• Title/Summary/Keyword: Certificate Authorities

Search Result 30, Processing Time 0.02 seconds

A Study on the Using Status and Improvements of Electronic Trade Finance in Korea (전자무역금융의 전면 실시에 따른 이용현황과 개선방안)

  • Lee, Jin Woo;Park, Kwang So
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.59
    • /
    • pp.137-157
    • /
    • 2013
  • The Electronic Trade Finance not only has with the trait which is simple procedures, low cost but also easier access to using statistics compare to formerly paper based system. In Korea, all of trade finance system will be changed to electronic base by February 2014. The purpose of this research finds the using status and problems of the electronic local L/C and electronic purchase certificate, and suggests several improvements. First, the whole trade finance system should improve in terms of simple procedures, especially small and medium companies can use the system sufficient maximum limit. Second, the organizers, KTNET, KITA etc, need to the new electronic trade finance system promote to customers and training program for early settlement. It also has to manage at an unified system between IT and tex authorities. Third, small and medium size companies still think the charge for using high, so it need to make a resonable charge for using the electronic system to persuasive extent reasonable about it.

  • PDF

Certificate Issuing using Proxy Signature and Threshold Signature in Self-initialized Ad Hoc Network (자기 초기화하는 Ad Hoc 네트워크에서의 대리 서명과 임계 서명 기법을 이용한 인증서 발급 기법)

  • Kang, Jeon-Il;Choi, Young-Geun;Kim, Koon-Soon;Nyang, Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.3
    • /
    • pp.55-67
    • /
    • 2007
  • In ad hoc network, especially in the environment which the system authority only exists at the beginning of the network, it is very important problem how to issue the certificates in self-initialized public key scheme that a node generates its certificate with public and private key pair and is signed that by the system authority. In order to solve this problem, early works present some suggestions; remove the system authority itself and use certificate chain, or make nodes as system authorities for other nodes' certificates. In this paper, we suggest another solution, which can solve many problem still in those suggestions, using proxy signature and threshold signature, and prove its performance using simulation and analyse its security strength in many aspects.

A Study of Wireless LAN Cryptosystem for Supporting Realtime Mutual Authentication (실시간 상호인증 지원을 위한 무선랜 보안시스템에 관한 연구)

  • Lee Sang-Ryul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.5 s.37
    • /
    • pp.161-170
    • /
    • 2005
  • The Certificate Revocation List(CRL) or the Online Certificate Status Protocol(OCSP)has been used to validate certificates. However, the CRL cannot validate certificates in realtime because of the Time-Gap problem and the OCSP server overloads in a large scale secure system. In addition, the client cannot access a wired LAN until the client has been authenticated by the authentication server on the IEEE 802. 1x framework. Therefore, the client cannot validate the authentication server's certificate using a certificate validation server. Thus, the client cannot authenticate the authentication server in realtime. To solve these problems this paper designed a secure system that can protect the content of communications and authenticate users in realtime on a wireless LAN The designed certificate validation protocol was proved that the stability and efficiency of the system was very high, the result of the validation had the presence, the speed of the validation was not affected by the system scale, the number of authorities user must trust was reduced to one, and the overload of the validation server was Protected. And the designed user authentication and key exchange protocols were Proved that the mutual authentication was possible in realtime and the fact of the authentication could be authorized by the CA because of using the authorized certificates.

  • PDF

A Study on the Curriculum for the Private Certificates According to the Reading Education (독서교육 관련 민간자격 교육과정 분석 연구)

  • Lee, Man-Soo
    • Journal of Korean Library and Information Science Society
    • /
    • v.40 no.3
    • /
    • pp.181-202
    • /
    • 2009
  • The object of this study is to survey the private organizations which have issued the certificates according to the reading education, to describe the right curriculum for the private certificate, and to propose the proper subjects and curriculum for it. The results of the survey may be summarized as follows; 1) The private organizations which have issued the certificates are so many. 2) The certificates which have been issued are not to acquire the proper authorities' cachet. 3) The kinds of the certificate are reading instructor, reading therapist, reading couch, etc. 4) It's necessary for the chief organization to manage all of the organizations which have issued the reading education certificates. 5) It's thought that it's necessary to study more the subjects and curriculums as for the proper reading education certificates.

