• Title/Summary/Keyword: authorization

Search Result 507, Processing Time 0.034 seconds

TSO Authorization of Airborne Multipurpose Electronic Displays (항공기용 다목적 디스플레이의 기술표준품 인증)

  • Cheon, Young-Ho;Lee, Seoung-Pil;Park, Jun-Hyeon
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.6
    • /
    • pp.765-776
    • /
    • 2013
  • Civilian aircraft industry, even if the superior performance of the product in order to ensure the safety of aircraft navigation safety requirements necessary for compliance does not receive a legally recognized can not be used in aircraft characteristics. These are applied in a variety of safety in avionics for navigation of civil aircraft certification standards for the technology is implemented. KTSO-C113 aircraft for the purpose of electronic display technology to authenticate standard contains minimum performance standards. Standard design and manufacturing technology for type approval means approval by mounting the aircraft in order to use a separate approval is required. Through this paper, multi-display technology standards for aircraft type certification approval system and demonstrate compliance with the requirements for the certification practices introduced are presented.

Design and Implementation of CoAP Authorization Framework Based on OAuth 2.0 (OAuth 2.0 기반 CoAP 인증 프레임워크 설계 및 구현)

  • Kim, Kyoung-Han;Lim, Hyun-Kyo;Heo, Joo-Seong;Han, Youn-Hee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.8
    • /
    • pp.329-342
    • /
    • 2017
  • Recently, interest and investment in the Internet of Things (IoT) have increased significantly, and security issues are constantly being raised. As a solution, the IETF ACE Working Group is establishing the ACE framework standard, which is a new security framework for various constrained IoT environments based on the existing OAuth 2.0. However, additional work is required to apply the ACE framework, which proposes a new lightweight security system, to the existing Internet environment, and this additional cost is a factor that hinders the application of OAuth 2.0 to the IOT environment. Therefore, we propose an IoT authentication framework based on OAuth 2.0's existing development motivation, and implement a proposal framework based on CoAPthon and analyze its performance.

The Effects of Job Demands and Emotional Intelligence on Emotional Exhaustion in School Nurses -Focusing on the Mediating Factors: Stress Response and Job Satisfaction- (보건교사의 직무요구와 감성지능이 정서적 고갈에 미치는 구조모형: 스트레스 반응과 직무만족 매개 요인을 중심으로)

  • Hong, Jin Eui;Jung, Hye-Sun;Yim, Hyeon Woo;Jeong, Hyun Suk
    • Journal of the Korean Society of School Health
    • /
    • v.34 no.1
    • /
    • pp.13-21
    • /
    • 2021
  • Purpose: This research was conducted to investigate the characteristics of emotional exhaustion that Korean school nurses suffer, to suggest policy implications to address this issue, and to propose preventive and supervisory measures regarding emotional exhaustion experienced by school nurses in elementary, middle, and high schools in Korea. Methods: A survey was conducted under the authorization of Chungcheongnam-do Office of Education. Out of 400 copies first distributed, 376 copies were returned. Among the 376 copies, 117 copies which were judged insincere or from teachers with less than 1 year of experience were exclded from the study. Through this process, only 259 copies were finally selected. Results: As a result of assessing the fit of the model, it was found that 𝑥2=67.247 (df=28, p<.001), GFI=.953, AGFI=.911, TLI=0.936, CFI=0.965 and RMSEA=.074. Emotional exhaustion was found to have a direct effect on job demand (β=.26) and an indirect effect on stress response (β=.31). The total effect was β=.57. There was a positive complete indirect effect of β=.52 between emotional intelligence and emotional exhaustion. The total effect was not significant, respectively. Conclusion: Since job demands of school nurses affect emotional exhaustion, it is necessary to reconstruct their jobs and operations to alleviate their job demands.

