• Title/Summary/Keyword: credential management

Search Result 33, Processing Time 0.018 seconds

Health promotion lifestyle to the selection factors of dental institutions among some office workers (일부 직장근로자들의 건강증진생활양식에 따른 치과의료기관 선택 요인)

  • Song, Bok-Nyeo;Song, Kwui-Sook;Jang, Sun-Hee
    • Journal of Korean society of Dental Hygiene
    • /
    • v.12 no.1
    • /
    • pp.179-187
    • /
    • 2012
  • Objectives : The purpose of this study was to examine the influential factors for the choice of dental institutions among adult office workers who were one of major medical consumer groups, the relationship between their health promotion lifestyle and their choice of dental institutions, ways of boosting the efficiency of hospital management and differences in differentiation strategies among dental institutions. Methods : The subjects in this study were 160 office workers who were aged 20 and over and worked in Seoul, North Jeolla Province and South Jeolla Province. They were selected by convenience sampling, and a survey was conducted from February 1 to July 20, 2011. The answer sheets from 149 respondents were analyzed by the statistical package SPSS WIN 12.0 except for 11 incomplete ones. Results : As for the selection factors of dental institutions by general characteristics, they attached a statistically and significantly different importance to convenience according to gender(p<0.05), to reliability, facilities and cleanness according to age(p<0.05), to reliability and convenience according to academic credential(p<0.05) and to facilities and cleanness according to academic credential(p<0.01). Concerning the links between the form of using dental institutions and the selection factors of dental institutions, they gave a statistically and significantly different weight to reliability according to that(p<0.05). Convenience(p<0.001) was the primary selection factor of dental institutions among those who scored higher in health promotion lifestyle. Conclusions : Given the above-mentioned findings, it seemed that the regular implementation of oral health plans geared toward workers and the development of educational programs are required to promote the oral health of workers. But this study examined the workers in several regions only, and the findings might not be generalizable.

Design and Implement a Forgery-safe Blockchain-based Academic Credential Verification System (위변조에 안전한 블록체인 기반 학력 검증 시스템 설계 및 구현)

  • Jung-oh Park
    • Journal of Industrial Convergence
    • /
    • v.21 no.7
    • /
    • pp.41-49
    • /
    • 2023
  • In recent years, various educational institutions have used online certificate services to verify academic achievement related to graduation and grades. However, the certificate of the existing system has limitations in verifying and tracking whether it is true or not and detailed academic background. In this regard, cases of forgery/falsification of online/offline certificates continue to occur. This study proposes a blockchain-based verification method that is safe from forgery and alteration, focusing on university institutions. Necessary information such as detailed class categories for each department, attendance, and detailed grades was collected/analyzed to create a linkage relationship through blockchain. In addition, the system/network environment required for blockchain sharing was considered, and it was implemented as an extension module in the form of an independent web application. As a result of the block chain verification, it was proved that the safe trust verification of educational information and the relationship between detailed information can be traced. This study aims to contribute to the improvement of academic credential verification services and information security for Korean educational institutions in the future.

A Study on KOREA SCMS Analysis and Improvement Method (한국 V2X 보안인증체계 분석 및 개선방향 연구)

  • Eom, Sungwook;Kim, Donghwan;Kim, Sungsub;Cho, Sungwoo
    • Journal of Auto-vehicle Safety Association
    • /
    • v.13 no.1
    • /
    • pp.31-37
    • /
    • 2021
  • SCMS is a security credential management system for V2X communication, which performs generation/ provision/validation of device's security certificates. In this paper, we will explain about the main functions of SCMS and the role of each institution, and propose the following improvement measures in the process of establishing the Korean V2X security certification system. First, connection scheme of ERA (Enrollment certificate RA) between SCMS and Vehicle Manager Information System (VIMS) will be proposed. Second part is the problem of certificate revocation and proposal of improvements.

