• Title/Summary/Keyword: authorization

Search Result 502, Processing Time 0.022 seconds

Technical Review on Methodology of Generating Exposure Scenario in eSDS of EU REACH (유럽 신화학물질관리제도의 eSDS에 첨부되는 노출시나리오 작성법 개발 동향)

  • Choe, Eun-Kyung;Kim, Jong-Woon;Kim, Sang-Hun;Byun, Sung-Won
    • Clean Technology
    • /
    • v.17 no.4
    • /
    • pp.285-299
    • /
    • 2011
  • As one of the REACH obligations, the extended safety data sheet (eSDS) should be communicated within the supply chain under the REACH Regulation. Based on technical guidance documents published on the ECHAs website and survey of EU's recent REACH-related informations, this paper includes a study on details of how to develop exposure scenarios (ES) such as structure of ES, process of ES develpoment, standard workflows and key input data to develop ES with an introduction of eSDS concept. This paper also contains an overview on operational conditions (OCs) and risk management measures (RMMs) that are what to consider when building an ES. The structure of Chesar (Chemical Safety Assessment and Report tool) developed by European Chemicals Agency (ECHA) is studied with a review of the available exposure estimation tools for workers, environment and consumers. Case example of generic exposure scenario (GES) for organic solvent is presented. To guide Korean EU-exporting companies, their participating roles in three steps of preparing ES are addressed.

Analysis of IoT Open-Platform Cryptographic Technology and Security Requirements (IoT 오픈 플랫폼 암호기술 현황 및 보안 요구사항 분석)

  • Choi, Jung-In;Oh, Yoon-Seok;Kim, Do-won;Choi, Eun Young;Seo, Seung-Hyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.7
    • /
    • pp.183-194
    • /
    • 2018
  • With the rapid development of IoT(Internet of Things) technology, various convenient services such as smart home and smart city have been realized. However, IoT devices in unmanned environments are exposed to various security threats including eavesdropping and data forgery, information leakage due to unauthorized access. To build a secure IoT environment, it is necessary to use proper cryptographic technologies to IoT devices. But, it is impossible to apply the technologies applied in the existing IT environment, due to the limited resources of the IoT devices. In this paper, we survey the classification of IoT devices according to the performance and analyze the security requirements for IoT devices. Also we survey and analyze the use of cryptographic technologies in the current status of IoT open standard platform such as AllJoyn, oneM2M, IoTivity. Based on the research of cryptographic usage, we examine whether each platform satisfies security requirements. Each IoT open platform provides cryptographic technology for supporting security services such as confidentiality, integrity, authentication an authorization. However, resource constrained IoT devices such as blood pressure monitoring sensors are difficult to apply existing cryptographic techniques. Thus, it is necessary to study cryptographic technologies for power-limited and resource constrained IoT devices in unattended environments.

Implementation of Monitoring System of the Living Waste based on Artificial Intelligence and IoT (AI 및 IoT 기반의 생활 폐기물 모니터링 시스템 구현)

  • Kim, Sang-Hyun;Kang, Young-Hoon;Yoon, Dal-Hwan
    • Journal of IKEEE
    • /
    • v.24 no.1
    • /
    • pp.302-310
    • /
    • 2020
  • In this paper, we have implemented the living waste analysis system based on IoT and AI(Artificial Intelligence), and proposed effective waste process and management method. The Jeju location have the strong point to devise a stratagem and estimate waste quantization, rather than others. Especially, we can recognized the amount variation of waste to the residence people compare to the sightseer number, and the good example a specific waste duty. Thus this paper have developed the IoT device for interconnecting the existed CCTV camera, and use the AI algorithm to analysis the waste image. By using these decision of image analysis, we can inform their deal commend and a decided information to the map of the waste cars. In order to evaluate the performance of IoT, we have experimented the electromagnetic compatibility under a national official authorization KN-32, KN61000-4-2~6, and obtained the stable experimental results. In the further experimental results, we can applicable for an data structure for precise definition command by using the simulated several waste image with artificial intelligence algorithm.

Development of Identity-Provider Discovery System leveraging Geolocation Information (위치정보 기반 식별정보제공자 탐색시스템의 개발)

  • Jo, Jinyong;Jang, Heejin;Kong, JongUk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.9
    • /
    • pp.1777-1787
    • /
    • 2017
  • Federated authentication (FA) is a multi-domain authentication and authorization infrastructure that enables users to access nationwide R&D resources with their home-organizational accounts. An FA-enabled user is redirected to his/her home organization, after selecting the home from an identity-provider (IdP) discovery service, to log in. The discovery service allows a user to search his/her home from all FA-enabled organizations. Users get troubles to find their home as federation size increases. Therefore, a discovery service has to provide an intuitive way to make a fast IdP selection. In this paper, we propose a discovery system which leverages geographical information. The proposed system calculates geographical proximity and text similarity between a user and organizations, which determines the order of organizations shown on the system. We also introduce a server redundancy and a status monitoring method for non-stop service provision and improved federation management. Finally, we deployed the proposed system in a real service environment and verified the feasibility of the system.

