to any of the 28 EU Member States and/or to 4 EFTA States (Iceland, Norway, Liechtenstein, Switzerland) must apply to EASA for a so called TCO authorization. EASA will only take over the safety-related part of foreign operator assessment. Operating permits will continue to be issued by the national authorities. A 30-month transition period ensures smooth implementation without interrupting international air operations of foreign air carriers to the EU/EASA. Operators who are currently flying to Europe can continue to do so, but must submit an application for a TCO authorization before 26 November 2014. After the transition period, which lasts until 26 November 2016, a valid TCO authorization will be a mandatory prerequisite, in the absence of which an operating permit cannot be issued by a Member State. The European TCO authorization regime does not differentiate between scheduled and non-scheduled commercial air transport operations in principle. All TCO with commercial air transport need to apply for a TCO authorization. Operators with a potential need of operating to the EU at some time in the near future are advised to apply for a TCO authorization in due course, even when the date of operations is unknown. For all the issue mentioned above, I have studied the function of EASA and EU Regulation including TCO Implementing Rule newly introduced, and suggested some proposals. I hope that this paper is 1) to help preparation of TCO authorization, 2) to help understanding about the international issue, 3) to help the improvement of korean aviation regulations and government organizations, 4) to help compliance with international standards and to contribute to the promotion of aviation safety, in addition.

The Early Textbook Authorization System and the Textbooks of Mathematics (초기의 교과서검정제도와 수학교과서)

  • Kunitsugu Taro
    • The Mathematical Education
    • /
    • v.24 no.2
    • /
    • pp.27-34
    • /
    • 1986
  • At present, Japanese textbooks of mathematics for elementary and secondary schools are thorized by the Ministry of Education. In former days, this system was also in effect for mentary schools until 1905 and for secondary schools until 1944. this article we discuss the start and the change of this system until 1905 and its influences the textbooks of mathematics. The main interest of the system was originally to prevent the textbooks from having the pressions which have the fear of breaking laws, disturbing the public morals or mistaking real facts. The interest changed to assure that the textbooks might comply with the ional standards of teaching syllabuses. And the standards such as the ones of the sizes of ers in the textbooks were made public one after another. The comments attached to the textbooks which applied for the authorization often pointed out use of unsuitable concrete numbers. The comments were often concerned with the difficulty words or sentenses for elementary schools and with the incorrectness of mathematical contents secondary schools. We conclude that the system encouraged the rapid modernization and regularization of Japanese tbooks during this period. We may note that there was a tendency not to adopt an extremely usual trial into the textbooks.

  • PDF

Performance Analysis of Proxy-AAA Authentication Scheme in PMIPv6 Networks with Forwarding Mode Supporting (Proxy Mobile IPv6 네트워크에서 포워딩 모드를 지원하는 인증기법의 성능분석)

  • Lee, Seung-Hyun;Shin, Dong-Ryeol;Jeong, Jong-Pil
    • Journal of Internet Computing and Services
    • /
    • v.13 no.1
    • /
    • pp.15-25
    • /
    • 2012
  • Mobile IPv6 (MIPv6) is a host-based protocol supporting global mobility while Proxy Mobile IPv6 (PMIPv6) is a network-based protocol supporting localized mobility. This paper makes its focus on how to reduce the longer delay and extra cost arising from the combination of authentication, authorization and accounting (AAA) and PMIPv6 further. Firstly, a novel authentication scheme (Proxy-AAA) is proposed, which supports fast handover mode and forwarding mode between different local mobility anchors (LMAs). Secondly, a cost analysis model is established based on Proxy-AAA. From the theoretical analysis, it could be noted that the cost is affected by average arrival rate and residence time.

Design and Implementation for Card Holder Initiated Card Payment System Using the Mobile Devices (모바일 기기를 활용한 고객 개시 카드결제 시스템 설계 및 구현)

  • Seo, Moon Seog
    • Journal of Information Technology Services
    • /
    • v.13 no.4
    • /
    • pp.245-254
    • /
    • 2014
  • Payment system is defined as the various contracts and operating facilities for the transfer of monetary value to clear the relationship between credit and debt. Payment systems essentially require the efficient and reliable operations. Card-based payment systems are developed practically and creatively in accordance with the progress of ICT. Especially in mobile environment with intelligent mobile devices such as smart-phones and tablets, a variety of payment services are provided. Existing card-based payment services are configured by the payment transaction initiated by the merchants card acceptance and then swiping into the CAT (Card Authorization Terminal) to begin the transaction. The merchant initiated payment services are now applied to the Wireless CAT (W-CAT) for mobile environment. That kind of payment services cause many problems such the illegal card information leaks and the lingering threat of W-CAT theft. Also, the use of many W-CATs increased cost to the merchant. In this paper, we propose the card holder initiated card payment system using the intelligent mobile devices in mobile environment for solving problems of the existing merchant initiated card payment system and coping effectively with the activation of a wireless data network and changes of information technology.

