• Title/Summary/Keyword: authorization

Search Result 507, Processing Time 0.029 seconds

The Effects of Genetically Modified Crops on Soil Microbial Community (유전자변형 작물이 토양 미생물상에 미치는 영향)

  • Lee, Ki-Jong;Oh, Sung-Dug;Sohn, Soo-In;Ryu, Tae-Hun;Park, Jong-Sug;Lee, Jang-Yong;Cho, Hyun-Suk;Ahn, Byung-Ohg
    • Korean Journal of Environmental Agriculture
    • /
    • v.31 no.2
    • /
    • pp.192-199
    • /
    • 2012
  • BACKGROUND: Genetically modified (GM) crops must receive relevant regulator's authorization before they can be sold as seed or used food, feed and processing. Before approving any GM crop, the relevant government ministries are required to examine environmental risk assessment to make scientifically sound and socially acceptable decisions. But one of the least studied and understood areas in the environmental risk assessment of GM crops are their impact on soil microbial community. METHODS AND RESULTS: Recently, advanced methods have been developed to characterize the soil microbial community in various environments. In this study, the culture-dependent and culture-independent technical approaches for profiling soil microbial communities are summarized and their applicability to assess GM crops are discussed. CONCLUSION(S): We concluded that the effect of GM crops on soil microbial community need to be assessed on a case by case basis. The combination of culture-dependent and culture-independent method was necessary for reliable and detailed assessment of effect of GM crops on soil microbial community.

The secured mobile wallet system using by integrated ID (통합 아이디를 이용한 안전한 모바일 월렛 시스템)

  • Nam, Choon-Sung;Jeon, Min-Kyung;Shin, Dong-Ryeol
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.9-20
    • /
    • 2015
  • Nowadays, Smart Wallet technology trend that is able to save users' consuming costs and also retain users' redundant behaviors such as Single-tapping, One-way communication, Integrated ID, has been issued in recent Mobile Industrial Fields. As one of Smart Wallet functions, Integrated ID is proposed for users' convenience, handiness, and immediate responses. It is designed for the effective management of users' IDs which are easy to be forgot because of its unusual structures. To be detail, instead of user, Integrated ID system can certificate users identification from various online sites (where user resisted) authorization requests via one-clicking, not putting identification data in each sites. So, this technology would be helpful much to a certain user who has lots ID and its Password in multiple Online shopping companies by establishing integrated ID. However, although Integrated ID has lots advantages to be used, most Mobile Service Companies has hesitated to apply Integrated ID service in their shopping systems because this technology requires them sharing their users' data. They have worried that this service would be not helpful to gain their profits. Furthermore, Users who join in multiple shopping companies and use Integrated ID services also are difficult to decide which company they have to save their points in before payment because this system could not show any financial benefit analysis data to their users. As following facts, via this paper majorly we propose the advanced Integrated ID system which concern shopping point management. Basically, this system has a strong security payment service and secure network services like other mobile Shopping systems. Additionally, this system is able to service (or to support) shopping -point -saving guide for customers' financial benefits and conveniences.

A Study on the DID based Smart Remocon and FIDO Transaction Certification for Home-shopping (DID 기반의 스마트 리모콘과 홈쇼핑 FIDO 거래인증 연구)

  • Yeo, Hyupgoo;Kang, Mingoo;Sonh, Seungil
    • Smart Media Journal
    • /
    • v.9 no.1
    • /
    • pp.60-66
    • /
    • 2020
  • In this paper, the FIDO (Fast IDentity Online) transaction certification platform was proposed for applying the DID (Decentralized ID) of blockchain with home shopping channels to the IPTV service providers based on the Remocon (Remote Control). In this case, the DID based smart remocon applies biometric identification techniques for personal identification. These individual DID smart remote controls apply distributed ID blockchain, enabling home shopping viewers to conduct reliable ratings surveys through the detection of channel changed information. In addition, this smart remocon utilizes the product purchased information history on home shopping channels, allowing IPTV's home shopping viewers to compare the same broadcasted production information on all channels by blockchain technique and their production characteristics. IPTV service providers can process home shopping order/authorization informations in one-stop service via a number of home shopping broadcasting companies, and DID smart remote controls for home shopping viewers with the checking results of their real-time online access to confirm the FIDO2.0 transaction certification homepage. Thus, the FIDO transaction authentication platforms of IPTV service provider(Telecommunication company) can be expected to improve the benefits of home shopping customers, and to reduce the broadcasting companies' burden of payment, too.