Security Analysis and Implementation of Fast Inter-LMA domain Handover Scheme in Proxy Mobile IPv6 Networks (프록시 모바일 IPv6 네트워크에서 LMA도메인 간 핸드오버 기법의 보안성 분석 및 구현)

  • Chai, Hyun-Suk;Jeong, Jong-Pil
    • The KIPS Transactions:PartC
    • /
    • v.19C no.2
    • /
    • pp.99-118
    • /
    • 2012
  • In PMIPv6-based network, mobile nodes can be made smaller and lighter because the network nodes perform the mobility management-related functions on behalf of the mobile nodes. The one of the protocols, Fast Handovers for Proxy Mobile IPv6(FPMIPv6)[1] has studied by the Internet Engineering Task Force(IETF). Since FPMIPv6 adopts the entities and the concepts of Fast Handovers for Mobile IPv6(FMIPv6) in Proxy Mobile IPv6(PMIPv6), it reduces the packet loss. Conventional scheme has proposed that it cooperated with an Authentication, Authorization and Accounting(AAA) infrastructure for authentication of a mobile node in PMIPv6, Despite the best efficiency, without begin secured of signaling messages, PMIPv6 is vulnerable to various security threats such as the DoS or redirect attAcks and it can not support global mobility between PMIPv. In this paper, we analyze Kang-Park & ESS-FH scheme, and then propose an Enhanced Security scheme for FPMIPv6(ESS-FP). Based on the CGA method and the pubilc key Cryptography, ESS-FP provides the strong key exchange and the key independence in addition to improving the weaknesses for FPMIPv6. The proposed scheme is formally verified based on Ban-logic, and its handover latency is analyzed and compared with that of Kang-Park scheme[3] & ESS-FH and this paper propose inter-domain fast handover sheme for PMIPv6 using proxy-based FMIPv6(FPMIPv6).

Improvement Devices of Urban Center′s Green Function of the Public Open Space Attached Building in Incheon, Korea (인천시 공개공지의 도심 녹지 기능 개선 방안)

  • Cho, Woo;Lee, Yong-Joo;Lee, Kyung-Jae
    • Korean Journal of Environment and Ecology
    • /
    • v.17 no.3
    • /
    • pp.258-267
    • /
    • 2003
  • The purpose of this study is to present improvement devices of urban center's green function in the Public Open Space Attached Building(P.O.S.) in Incheon, Korea. Study sites were the P.O.S. of office building(10 place), transportation facility building(3 places), government office building(2 places) that were made up 1994∼2002 and analyzed establishment, using and planting status. And P.O.S.'s planting area structure of Osaka and Kawasaki in Japan that is operating P.O.S. system similar to Korea was compared with study sites of Incheon. P.O.S. of Incheon is not managing as valuable urban center's green and establishing to satisfy legal requirement. The strengthening devices of P.O.S. function are as follows. First, it is desirable that planting area rate of P.O.S. in order to develop small park in urban center is increasing by 40% that is children's park level. Second, it must be conferred about planting basis, tree selection and planting method etc. of P.O.S. with green and park development department at building authorization. Third, by the 'landscape planting standard of plottage' that is becoming planting standard of P.O.S is heightened and must increase quality and amount of green. Fourth, it is required mandatory establishing of sign so that citizens can search easily and utilize of P.O.S. Fifth, legal regulation should be decided to prevent that P.O.S. is used unlike purpose originally.

Hybrid PKI Public Certificate Security Method Based on Device ID (디바이스 ID 기반의 하이브리드 PKI 공인 인증 보안 기법)

  • Son, Young-Hwan;Choi, Woon-Soo;Kim, Ki-Hyun;Choi, Han-Na;Lee, Dae-Yoon;Oh, Chung-Shick;Cho, Yong-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.5
    • /
    • pp.113-124
    • /
    • 2010
  • In this study, the hybrid authorization quotation technique is based on the device ID for the integrity of the source region guarantee of user certificate, in order to improve the convenience and security for user in the hybrid PKI certificate Mechanism for authentication. The feature of the model in which it is presented from this paper is 5. First, because the user can select the policy himself in which it matches with each authentication situation and security level, the convenience can be improved. Second, the integrity of the source region of the user certificate can be guaranteed through the comparison of the DLDI Key, that is the hash-value of the device ID. Third, the security can be improved by continuously changing an encoding, and the value of the key in which it decodes through the EOTP Key. Fourth, the index value is added to a certificate, and the storage of a certificate is possible at the Multi-Device. Fifth, since the addi the inan aratus for the integrity of the source region guarantee of a certificate is not needed, the authentication process time can be reduced and the computational load of the certificate server can be reduced also.