Stateless Randomized Token Authentication for Performance Improvement of OAuth 2.0 MAC Token Authentication (OAuth 2.0 MAC 토큰인증의 효율성 개선을 위한 무상태 난수화토큰인증)

  • Lee, Byoungcheon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1343-1354
    • /
    • 2018
  • OAuth 2.0 bearer token and JWT(JSON web token), current standard technologies for authentication and authorization, use the approach of sending fixed token repeatedly to server for authentication that they are subject to eavesdropping attack, thus they should be used in secure communication environment such as HTTPS. In OAuth 2.0 MAC token which was devised as an authentication scheme that can be used in non-secure communication environment, server issues shared secret key to authenticated client and the client uses it to compute MAC to prove the authenticity of request, but in this case server has to store and use the shared secret key to verify user's request. Therefore, it's hard to provide stateless authentication service. In this paper we present a randomized token authentication scheme which can provide stateless MAC token authentication without storing shared secret key in server side. To remove the use of HTTPS, we utilize secure communication using server certificate and simple signature-based login using client certificate together with the proposed randomized token authentication to achieve the fully stateless authentication service and we provide an implementation example.

POSCAL : A Protocol of Service Access Control by Authentication Level (인증 수준에 의한 서비스 접근제어 프로토콜)

  • Yoo, SeongMin;Choi, SeokJin;Park, JunHoo;Ryou, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1509-1522
    • /
    • 2018
  • The purpose of this study is to support flexible authentication functions in various services using various types of user information. Rather than requiring the same level of authentication for all services, the goal is to identify the level of authentication at the time of user authentication and to increase convenience and efficiency by dynamically granting authority. In this paper, we propose POSCAL (Protocol of Service Control by Authentication Level) protocol which can control service access based on various local authentication information. To verify the function of the authentication framework, we developed the electronic wallet service based on the POSCAL authentication framework and evaluated the implementation function based on the use case scenario. The proposed protocol satisfies user and message authentication, confidentiality of authentication information, integrity of authentication history, non - repudiation of authorization, and access control by service according to security level.

A Longitudinal Study on the Supply & Demand-side Diversity of Digital Media : TV Channel & VOD Data of 2012-2017 (디지털미디어 콘텐츠 공급과 수요측면의 다양성 구현 종단 연구: 2012-2017년의 TV채널과 VOD 데이터를 중심으로)

  • Lee, Sang-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.8
    • /
    • pp.137-144
    • /
    • 2019
  • This paper deals with the longitudinal study on the supply & demand-side diversity of digital media service. The purpose of this study is to measure the diversity of contents supply and demand-side of digital media platform providers by longitudinal data and discuss the implication. In the approval and re-authorization of pay-TV broadcasters, there were attempts to measure diversity indicators as items to evaluate the publicness and public interest of broadcasting, but they are mainly limited to the method of measuring diversity in the short-term supply side. Thus researcher wants to confirm the evaluation of two aspects through this study. First, researcher proposes a demand-side measurement methodology that utilizes actual audience data from users, and second, a longitudinal evaluation methodology that evaluates long-term trends of diversity change. Researcher has secured the actual supply and demand data of the platform player and confirmed trends of longitudinal diversification indexing for 50 months from 2012 to 2017. Through this research, researcher expects that the supply and demand-side and the longitudinal diversity evaluation will be utilized in a balanced way of publicness and public interest evaluation of broadcasting.

Smart Vehicle Security Vulnerability Analysis and Solution Support (스마트 자동차 네트워크의 보안취약점 분석 및 해결방안 마련)

  • Kim, Jin-Mook;Moon, Jeong-Kyung;Hwang, Deuk-Young
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.69-76
    • /
    • 2018
  • One of the most remarkable technologies in the era of the 4th industrial revolution is the interest in the field of smart cars. In the near future, it will not only be possible to move to a place where you want to ride a smart car, but smart cars, including artificial intelligence elements, can avoid sudden car accidents. However, as the field of smart automobiles develops, the risks are expected to increase. Therefore, based on the understanding of security vulnerabilities that may occur in smart car networks, we can apply safe information security technology using FIDO and attribute-based authorization delegation technique to provide smart car control technology that is safe and secure. I want to. In this paper, we show that the proposed method can solve security vulnerabilities by using secure smart car control technology. We will further study various proposals to solve security vulnerabilities in the field of smart car networks through future research.