Content Analysis of Illustrations in the Middle School Home Economics Textbooks of the 7th Curriculum by Units from the Gender Equity Perspective (양성평등적 관점에 기초한 제 7차 교육과정 중학교 가정 교과서 삽화의 단원별 계량적 내용분석)

  • Kim Mee Jeong;Yoo Tae Myung
    • Journal of Korean Home Economics Education Association
    • /
    • v.16 no.4 s.34
    • /
    • pp.27-41
    • /
    • 2004
  • The purpose of this study was to provide a primary data for the revision of Home Economics Curriculum from the quantitative content analysis of illustrations in current Home Economics textbooks from the gender equity perspective. This study analyzed 342 illustrations and 1.368 individuals in 15 volumes of Home Economics textbooks of the 7th curriculum by units. The major findings of this study show that current Home Economics textbooks improved compared to the textbooks of previous the 4th, 5th. and 6th curriculum periods in terms of sex proportion and sex compositions of individuals appeared in illustrations. However, sex roles. color of clothing and dressing styles. and background and description of individuals appeared in illustrations tends to not described as gender equitable. This study recommends that there is a need for Department of Education to provide a specific manual and authorization standards for writing textbooks and constructing illustrations.

  • PDF

A Study on the Importance of the Assessment of Records Management Metadata Elements Related to the Electronic Medical Records Management System for Medical Records Managers (전자의무기록 관리시스템 관련 기록관리 메타데이터 요소들에 대한 의무기록 관리자의 중요도 평가 연구)

  • Lee, Eun-Mi;Kim, Myeong;Yim, Jin Hee
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.13 no.3
    • /
    • pp.151-171
    • /
    • 2013
  • To comprehend the importance and necessity of record management metadata standard implemented in an electronic medical records system, a survey was undertaken to 50 medical records managers in charge of 5 major hospitals in Seoul. Analysis of the survey results was performed by averaging the responses given by those who answered the survey. SPSS was utilized for statistical analysis. Managers of medical records placed importance on metadata that are related to security of records, such as "levels of security", "types of access to medical records", "levels of authorization granted to personnel", and "users accessing medical records". It shows that these managers need the functions of privacy protection in ERMS. Metadata on "external disclosure" had the lowest level but those surveyed with more than 7 years of experience placed greater importance in this area more those surveyed with less than 7 years of experience in a hospital. This shows that managers need the functions of external disclosure to meet the needs of third partiesfor medical research and medical education.

Technical Review on Methodology of Generating Exposure Scenario in eSDS of EU REACH (유럽 신화학물질관리제도의 eSDS에 첨부되는 노출시나리오 작성법 개발 동향)

  • Choe, Eun-Kyung;Kim, Jong-Woon;Kim, Sang-Hun;Byun, Sung-Won
    • Clean Technology
    • /
    • v.17 no.4
    • /
    • pp.285-299
    • /
    • 2011
  • As one of the REACH obligations, the extended safety data sheet (eSDS) should be communicated within the supply chain under the REACH Regulation. Based on technical guidance documents published on the ECHAs website and survey of EU's recent REACH-related informations, this paper includes a study on details of how to develop exposure scenarios (ES) such as structure of ES, process of ES develpoment, standard workflows and key input data to develop ES with an introduction of eSDS concept. This paper also contains an overview on operational conditions (OCs) and risk management measures (RMMs) that are what to consider when building an ES. The structure of Chesar (Chemical Safety Assessment and Report tool) developed by European Chemicals Agency (ECHA) is studied with a review of the available exposure estimation tools for workers, environment and consumers. Case example of generic exposure scenario (GES) for organic solvent is presented. To guide Korean EU-exporting companies, their participating roles in three steps of preparing ES are addressed.

Analysis of IoT Open-Platform Cryptographic Technology and Security Requirements (IoT 오픈 플랫폼 암호기술 현황 및 보안 요구사항 분석)

  • Choi, Jung-In;Oh, Yoon-Seok;Kim, Do-won;Choi, Eun Young;Seo, Seung-Hyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.7
    • /
    • pp.183-194
    • /
    • 2018
  • With the rapid development of IoT(Internet of Things) technology, various convenient services such as smart home and smart city have been realized. However, IoT devices in unmanned environments are exposed to various security threats including eavesdropping and data forgery, information leakage due to unauthorized access. To build a secure IoT environment, it is necessary to use proper cryptographic technologies to IoT devices. But, it is impossible to apply the technologies applied in the existing IT environment, due to the limited resources of the IoT devices. In this paper, we survey the classification of IoT devices according to the performance and analyze the security requirements for IoT devices. Also we survey and analyze the use of cryptographic technologies in the current status of IoT open standard platform such as AllJoyn, oneM2M, IoTivity. Based on the research of cryptographic usage, we examine whether each platform satisfies security requirements. Each IoT open platform provides cryptographic technology for supporting security services such as confidentiality, integrity, authentication an authorization. However, resource constrained IoT devices such as blood pressure monitoring sensors are difficult to apply existing cryptographic techniques. Thus, it is necessary to study cryptographic technologies for power-limited and resource constrained IoT devices in unattended environments.