  • PDF

A Study on the Certification System in Electromic Commerce (전자상거래(電子商去來)의 인증체계(認證體系)에 관한 고찰(考察))

  • Ha, Kang Hun
    • Journal of Arbitration Studies
    • /
    • v.9 no.1
    • /
    • pp.367-390
    • /
    • 1999
  • The basic requirements for conducting electronic commerce include confidentiality, integrity, authentication and authorization. Cryptographic algorithms, make possible use of powerful authentication and encryption methods. Cryptographic techniques offer essential types of services for electronic commerce : authentication, non-repudiation. The oldest form of key-based cryptography is called secret-key or symmetric encryption. Public-key systems offer some advantages. The public key pair can be rapidly distributed. We don't have to send a copy of your public key to all the respondents. Fast cryptographic algorithms for generating message digests are known as one-way hash function. In order to use public-key cryptography, we need to generate a public key and a private key. We could use e-mail to send public key to all the correspondents. A better, trusted way of distributing public keys is to use a certification authority. A certification authority will accept our public key, along with some proof of identity, and serve as a repository of digital certificates. The digital certificate acts like an electronic driver's license. The Korea government is trying to set up the Public Key Infrastructure for certificate authorities. Both governments and the international business community must involve archiving keys with trusted third parties within a key management infrastructure. The archived keys would be managed, secured by governments under due process of law and strict accountability. It is important that all the nations continue efforts to develop an escrowed key in frastructure based on voluntary use and international standards and agreements.

  • PDF

The Judgment Criteria and Origin Verification Cases on "Exceptional Circumstances" in Application of FTA Preferential Tariffs (FTA 특혜관세 적용에 있어 "예외적인 경우"에 대한 판단기준과 검증사례 연구)

  • Kwon, Soon-Koog
    • Korea Trade Review
    • /
    • v.43 no.3
    • /
    • pp.199-218
    • /
    • 2018
  • The force majeure in the international sale of goods has been widely used regarding liability and settlement of disputes in the event of breach of contract due to circumstances beyond the control of the parties. The purpose of this study is to examine the judgment criteria and cases concerning on force majeure in the application of FTA preferential tariffs. In order to achieve this purpose, this paper uses a literature review and case analysis on exceptional circumstances under the Korea·ASEAN FTA and the Korea·EU FTA. This study, this paper provides several implications for companies seeking preferential tariffs regarding the Korea·ASEAN FTA and the Korea·EU FTA. Korean companies are subject to the following: confirm the denial article of FTA preferential tariffs stipulated in the Korea·ASEAN FTA and the Korea·EU FTA, consider the judgment criteria on exceptional circumstances of customs authorities, confirm the extension criteria on the validity period of certificate of origin, confirm the reply criteria of verification result of the customs authorities of the exporting country, and confirm the violation of the principle of good faith for unrequested action on reply of verification result of customs authorities.

  • PDF

Design and Implementation of High-Speed Certification Path Discovery Server on Public Key Infrastructure (공개키 기반 구조에서의 고속 인증 경로 탐색 서버의 설계 및 구현)

  • Lee, Ju-Nam;Yu, Jong-Duk;Lee, Goo-Yeon
    • Journal of Industrial Technology
    • /
    • v.21 no.B
    • /
    • pp.75-83
    • /
    • 2001
  • In the field of secure information systems including electronic commerces, public key infrastructure(PKI) is widely used for secure services. The more PKI domains are established, the more needs are required for cross-domain certifications. Furthermore, each country has many certificate authorities(CA) which require more complex cross certification: We may need a fast algorithm in order to find the possible certification paths. This will be more indispensible in the growing PKI systems. We designed and implemented the high-speed certification path discovery algorithm. Also, we investigated the feature of operation of the system.

