• Title/Summary/Keyword: 안전인증

Search Result 2,790, Processing Time 0.036 seconds

A Study on the Improvement of HACCP Evaluation Items in Small Scale Meat Packaging Plant (소규모 식육포장처리업 HACCP 평가항목 개선 연구)

  • Jung, Sung-Won;Cho, Seok-Hyun;Back, Seung-Hee;Kong, Hong-Sik;Nam, In-Sik
    • Korean Journal of Organic Agriculture
    • /
    • v.27 no.4
    • /
    • pp.437-452
    • /
    • 2019
  • The HACCP evaluation standards for the meat packaging plant are divided into general scale HACCP evaluation standard and small scale HACCP evaluation standard. There are 69 evaluation items in the general scale HACCP evaluation criteria, of which 54 items in the prerequisite management and 15 items in the HACCP management are included. The number of small scale HACCP evaluation items are 20 and about 29% of the general scale HACCP evaluation items. This may not be enough to produce a safety livestock products for the purpose of implementing the HACCP system due to the nature of the meat packaging plant, which does not show much difference in the production process or method of product depending on the scale. To improve the small scale HACCP evaluation standard, the importance of each item was compared with the small scale HACCP evaluation based on the rate of non-compliance and the severity levels in the general scale HACCP evaluation items. As a result of the study, 8 items were derived from the prerequisites management, 2 items were derived from the HACCP management, and some similar evaluation items were grouped together. Finally, 10 items were added to the 20 items of the existing small scale HACCP evaluation items. In this study, study on the safety management of domestic livestock products are continuously carried out, so that it is possible to provide safety livestock products to consumers and contributes to securing competitiveness of domestic livestock industry.

A Study on Children's Rights and Happiness for Building Child Friendly Cities - Comparative study between elementary and middle school students (아동친화도시 구축을 위한 아동권리와 행복감에 관한 연구 -초등학생과 중학생의 비교연구)

  • Kim, Woong-Soo
    • Journal of Digital Convergence
    • /
    • v.15 no.2
    • /
    • pp.485-491
    • /
    • 2017
  • Child friendly cities are to be prepared to create a community environment that allows children to live happily when children's rights are created when the environment in which children's rights are guaranteed is created. Therefore, this study examined the relationship between children's rights and happiness and explored what needed to be done to build child friendly cities for children. For this purpose, 1,000 elementary and middle school students in W district with the certification of child friendly cities were surveyed and analyzed. From the results of this study, first, elementary students were more aware of children's rights than middle school students. Second, children's rights affecting happiness appeared as health, social services, and educational environment. Third, children's rights affecting happiness were found to vary according to the level of school. Housing, safety and protection, and educational resources were important for elementary school students, and health and social services, and safety and protection were important for middle school students. Based on the results of this study, this study suggested that multifaceted intervention and approach should be considered for various aspects of health, welfare, education, safety, etc. to build child friendly cities.

Key Exchange Protocols for Domestic Broadband Satellite Access Network (광대역 위성 엑세스 방을 위한 키 교환 프로토콜 제안)

  • 오흥룡;염흥열
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.13-25
    • /
    • 2004
  • The key exchange protocols are very crucial tools to provide the secure communication in the broadband satellite access network. They should be required to satisfy various requirements such as security, key confirmation, and key freshness. In this paper, we present the guideline of security functions in BSAN(Broadband Satellite Access Network), and analyze the specification of the security primitives and the hey exchange Protocols for the authenticated key agreement between RCST(Return Channel Satellite Terminal) and NCC(fretwork Control Centre). In addition, we propose the security specification for a domestic broad satellite network based on the analysis on the analysis profile of ETSI(European Telecommunications Standards Institute) standards. The key exchange protocols proposed in ETSI standard are vulnerable to man-in-the-middle attack and they don't provide key confirmation. To overcome this shortcoming, we propose the 4 types of the key exchange protocols which have the resistant to man-in-the-middle-attack, key freshness, and key confirmation, These proposed protocols can be used as a key exchange protocol between RCST and NCC in domestic BSAN. These proposed protocols are based on DH key exchange protocol, MTI(Matsumoto, Takashima, Imai) key exchange protocol, and ECDH(Elliptic Curve Diffie-Hellman).