Approved Exporter Status in Korea (한국의 인증수출자 제도에 관한 법적 고찰)

  • Lee, Chang-Sook;Kim, Jong-Chill
    • International Commerce and Information Review
    • /
    • v.13 no.4
    • /
    • pp.351-373
    • /
    • 2011
  • Certificates of Origin(C/O) are necessary to gain benefits from preferential tariff treatment under the Free Trade Agreement(FTA). The C/O can be issued by issuing authorities or by exporters themselves. Recently, due to signed FTA such as Korean-EU FTA, issuance of self-declared C/O by exporters is increasing. In order to be qualified to issue self -declared C/O, exporters are required to acquire Approved Exporter status. An Approved Exporter is only required to present an invoice to substitute the certificate. The invoice contains an Approved Exporter number and a declaration that states the goods comply with the origin requirements. Either certification or notarization is not necessary. In result, the exporters are responsible for application of a preferential tariff under the self-declared C/O which issued incorrectly, even if it is not intentional. Therefore, in this paper, we studied authorization for Approved Exporter status and the practical use of its status. If companies obtain more Approved Exporter status, the effects of FTA would be maximized due to application of a preferential tariff under the C/O.

  • PDF

Effect of Sn Decorated MWCNT Particle on Microstructures and Bonding Strengths of the OSP Surface Finished FR-4 Components Assembled with Sn58%Bi Composite Solder Joints (OSP 표면처리된 FR-4 PCB기판과 Sn58%Bi 복합솔더 접합부의 미세조직 및 접합강도에 미치는 Sn-MWCNT의 영향)

  • Park, Hyun-Joon;Lee, Choong-Jae;Min, Kyung Deuk;Jung, Seung-Boo
    • Journal of the Microelectronics and Packaging Society
    • /
    • v.26 no.4
    • /
    • pp.163-169
    • /
    • 2019
  • Sn-Pb solder alloys in electronics rapidly has been replaced to Pb free solder alloys because of various environmental regulations such as restriction of hazardous substances directive (RoHS), European Union waste electrical, waste electrical and electronic equipment (WEEE), registration evaluation authorization and of chemicals (REACH) etc. Because Sn58%Bi (in wt.%) solder alloy has low melting point and higher mechanical properties than that of Sn-Pb solder, it has been studied to manufacture electronic components. However, the reliability of Sn58%Bi solder could be lowered because of the brittleness of Bi element included in the solder alloy. Therefore, we observed the microstructures of Sn58%Bi composite solders with various contents of Sn-decorated multiwalled carbon nanotube (Sn-MWCNT) particles and evaluated bonding strength of the FR-4 components assembled with Sn58%Bi composite solder. Also, microstructures and bonding strengths of the Sn58%Bi composite solder joints were evaluated with the number of reflows from 1 to 7 times, respectively. Bonding strengths and fracture energies of the Sn58%Bi composite solder joints were measured by die shear test. Microstructures and fracture modes were observed with scanning electron microscope (SEM). Microstructures in the Sn58%Bi composite solder joints were finer than that of only Sn58%Bi solder joint. Bonding strength and fracture energy of Sn58%Bi composite solder including 0.1 wt.% of Sn-decorated MWCNT particles increased up to 20.4% and 15.4% at 5 times in reflow, respectively.

Development of the High_frequency and Low_strain Vibration Stimulation System for Stimulating Bone (고주파 저스트레인 골자극 인가용 진동 시스템 개발)

  • Yoo, Ju-Yeon;Park, Guen-Chul;Jeon, Ah-Young;Kim, Yun-Jin;Ro, Jung-Hoon;Jeon, Gye-Rok
    • Journal of Biomedical Engineering Research
    • /
    • v.32 no.2
    • /
    • pp.177-184
    • /
    • 2011
  • In this study, the system for application of the bone stimulation was implemented using high frequency and low strain method. The whole system consists of the high frequency and low strain vibration stimulation system 177 for stimulating bone, LVDT sensor, and wireless sensor based on tri-axial accelerometer. To evaluate the usefulness of the system, the frequencies and accelerations from function generator were applied to the vibration stimulation system. The range of frequency was 17 Hz, 30 Hz, 45 Hz, 50 Hz and the range of acceleration was set 0.3 g, 0.6 g, 1g, and 2 g. The measured frequencies and acceleration using LVDT (linear variable difference transformer) sensor and 3-axial accelerometer were estimated and compared. The range of frequencies average difference was from 0.0 to 0.004 Hz. As the standard deviation of frequencies estimated by LVDT sensor and accelerometer was below 0.03 Hz and the output frequencies of function generator were similar: Also the results of t-test were satisfied with conditions of p > 0.05. And the acquired frequencies and acceleration from vibration measuring device module were estimated and analyzed. As the mean of accelerations was similar to the acceleration applied from function generator. And the standard deviation of acceleration estimated from vibration measuring device module was ranged from 0.019 g to 0.038 g. Also the results of t-test were satisfied with conditions of p > 0.05. Therefore, these results were airy similar to the acceleration applied from function generator. As a result, the usefulness of the system was confirmed. n a further study, clinical experiment will be carried out with the authorization of IRB (institutional review board) so that appropriate frequency and strain would be investigated in clinical field.