A Study on the Supply Chain Security Program (수출입 공급망 안전 프로그램에 관한 연구)

  • Han, Byoung Wan
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.58
    • /
    • pp.287-311
    • /
    • 2013
  • In this study, the scope of previous logistics security were focused only on port and ship. Because of it now extends to the overall (export and import) supply chain areas and in regards with supply security programs in the international level, it reviewed supply chain security programs categorized them into 'ships and port security system', 'container screening system', 'logistics chain authorization system' which are expanded to be adopted in the international level. The major features of those programs are summarized as in building risk management system, providing information ahead, selectivity test and benefits to AEO authorized companies in the customs administration level. The government and companies which are to ensure supply chain security and trade facilitation in order to cope actively with international customs administrative atmosphere need to do the followings : First, they need to build an intra-government integrated supply chain security and make efforts to conclude AEO MRA in order to increase trade competitiveness among major trading countries. Second, they need to build supply chain risk management system in order to enhance management performance through overseas market and company level strategy to obtain and maintain AEO authorization in the company level.

  • PDF

A Study of the Damage and the Countermeasure by Identification Card Loss (신분증 분실에 따른 피해 및 대응책에 관한 연구)

  • Lee, Younggyo;Ahn, Jeonghee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.3
    • /
    • pp.53-64
    • /
    • 2017
  • Korean Identification card or driver license is usually used to verify one's identity in Korea. These are also used as an adult certification. Since the form of these ID card is an analog and it needs to be checked with naked eyes, it might be used maliciously. Someone who's got someone else's ID card can do other things. Therefore, it must be reported rapidly when ID card is lost or stolen. The most serious problem might be occurred when they do not recognize and report the loss. They might suffer from pecuniary or mental damage such as opening a mobile phone service, providing loan or credit card, opening a personal checking account, etc. Thus, this study suggests and compares the ways of avoiding these problems. First, the most effective way is to send the authorization code via mobile phones in consideration of build-up period and cost. The person in charge of business processing department using ID card sends the authorization code via registered mobile phone. The owners submits it to the person and their identifications are confirmed. Next effective way is that the person in charge of business processing department using ID card sends text messages via registered mobile phone. Lastly, the most ineffective way is to introduce and implement the electronic ID card ultimately even though it is expensive and takes a long time to build up the system.

Counterplan Status and Policy Suggestion on REACH (REACH 대응현황 조사 밑 정책제언)

  • Kim, Sang-Yong;Yang, Jeong-Mok;Cho, Jin-Ku;Lee, Do-Hoon
    • Clean Technology
    • /
    • v.14 no.4
    • /
    • pp.225-231
    • /
    • 2008
  • In recent years, the extensive expansion of environmental regulations is led by advanced countries. In particular, REACH (Registration, Evaluation, Authorization and Restriction of Chemicals) effective from 2007 issues a serious threat to export-dependent Korean economy because the principal exports of Korea may infringe upon the regulation. Here, we introduce a general comprehension and current situation of REACH in order to cope with possible crisis caused by REACH. Furthermore, we indicate a trouble in counter-plan prepared by companies and government and wish to suggest appropriate measures on the basis of experts opinions.

  • PDF

An Extensional Client Authorization Scheme for IoT Scenarios by Using OAuth 2.0 and PoP Token

  • Xiaonan, Xing;Jang, Sunggyun;Joe, Inwhee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.200-202
    • /
    • 2017
  • To improve the security of OAuth 2.0 access token transportation and satisfy the challenge of resources constraint caused by the bearer token access mechanism of the OAuth 2.0, we proposed an extensional client authentication scheme that is based on the Proof-of-Possession (PoP) token mechanism. By improving the integrity of PoP token, we bind a PoP key of a public/private key pair to the PoP token. The authorization server and the resource server can authenticate the identity of the client by verifying whether the client has the possession of the PoP token. If the client can prove that it has a PoP key that matches the PoP token, then the identity of the client can be authenticated. This experimental evaluation can confirm that this scheme effectively dealing with the issue of client identity authentication and reduce resources consumption.