  • PDF

Case Studies on Import Clearance Disputes Facing Korean Companies' Trade Counterparts under Korea·ASEAN FTA and Countermeasures (한·아세안 FTA에서 한국 기업 거래상대방의 수입통관 분쟁 사례분석과 대응방안 연구)

  • Bae, Eun-Ju;Park, Sae-Woon;Kim, Hee-Ho
    • Korea Trade Review
    • /
    • v.43 no.1
    • /
    • pp.153-176
    • /
    • 2018
  • Since entering into force on June 1st, 2007, the Korea·ASEAN FTA has had great strategic importance as it represents a massive export market for Korea. For more than 10 years since its implementation, the trade in both goods and services have greatly increased, and ASEAN has become the second largest export market for Korea. However, Korea's FTA utilization rate for exports is approximately 46%, which is far lower than the average rate of 72% for all FTAs, despite several revisions. In this study, we investigate the problems causing this low rate of FTA utilization for export by analyzing import clearance disputes faced by the counterpart. Our recommended countermeasures for such disputes are : Since form requirements for C/O (certificate of origin) are important considerations for ASEAN countries, C/O needs to be written accurately. Understanding of the administrative system and regulative procedures of ASEAN countries is also necessary. Accurate HS code of importing countries must be obtained. Korean government authorities should make diplomatic effort to ease the import clearance procedures in counterpart countries and contact customs offices to facilitate communication.

  • PDF

Estimation of the Level of Sustainable Development in Kazakhstan Regions and Recommendation for its Increase

  • Baimukhamedova, Gulzada S.;Nurlanova, Nailya K.;Akhmetova, Sharzada
    • Journal of Distribution Science
    • /
    • v.10 no.7
    • /
    • pp.23-31
    • /
    • 2012
  • The purpose of this study is to investigate existing world economic science theories and concepts of sustainable development as well as create original system of criteria and indicators to assess potential and conditions for sustainable development from a regional perspective and based on the above justify proposals for public authorities to improve methods of economic regulation for regional development. To achieve the goal evolution process of existing theories and concepts of sustainable development and "green growth" have been studied in terms of its adaptation to the spatial development of Kazakhstan, comparative dynamics of natural resources consumption in the Asia-Pacific region and Kazakhstan were investigated as well. Methodology. World best theory and practice methods for assessment of the level of sustainable development of the country and some of its territories were also studied. We selected the best system of criteria and indicators for assessment of economic, social and environmental sustainability of regional systems. Methods offered in this article are based on traditional and new factors of economic development and conditions for operation of regional systems. Indicators are chosen with a glance to basic goals for future development of regions in Kazakhstan. It is recommended to use two levels of methodology offered by author, namely national and regional, and at the local level later (districts, municipalities, cities). The results. Method offered by the author has been tested based on materials and statistics of regions in Kazakhstan. Suitability and usability of the proposed system of criteria and indicators for measuring of economic, social and environmental sustainability of regional systems was proved. Based on this analysis it was found out that there are regions in Kazakhstan that differ from each other by most of key indicators of sustainable regional development and this tendency is increasing. Conclusions and recommendations. As a result of this analysis, the authors have substantiated a number of proposals on methods of analysis to be used, improvement of methods of regional development, implementation of institutional reforms, as well as improvement of regional statistics. This article provides recommendations that can be successfully used in the management practices by public authorities to implement a new regional strategy focused on sustainable development in future.

  • PDF

An Analysis of Case on Frustration under Time Charter in the Sea Angel (정기용선계약상 이행불능에 관한 Sea Angel호 사건의 판례 분석)

  • Han, Nak-Hyun
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.39
    • /
    • pp.251-280
    • /
    • 2008
  • A party to the charter will not be able to rely upon the doctrine of frustration if an event which makes further performance impossible has been caused by his breach of the charter. Strictly speaking, this is not a situation of frustration at all but rather a case of discharge of the contract by breach. In the Sea Angel case, the defendant entered into a Lloyd's Standard Form of Salvage Agreement with owners of the casualty on the LOF 2000 form, incorporating the SCOPIC clause. The time charter was on the terms of the Shelltime 4 form. This case the trial of the action brought by the claimants owners of the vessel Sea Angel claiming outstanding hire from the defendant charterers. This Case was issued whether charterparty frustrated by refusal of port authorities to issue "No Demand Certificate" allowing port clearance pending payment of oil spillage clean-up costs. The court concluded that no attempt had yet been made to invoke the assistance of the Pakistani court to obtain the release of the vessel. There was not so radical or fundamental a change in the obligation assumed by defendant as to establish frustration. The purpose of this study aims to analyse frustration and time charter in the Sea Angel case.

  • PDF