An Analysis of Road User Acceptance Factors for Fully Autonomous Vehicles : For Drivers and Pedestrians (완전 자율주행자동차에 대한 도로이용자 수용성 요인 분석 : 운전자 및 보행자를 대상으로)

  • Jeong, Mi-Kyeong;Choi, Mee-Sun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.5
    • /
    • pp.117-132
    • /
    • 2022
  • The purpose of this study is to analyze factors that affect road users' acceptance of fully autonomous vehicles (level 4 or higher). A survey was done with drivers of general cars and pedestrians who share roads with fully autonomous vehicles. Five acceptability factors were selected: trust towards technology, compatibility, policy, perceived safety, and perceived usefulness. The effect on behavioral intention was analyzed using structural equation modeling (SEM). The perceived safety and trust towards technology were found to be very important in the acceptance of fully autonomous vehicles, regardless of the respondent, and policy was not influential. Compatibility and perceived usefulness were particularly influential factors for drivers. In order to improve the acceptance by road users, securing technical completeness of fully autonomous vehicles is important. Certification and evaluation of the safe driving ability of fully autonomous vehicles should be thoroughly performed, and based on the results, it is necessary to improve the perception by road users. It is necessary to positively recognize fully autonomous vehicles through education and publicity for road users and to support their smooth interaction.

A Legal and Systematic Study On Consumer Protection In Electronic Commerce (전자상거래에서의 소비자보호에 관한 법.제도적 연구)

  • Kwon, Sang-Ro
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.12
    • /
    • pp.787-796
    • /
    • 2009
  • The electronic commerce keeps going through a tremendous growth since the latter half of 1990's. But the consumer damages are being increased from characteristics such as non-confrontation, anonymity, internationality, unilaterality and possibility of temptation. Accordingly, this thesis has derived legal and systematic improvements for consumer protection in general as follows. First of all, it is necessary to extend the period to exercise the subscription withdrawal rights according to electronic commerce consumer protection law. Second, the electronic commerce has high possibility of causing errors by consumers because it is performed by non-confrontation and the accurate information must be provided to prevent errors in advance because it is not easy for consumers to prove their own errors. Third, a certification mark system on electronic agreement has to be adopted. Fourth, the legal, systematic and technological measures have to be adopted to prevent from having a sense of fear toward leaking or using personal information through a safe personal information management. Fifth, a strict supervision on internet trust mark is required. Finally, because the intervention or interference by a third party may take place through a hacking on messages or documents sent according to procedure in terms of online settlement, it is necessary to raise security on the system through a precise authentication between concerned parties.

A Study on Strengthening Personal Information Protection in Smart City (스마트시티 속 개인정보보호 강화 방안 연구)

  • Cheong, Hwan-suk;Lee, Sang-joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.705-717
    • /
    • 2020
  • Cities in the world are rushing to develop smart cities to create a sustainable and happy city by solving many problems in cities using information and communication technologies such as big data and IoT. However, in Korea's smart cities and smart city certification systems, the focus is on platform-oriented hardware infrastructure, and the information security aspect is first considered to build and authenticate. It is a situation in which a response system for the risk of leakage of big data containing personal information is needed through policy research on the aspect of personal information protection for smart city operation. This paper analyzes the types of personal information in smart cities, problems associated with the construction and operation of smart cities, and the limitations of the current smart city law and personal information protection management system. As a solution, I would like to present a model of a personal information protection management system in the smart city field and propose a plan to strengthen personal information protection through this. Since the management system model of this paper is applied and operated in the national smart city pilot cities, demonstration cities, and CCTV integrated control centers, it is expected that citizens' personal information can be safely managed.