A study on DID self-sovereign identity for digital content management (디지털 콘텐츠 자기주권 신원 관리를 위한 DID 연구)

  • Baek, YeongTae;Min Youn, A
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.395-396
    • /
    • 2020
  • 본 논문에서는 디지털 콘텐츠의 유통과정의 복잡함과 창작자에 대한 권리를 보장하기 위하여 블록체인 기반 플랫폼을 통하여 투명하고 무결성이 보장된 자기권한 관리가 가능하도록 DID(Decentralized Identity)의 적용을 연구하였다. DID의 효율적 적용을 위하여 DID문서와 Verifiable Credential과 presentation의 관리상 특징을 고려하고 DID를 통한 인증과정에서 발생하는 다양한 메타데이터에 대하여 차별화된 암호화 기법적용이 가능하도록 하였다. 본 논문의 연구를 통하여 디지털 콘텐츠에 대한 자기권한 관리가 보다 간단해지고 권리인증 과정 시 안정된 성능 제공이 가능할 것으로 사료된다.

  • PDF

An optimal security management framework for backhaul-aware 5G- Vehicle to Everything (V2X)

  • Vishal Sharma;Jiyoon Kim;Yongho Ko;Ilsun You;Jung Taek Seo
    • Journal of Internet Technology
    • /
    • v.21 no.1
    • /
    • pp.249-264
    • /
    • 2020
  • Cellular (C) setups facilitate the connectivity amongst the devices with better provisioning of services to its users. Vehicular networks are one of the representative setups that aim at expanding their functionalities by using the available cellular systems like Long Term Evolution (LTE)-based Evolved Universal Terrestrial Radio Access Network (E-UTRAN) as well as the upcoming Fifth Generation (5G)-based functional architecture. The vehicular networks include Vehicle to Vehicle (V2V), Vehicle to Infrastructure (V2I), Vehicle to Pedestrian (V2P) and Vehicle to Network (V2N), all of which are referred to as Vehicle to Everything (V2X). 5G has dominated the vehicular network and most of the upcoming research is motivated towards the fully functional utilization of 5G-V2X. Despite that, credential management and edge-initiated security are yet to be resolved under 5G-V2X. To further understand the issue, this paper presents security management as a principle of sustainability and key-management. The performance tradeoff is evaluated with the key-updates required to maintain a secure connection between the vehicles and the 5G-terminals. The proposed approach aims at the utilization of high-speed mmWave-based backhaul for enhancing the security operations between the core and the sub-divided functions at the edge of the network through a dual security management framework. The evaluations are conducted using numerical simulations, which help to understand the impact on the sustainability of connections as well as identification of the fail-safe points for secure and fast operations. Furthermore, the evaluations help to follow the multiple tradeoffs of security and performance based on the metrics like mandatory key updates, the range of operations and the probability of connectivity.

Study on Remote Data Acquisition Methods Using OAuth Protocol of Android Operating System (안드로이드 환경의 OAuth 프로토콜을 이용한 원격지 데이터 수집 방법 연구)

  • Nam, Gi-hoon;Gong, Seong-hyeon;Seok, Byoung-jin;Lee, Changhoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.111-122
    • /
    • 2018
  • Using OAuth protocol, third-party applications on the Android operating system use user's credentials or access tokens that have access authority on user's resources to gain user's account and personal information from account information providers. These credentials and token information are stored in the device by the OAuth data management method provided by the Android operating system. If this information is leaked, the attacker can use the leaked credential and token data to get user's personal data without login. This feature enables the digital forensic investigator to collect data directly from the remote server of the services used by the target of investigation in terms of collecting evidence data. Evidence data collected at a remote location can be a basis for secondary warranties and provide evidence which can be very important evidence when an attacker attempts to destroy evidence, such as the removal of an application from an Android device. In this paper, we analyze the management status of OAuth tokens in various Android operating system and device environment, and show how to collect data of various third party applications using it. This paper introduces a method of expanding the scope of data acquisition by collecting remote data of the services used by the subject of investigation from the viewpoint of digital forensics.

Community Health Education (지역사회 보건교육)