  • PDF

Development of SAML Software for JAVA Web Applications in Korea (국내 자바 웹 응용을 위한 SAML 소프트웨어의 개발)

  • Jo, Jinyong;Chae, Yeonghun;Kong, JongUk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.9
    • /
    • pp.1160-1172
    • /
    • 2019
  • Federated authentication is a user authentication and authorization infrastructure that spans multiple security domains. Many overseas Web applications have been adopting SAML-based federated authentication. However, in Korea, it is difficult to apply the authentication because of the high market share of a specific Web (application) server, which is hard to use open-source SAML software and the high adoption of Java-based standard framework which is not easy to integrate with SAML library. This paper proposes the SAML4J, which is developed in order to have Web applications easily and safely integrated with the Java-based framework. SAML4J has a developer-friendly advantage of using a session storage independent of the framework and processing Web SSO flows through simple API. We evaluate the functionality, performance, and security of the SAML4J to demonstrate the high feasibility of it.

Analysis on the relationship between core competencies and mathematical competencies and the tasks for mathematical competencies : A case of high school 'Mathematics' textbooks according to 2015 revised mathematics curriculum (핵심 역량과 수학 교과 역량의 관련성 및 교과서에 제시된 역량 과제 분석 : 2015 개정 교육과정 고등학교 '수학'을 중심으로)

  • Yoon, Sangjoon;Lee, Ahran;Kwon, Oh Nam
    • The Mathematical Education
    • /
    • v.58 no.1
    • /
    • pp.55-77
    • /
    • 2019
  • Textbooks play a very important role as a medium for implementing curriculum in the school. This study aims to analyze tasks for mathematical competencies in the high school 'mathematics' textbooks based on the 2015 revised mathematics curriculum emphasizing competencies. And our study is based on the following two research question. 1. What is the relationship between core competencies and mathematical competencies? 2. What is the distribution of competencies of tasks for mathematical competencies presented in the textbooks? 3. How does the tasks for mathematical competencies reflect the meaning of the mathematical competencies? For this study, the tasks, marked mathematical competencies, were analyzed by elements of each mathematical competencies based on those concept proposed by basic research for the development of the latest mathematics curriculum. The implications of the study are as follows. First, it is necessary to make efforts to strengthen the connection with core competencies while making the most of characteristics of subject(mathematics). Second, it needs to refine the textbook authorization standards, and it should be utilized as an opportunity to improve the textbook. Third, in order to realize competencies-centered education in the school, there should be development of teaching and learning materials that can be used directly.

A Study on the Improvement Measures of Drowning Accident in South Korea (물놀이 안전사고 개선방안에 관한 연구)

  • Kim, Jung-Gon;Lim, Hojung;Kim, Tae-Hwan;Lee, Dae-Sung
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.1
    • /
    • pp.153-164
    • /
    • 2019
  • Purpose: This paper aims to derive improvement measures, in terms of legal and technical aspects, which can reduce effectively the casualties caused by drowing accidents. Method: Firstly, we checked the status of drowing accident management and carried out the interview of field private safety guards. field private safety guards. In addition, surveys were conducted on safety personnel and managers. Based on survey results, we are lastly analyzed the specific problems and reviews the improvement measures from technical and legal aspects. Result: As an analytical result, it was considered that supplementary supporting tools such as CCTV, monitoring devices using IoT and artificial intelligence technologies were necessary to prevent drowning accident, and qualification with limited authority should be added to the private safety guard because of the lack of regulation. Conclusion: In order to manage water safety effectively, a comprehensive water safety management system should be established that integrates people and equipment through systemic education of security personnel, authorization of enforcement, and introduction of surveillance equipment.