• Title/Summary/Keyword: protect the environment

Search Result 1,242, Processing Time 0.026 seconds

Design of Efficient Hacking Prevention Systems Using a Smart Card (스마트카드 기반의 효율적인 해킹 방지 시스템 설계)

  • 황선태;박종선
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.2
    • /
    • pp.179-190
    • /
    • 2004
  • This paper describes the design of hacking prevention systems using a smart card. It consists of two parts, i.e., PC authentication and Keyboard-buffer hacking prevention. PC authentication function is a procedure to handle the access control to the target PC. The card's serial number is used for PIN(Personal Identification Number) and is converted into hash-code by SHA-1 hash-function to verify the valid users. The Keyboard-buffer hacking prevention function converts the scan codes into the encoded forms using RSA algorithm on the Java Card, and puts them into the keyboard-buffer to protect from illegal hacking. The encoded information in the buffer is again decoded by the RSA algorithm and displayed on the screen. in this paper, we use RSA_PKCS#1 algorithm for encoding and decoding. The reason using RSA technique instead of DES or Triple-DES is for the expansion to multi-functions in the future on PKI. Moreover, in the ubiquitous computing environment, this smart card security system can be used to protect the private information from the illegal attack in any computing device anywhere. Therefore, our security system can protect PC user's information more efficiently and guarantee a legal PC access authority against any illegal attack in a very convenient way.

  • PDF

A Study on the Minimum Protection of Investor in International Contract (국제계약에서 투자가보호를 위한 최소보호요건에 관한 연구)

  • Kim, Jae Seong
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.58
    • /
    • pp.313-328
    • /
    • 2013
  • Today FTA extends over the world and Korea as a main member of international trade is no exception. In the past Korea, as the developing countries, has made endlessly effort to induce foreign investment from foreign enterprise and/or government to be a truly OECD countries today and made it. Korea's trade economy was reached 1 trillion dollars in 2012. Now we have to find a new way to produce, process, procure goods from foreign investment and also need to protect our profit and/or rights within foreign judicial territory. There are two method to protect foreign enterprise or government. First they rely on general principles in WTO or Bilateral Investment Treaty that the principle of equality, national treatment, and most-favored-nation treatment, you can create a predictable environment to protect foreign enterprise and/or government. Second they need to incorporate contractual clauses in their agreement such as stabilization clause, force majeure, arbitration, governing law or sovereign immunity. Of course there are many things left behind to consider I hope it will be helpful to those who prepare foreign investment contract.

  • PDF

The Relationship between circulation of precipitation and urbanization (생태학적 측면에서 고찰한 빗물 순환체계와 도시화와의 관계)

  • 이은희
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.24 no.4
    • /
    • pp.123-131
    • /
    • 1997
  • Since the industrial revolution. the growth of cities has been especially apid and the rate of ulbanization has been high. This urban development is encroaching on the natural environment because the cities are developed with not only residential estates, industrial area and buildings but also with infrastructure. The surface area of the city is sealed ,with pavement whereas nature is disturbed and modified. The hydrological cycle in the city is inf1uenced by the change of land use I. e., from forest to agricultural land, talc draining of wetlands and above all the increase of built-up areas. The surface retention and interception of precipitation in the city is reduced. because the surface area is now smooth and solid. The characteristics of the hydrological cycle in the city are increased runoff, reduced evapotranspiration and infiltraction . We have too much faith in technology although it may cause more unforseen problems. We build more river banks and 'emulation dams and straighten rivers and streams in order to protect ourselves from disasters.. However. the results of hose developments are often higher$.$ water levels, the disturbance of aquatic ecosystems and the reduction of biodiversity. Therefore, we should examine problems from the hydrological cycle in cities and study a natural system as close cities to nature as possible. This paper shows the problems caused by the hydrological cycle in the city. The ecology-oriented method and design must be used in order to protect our environment from dicturbance.

  • PDF

A Study on Surface Landscape Change and Sedimentary Environment of the Dongcheon Estuary through Aerial Photographs and Sediment Analysis (항공사진 및 퇴적물 분석을 통한 순천 동천하구의 지표경관 변화 및 퇴적환경 연구)

  • Lee, Ye-Seul;Lim, Jeong-Cheol;Jang, Dong-Ho
    • Journal of The Geomorphological Association of Korea
    • /
    • v.28 no.1
    • /
    • pp.35-50
    • /
    • 2021
  • In this study, we analyzed the changes in the topographical landscape and the sedimentary environment to evaluate the ecological value of the Dongcheon Estuary and protect the wetland, and presented the conservation management method of the Dongcheon Estuary. Based on the result of topographical landscape analysis, agricultural land tended to decrease continuously, and artificial structures gradually increased. Moreover, in sediment analysis, the Dongcheon Estuary showed both the characteristics of river sediments and coastal sediments, and in some areas problems such as acidification and nutritional imbalance appeared. Therefore, in order to protect and manage the Dongcheon Estuary with high ecological value, it is necessary to limit the development around micro topography and minimize the artificial damage in the Dongcheon Estuary. In addition, efforts such as securing facilities for reducing pollutants and freshwater wetlands for pollutants, that flow in from nonpoint pollutants are required.