Design and Analysis of Role-based Security Management Model for Policy-based Security Management in SNMPv3 Network (SNMPv3 통신망의 정책기반 보안관리를 위한 역할기반 보안관리 모델의 설계 및 분석)

  • Ju, Gwang-Ro;Lee, Hyeong-Ho;No, Bong-Nam
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.573-584
    • /
    • 2001
  • Policy-Based Network Management (PBNM) architecture is to meet various needs of network users and to provide effective management facilities in distributed and large scale networks to network managers. In PBNM, network managers perform network management operations by stipulating a set of rules rather than control each network component. On the other hand, providing security services such as authentication, privacy of messages as well as a new flexible and extensible administration framework, SNMPv3 enables network managers to monitor and control the operation of network components more secure way than ever before. Despite of its enhanced security services, SNMPv3 has difficulties in managing distributed, large-scaled network because it does not provide centralized security management facilities. In this paper, we propose a new security model called Role-based Security Management model (RSM) with security management policy to support scalable and centralized security management for SNMP-based networks. Also, the structure and the operation of the security system as well as the efficiency analysis of RSM in terms of security management are also described.

  • PDF

A study on design and performance test of fire door with high endurance performance in submarine tunnel (고내구성능을 갖는 해저터널 방화문 설계방안 및 성능시험 연구)

  • Park, Sang-Heon;Hwang, Ju-Hwan;Choi, Young-Hwan;An, Sung-Joo;Yoo, Yong-Ho
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.20 no.2
    • /
    • pp.331-346
    • /
    • 2018
  • In the tunnel of domestic high - speed railway, the main fire - fighting facility, fire - extinguishing passageway, is installed. However, due to the high pressure of the high - speed train, frequent breakage and maintenance are caused by strong shock and long - term vibration. In order to solve these problems, it is necessary to improve the fire door, but in Korea, it is installed by submitting a certificate by simple KS F 2296 performance test. At present, it is developed as a simple test certification by producing a real scale fireproof door without the theoretical examination in advance, so that a high cost for improvement is occurring in Korea. Therefore, through this study, structural analysis study which can preliminary structure review was carried out in order to design the refuge connection passage fire door and to improve the performance improvement. In order to secure the reliability of the result value, the official authentication test (KS F 2296) were compared.

A Scheme of Security Drone Convergence Service using Cam-Shift Algorithm (Cam-Shift 알고리즘을 이용한 경비드론 융합서비스 기법)

  • Lee, Jeong-Pil;Lee, Jae-Wook;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.5
    • /
    • pp.29-34
    • /
    • 2016
  • Recently, with the development of high-tech industry, the use of the drones in various aspects of daily life is rapidly advancing. With technical and functional advancements, drones have an advantage of being easy to be utilized in the areas of use according to various lifestyles. In addition, through the diversification of the drone service converged with image processing medium such as camera and CCTV, an automated security system that can replace humans is expected to be introduced. By designing these unmanned security technology, a new convergence security drone service techniques that can strengthen the previous drone application technology will be proposed. In the proposed techniques, a biometric authentication technology will be designed as additional authentication methods that can determine the safety incorporated with security by selecting the search and areas of an object focusing on the objects in the initial windows and search windows through OpenCV technology and CAM-Shift algorithm which are an object tracking algorithm. Through such, a highly efficient security drone convergence service model will be proposed for performing unmanned security by using the drones that can continuously increase the analysis of technology on the mobility and real-time image processing.

A Protection System of Medical Information using Multiple Authentication (다중 인증 기술을 이용한 의료정보 보호시스템)

  • Kim, Jin-Mook;Hong, Seong-Sik
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.3-8
    • /
    • 2014
  • Recently, A utilization request of the U-Healthcare services are increasing rapidly. This is because the increase in smartphone users and ubiquitous computing technology was developed. Furthermore, the demand for access to and use of medical information systems is growing rapidly with a smartphone. This system have the advantage such as they can access from anywhere and anytime in the healthcare information system using their smartphone quickly and easily. But this system have various problems that are a privacy issue, the location disclosure issue, and the potential infringement of personal information. this problems are arise very explosive. Therefore, we propose a secure information security system that can solve the security problems in healthcare information systems for healthcare workers using smartphone. Our proposed system, doctors record, store, modify and manage patient medical information and this system would be safer than the existing healthcare information systems. The proposed system allows the doctor to perform further authentication by transmitting using SMS to GOTP message when they accessing medical information systems. So our proposed system can support to more secure system that can protect user individual information stealing and modify attack by two-factor authentication scheme. And this system can support confidentiality, integrity, location information blocking, personal information steal prevent using cryptography algorithm that is easy and fast.