Implementation of Monitoring System of the Living Waste based on Artificial Intelligence and IoT (AI 및 IoT 기반의 생활 폐기물 모니터링 시스템 구현)

  • Kim, Sang-Hyun;Kang, Young-Hoon;Yoon, Dal-Hwan
    • Journal of IKEEE
    • /
    • v.24 no.1
    • /
    • pp.302-310
    • /
    • 2020
  • In this paper, we have implemented the living waste analysis system based on IoT and AI(Artificial Intelligence), and proposed effective waste process and management method. The Jeju location have the strong point to devise a stratagem and estimate waste quantization, rather than others. Especially, we can recognized the amount variation of waste to the residence people compare to the sightseer number, and the good example a specific waste duty. Thus this paper have developed the IoT device for interconnecting the existed CCTV camera, and use the AI algorithm to analysis the waste image. By using these decision of image analysis, we can inform their deal commend and a decided information to the map of the waste cars. In order to evaluate the performance of IoT, we have experimented the electromagnetic compatibility under a national official authorization KN-32, KN61000-4-2~6, and obtained the stable experimental results. In the further experimental results, we can applicable for an data structure for precise definition command by using the simulated several waste image with artificial intelligence algorithm.

Development of Identity-Provider Discovery System leveraging Geolocation Information (위치정보 기반 식별정보제공자 탐색시스템의 개발)

  • Jo, Jinyong;Jang, Heejin;Kong, JongUk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.9
    • /
    • pp.1777-1787
    • /
    • 2017
  • Federated authentication (FA) is a multi-domain authentication and authorization infrastructure that enables users to access nationwide R&D resources with their home-organizational accounts. An FA-enabled user is redirected to his/her home organization, after selecting the home from an identity-provider (IdP) discovery service, to log in. The discovery service allows a user to search his/her home from all FA-enabled organizations. Users get troubles to find their home as federation size increases. Therefore, a discovery service has to provide an intuitive way to make a fast IdP selection. In this paper, we propose a discovery system which leverages geographical information. The proposed system calculates geographical proximity and text similarity between a user and organizations, which determines the order of organizations shown on the system. We also introduce a server redundancy and a status monitoring method for non-stop service provision and improved federation management. Finally, we deployed the proposed system in a real service environment and verified the feasibility of the system.

Security Analysis and Implementation of Fast Inter-LMA domain Handover Scheme in Proxy Mobile IPv6 Networks (프록시 모바일 IPv6 네트워크에서 LMA도메인 간 핸드오버 기법의 보안성 분석 및 구현)

  • Chai, Hyun-Suk;Jeong, Jong-Pil
    • The KIPS Transactions:PartC
    • /
    • v.19C no.2
    • /
    • pp.99-118
    • /
    • 2012
  • In PMIPv6-based network, mobile nodes can be made smaller and lighter because the network nodes perform the mobility management-related functions on behalf of the mobile nodes. The one of the protocols, Fast Handovers for Proxy Mobile IPv6(FPMIPv6)[1] has studied by the Internet Engineering Task Force(IETF). Since FPMIPv6 adopts the entities and the concepts of Fast Handovers for Mobile IPv6(FMIPv6) in Proxy Mobile IPv6(PMIPv6), it reduces the packet loss. Conventional scheme has proposed that it cooperated with an Authentication, Authorization and Accounting(AAA) infrastructure for authentication of a mobile node in PMIPv6, Despite the best efficiency, without begin secured of signaling messages, PMIPv6 is vulnerable to various security threats such as the DoS or redirect attAcks and it can not support global mobility between PMIPv. In this paper, we analyze Kang-Park & ESS-FH scheme, and then propose an Enhanced Security scheme for FPMIPv6(ESS-FP). Based on the CGA method and the pubilc key Cryptography, ESS-FP provides the strong key exchange and the key independence in addition to improving the weaknesses for FPMIPv6. The proposed scheme is formally verified based on Ban-logic, and its handover latency is analyzed and compared with that of Kang-Park scheme[3] & ESS-FH and this paper propose inter-domain fast handover sheme for PMIPv6 using proxy-based FMIPv6(FPMIPv6).