A Study on Hidden Node Margin to Protect DTV Service in Korea (국내 DTV 서비스 보호를 위한 은닉 노드 마진 연구)

  • Kang, Kyu-Min;Cho, Sang-In;Jeong, Byung-Jang
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.22 no.12
    • /
    • pp.1165-1171
    • /
    • 2011
  • In this paper, we investigate hidden node problem to effectively utilize TV band devices(TVBDs) in the TV white space(TVWS), and also to protect digital television(DTV) service in Korea. Firstly, we classify the radio propagation environment into an urban area, a basin area, and a coastal area based on geographical characteristics. Thereafter, we measure and analyze local shape based hidden node attenuation at eight segmented positions in each geographic area. Because commercial buildings as well as residential and commercial buildings in Korea are located in closer proximity to each other than in other countries, hidden node margin should be more than 38 dB in order to safely protect DTV service in Korea.

Privacy Protection and RFID(Radio Frequency IDentification) (RFID와 프라이버시 보호)

  • Lee, Cheol-Ho
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.443-446
    • /
    • 2006
  • RFID is the core of realizing ubiquitous environment. This is expected to improve economical effect through related industry revitalization, make-work, and so on, in the future, and to be linked to social see-through enhancement via national life change. However unchecked RFID use lets retailers collect unprecedented huge information and they link it to customer information database, so the voice of worry to bring about a result of trampling down consumer privacy doesn't make a negligible situation. Although RFID system is spreaded out socially, the servicing of law and system is not accomplished to protect individuals from personal information violation threat. At the same time, in ubiquitous computing environment, to protect individual information efficiently, from the step of planning and deciding this technology system, constitutional law, norm, the basic legal rights of the people, and so forth is to be considered. The objective of the research is to persent the privacy protection from the viewpoints of law on RFID.

  • PDF

Derivation of Agricultural Water Quality Guidelines for Heavy Metals in Korea (국내 농업용수의 유해중금속 수질권고기준 도출)

  • An, Youn-Joo;Baek, Yong-Wook;Lee, Woo-Mi;Yoon, Chun-Gyeong
    • Journal of Korean Society on Water Environment
    • /
    • v.24 no.5
    • /
    • pp.533-536
    • /
    • 2008
  • Korean water quality guidelines for agricultural were derived to protect agricultural water uses according to the Canadian methodology. The adverse effect of heavy metals in agricultural water was of concern due to its persistence, bioaccumulation and ecotoxicity to crop plants. The ecotoxicity data of cadmium, copper, lead, and zinc were collected for the crops grown in Korea, and used to estimate the species maximum acceptable toxicant concentration (SMATC), which corresponds to the water quality guideline. Values of irrigation per year and soil bulk density were revised to reflect the Korean situation. The estimated guideline values for cadmium, copper, lead, and zinc were 0.01, 0.5, 0.1, and 1.0 mg/L, respectively. These values are in agreement with the agricultural water quality guidelines of foreign countries and current Korean water quality standard for the protection of public health. Current water quality standards in agricultural uses were for management of public water resource, and was not prepared to protect crop plants from contaminants. The results of this study will be a basis for the designation of Korean water quality guidelines for the protection of agricultural water uses in the future.

Why Dynamic Security for the Internet of Things?

  • Hashemi, Seyyed Yasser;Aliee, Fereidoon Shams
    • Journal of Computing Science and Engineering
    • /
    • v.12 no.1
    • /
    • pp.12-23
    • /
    • 2018
  • The Internet of Things (IoT) ecosystem potentially includes heterogeneous devices with different processing mechanisms as well as very complicated network and communication models. Thus, analysis of data associated with adverse conditions is much more complicated. Moreover, mobile things in the IoT lead to dynamic alteration of environments and developments of a dynamic and ultra-large-scale (ULS) environment. Also, IoT and the services provided by that are mostly based on devices with limited resources or things that may not be capable of hosting conventional controls. Finally, the dynamic and heterogeneous and ULS environment of the IoT will lead to the emergence of new security requirements. The conventional preventive and diagnostic security controls cannot sufficiently protect it against increasing complication of threats. The counteractions provided by these methods are mostly dependent on insufficient static data that cannot sufficiently protect systems against sophisticated and dynamically evolved attacks. Accordingly, this paper investigates the current security approaches employed in the IoT architectures. Moreover, we define the dynamic security based on dynamic event analysis, dynamic engineering of new security requirements, context awareness and adaptability, clarify the need for employment of new security mechanism, and delineate further works that need to be conducted to achieve a secure IoT.

Suggestion the Rational Items with Comparison and Review for Designing of Buffering Retention Facility (완충저류시설 설계 시 고려사항 분석을 통한 합리적 항목 제시)

  • Ahn, Sang Hyun;Jung, Younghun;Kwak, Jaesang;Um, Myoung-Jin
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.1
    • /
    • pp.23-34
    • /
    • 2022
  • Korea Government promotes the installation of buffering retention facility to protect the water environment and prevent the environmental contamination event by toxic materials. Although the buffering retention facility is very important to protect the natural environment through the retention of accidental pollution and initial runoff, much study has not been done to suggest the guide line for the design of the facility. In this study, we suggested the rational items for the design of buffering retention facility based on many experts after we investigated and compared the previous results of many design materials.

Content Distribution Framework and UCI Application Process (콘텐츠 유통 프레임워크와 UCI 응용 프로세스)

  • Cho Kwang-Moon;Lee Seong-Hoon
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.11a
    • /
    • pp.627-632
    • /
    • 2005
  • The online distribution systems under the wireless environment include many different factors from the conventional offline and wired networks. Furthermore, the multimedia content may be propagated more easily and illegally. The scheme to protect the rights and profits of people related to the copyrights of digital content Is needed. In this paper a framework for content distribution under the wireless environment based on MPEG-21 and UCI application process are proposed. This model can be applied to the digital rights management system and utilized to protect the rights of trading entities in online distribution of electronic commerce.

  • PDF