  • Lee, Ju-Yul;Park, Chun-Man;Suh, Mee-Kyung;Choi, Eun-Jin
    • Korean Journal of Health Education and Promotion
    • /
    • v.24 no.4
    • /
    • pp.241-249
    • /
    • 2007
  • Health education aims at behavior change rather than just delivering health knowledge to people. In Korea health education activities in public sector began in 1960 and they were included in the primary prevention program in communities. This article reviewed current health education programs in healthy living practice programs provided by local public health centers in Korea and drew implications for the future role of health education in community setting. Health education has been a core function of the National Health Promotion programs in the nation since the enactment of the National Health Promotion Law in 1995. The National Health Promotion programs are funded by the National Health Promotion Fund which are drawn from tobacco tax. The National Health Promotion programs include healthy living practice programs (smoking prevention and cessation programs, moderate alcohol use programs, physical activity promotion programs, and nutrition programs), chronic disease prevention programs, oral health programs and public hygiene programs. Methods of the National Health Promotion programs include health education, health counseling, health class, health information management, survey and research. Smoking prevention and cessation programs include smoking cessation clinic, smoking cessation education, non-smoking environment program, and non-smoking campaign. Moderate alcohol use programs include alcohol use education, moderate alcohol use campaign, alcohol use counseling, and alcohol free environment programs. Physical activity promotion programs include obesity control, targeted exercise program, and exercise civic group programs. Nutrition programs include nutrition management, obesity management, nutrition education, breakfast eating program, and nutrition counseling and treatment programs. The health education programs in community are not efficient today because there are many overlapping contents and short term goals. Community health education programs needs to be more comprehensive. Workforce development is another big issue at the moment because the National credential program will begin in 2009. Variety of community health education programs should be developed and funded by the national health promotion fund.

Secure De-identification and Data Sovereignty Management of Decentralized SSI using Restructured ZKP (재구성된 영지식 증명을 활용한 탈중앙형 자기 주권 신원의 안전한 비식별화 및 데이터 주권 관리)

  • Cho, Kang-Woo;Jeon, Mi-Hyeon;Shin, Sang Uk
    • Journal of Digital Convergence
    • /
    • v.19 no.8
    • /
    • pp.205-217
    • /
    • 2021
  • Decentralized SSI(Self Sovereign Identity) has become an alternative to a new digital identity solution, but an efficient de-identification technique has not been proposed due to the unique algorithmic characteristics of data transactions. In this study, to ensure the decentralized operation of SSI, we propose a de-identification technique that does not remove identifiers by restructuring the verification results of ZKP (Zero Knowledge Proof) into a form that can be provided to the outside by the verifier. In addition, it is possible to provide restructured de-identification data without the consent of data subject by proposing the concept of differential sovereignty management for each entity participating in verification. As a result, the proposed model satisfies the domestic personal information protection law in a decnetralized SSI, in addition provides secure and efficient de-identification processing and sovereignty management.

After-School Care and Education (방과후 아동지도)

  • Suh, Young-Sook;Park, Jin-Ock;Suh, Hye-Jeon
    • Korean Journal of Child Studies
    • /
    • v.30 no.6
    • /
    • pp.281-295
    • /
    • 2009
  • Representative services of the afterschool in Korea are After-Schools of the Ministry of Education, Science and Technology, Community Child Centers, After-school Child Care, and Youth After-school Academy of the Ministry of Health, Welfare and Family. Each service is distinguished with its own founded laws, subject children, specialists, principle management agent, a number of participants, and more. Research issues of afterschool are development of new afterschool programs, evaluatjon of the effectiveness of the afterschool, establishment of policies related to cooperative efforts among the different services of the afterschool, obtainment of legal status, and enhancement of the credential of its personnels. To guarantee the quality of the Afterschool and improve personnels' working conditions, various means are to be implemented. In regard to programatic and policy issues, the afterschool is needed to establish a system for training the afterschool coordinators and of its accreditation and to develop more child-centered afterschool programs. Also, it is needed to legislate fundamental law and consolidate communication system among the services of the Afterschool in pursue of their effective utilization and actual expansion.

  • PDF

Design of an Authentication System Based on Personal Identity Verification Card (전자신분증 기반의 개인 신분확인을 위한 인증시스템 설계)

  • Park, Young-Ho;Kong, Byung-Un;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.8
    • /
    • pp.1029-1040
    • /
    • 2011
  • Electronic identity (e-ID) card based on smartcard is a representative identity credential for on-line and off-line personal identification. The e-ID card can store the personal identity information securely, so that the information can be accessed fast, automated identity verification and used to determine the cardholder's authorization to access protected resources. Due to such features of an e-ID card, the number of government organizations and corporate enterprises that consider using e-ID card for identity management is increasing. In this paper, we present an authentication framework for access control system using e-ID cards by discussing the threat environment and security requirement against e-ID card. Specifically, to accomplish our purpose, we consider the Personal Identity Verification system as our target model.