• Title/Summary/Keyword: Certification Procedure

Search Result 155, Processing Time 0.026 seconds

Establishing Engine Accelerated Mission Test Cycles complying with the CS-E of European Aviation Safety Agency (유럽항공안전청 형식증명 감항기준에 부합하는 엔진가속시험 사이클 수립)

  • Park, Sooyoul;Moon, Gyeongchan;Koo, Hyuncheol
    • Journal of Aerospace System Engineering
    • /
    • v.14 no.1
    • /
    • pp.62-67
    • /
    • 2020
  • The European Aviation Safety Agency (EASA) legislates the CS-E (Certification Specification-Engine) for type certification of aircraft engines. According to the CS-E, engine manufacturers (type certificate holders) the need to show compliance of continued airworthiness of an engine during the overhaul, and the Accelerated Mission Test (AMT) is usually accepted as means of compliance. As a part of the Korean Civil Helicopter program, the engine has been developed with foreign manufacturers to achieve the EASA engine type certificate. In this study, the AMT procedure is planned for the engine to be certified by the EASA, and AMT cycles are also established to meet airworthiness requirements of the CS-E in consideration of the engine design and operation characteristics.

A Study on the Actual Operation Conditions of the Private Security Guard Certification Exam and it's Improvement Plan (신변보호사 자격시험의 운영실태와 개선방안에 관한 연구)

  • Lee, Sanghun
    • Convergence Security Journal
    • /
    • v.14 no.6_2
    • /
    • pp.35-44
    • /
    • 2014
  • Private Security Guard Certification Exam that initiated as the eligibility of private in 2006, has been requested more fulfilling management because that becomes to be recognized at the national certified qualification system in 2013. The findings of this study were as follows: First, it is necessary to expand more exemptions, currently some are mainly police officers. Secondly, it is needed to make to announce the final successful candidates through the opposition proceedings by publishing assumptions answer of the problem and by improving the procedure for determining the successful candidates, and so forth.

Design of an USB Security Framework for Double Use Detection (이중사용 방지를 위한 USB 보안 프레임워크의 설계)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.4
    • /
    • pp.93-99
    • /
    • 2011
  • Recently, the development of internet technology makes user's personal data used by being saved in USB. But there is a critical issue that personal data can be exposed with malicious purpose because that personal data doesn't need to be certificate to use. This paper proposes USB security framework to prevent a duplicate use of personal data for protecting the data which in USB. The proposed USB security framework performs certification process of user with additional 4bite of user's identification data and usage choice of USB security token before certification data when the framework uses USB security product in different network. It makes communication overhead and service delay increased. As a result of the experiment, packet certification delay time is more increased by average 7.6% in the proposed USB security framework than simple USB driver and USB Token, and procedure rate of certification server on the number of USB is also increased by average 9.8%.

Development of CAN network intrusion detection algorithm to prevent external hacking (외부 해킹 방지를 위한 CAN 네트워크 침입 검출 알고리즘 개발)

  • Kim, Hyun-Hee;Shin, Eun Hye;Lee, Kyung-Chang;Hwang, Yeong-Yeun
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.20 no.2
    • /
    • pp.177-186
    • /
    • 2017
  • With the latest developments in ICT(Information Communication Technology) technology, research on Intelligent Car, Connected Car that support autonomous driving or services is actively underway. It is true that the number of inputs linked to external connections is likely to be exposed to a malicious intrusion. I studied possible security issues that may occur within the Connected Car. A variety of security issues may arise in the use of CAN, the most typical internal network of vehicles. The data can be encrypted by encrypting the entire data within the CAN network system to resolve the security issues, but can be time-consuming and time-consuming, and can cause the authentication process to be carried out in the event of a certification procedure. To resolve this problem, CAN network system can be used to authenticate nodes in the network to perform a unique authentication of nodes using nodes in the network to authenticate nodes in the nodes and By encoding the ID, identifying the identity of the data, changing the identity of the ID and decryption algorithm, and identifying the cipher and certification techniques of the external invader, the encryption and authentication techniques could be detected by detecting and verifying the external intruder. Add a monitoring node to the CAN network to resolve this. Share a unique ID that can be authenticated using the server that performs the initial certification of nodes within the network and encrypt IDs to secure data. By detecting external invaders, designing encryption and authentication techniques was designed to detect external intrusion and certification techniques, enabling them to detect external intrusions.

Analysis on ISMS Certification and Organizational Characteristics based on Information Security Disclosure Data (정보보호 공시 데이터를 이용한 정보보호 관리체계 인증과 조직의 특성 분석)

  • SunJoo Kim;Tae-Sung Kim
    • Information Systems Review
    • /
    • v.25 no.4
    • /
    • pp.205-231
    • /
    • 2023
  • The Information Security Management System (ISMS) is a protection procedure and process that keeps information assets confidential, flawless, and available at any time. ISMS-P in Korea and ISO/IEC 27001 overseas are the most representative ISMS certification systems. In this paper, in order to understand the relationship between ISMS certification and organizational characteristics, data were collected from Korea Internet & Security Agency (KISA), Ministry of Science and ICT, Information Security Disclosure System (ISDS), Financial Supervisory Service, Data Analysis, Retrieval and Transfer System (DART), and probit regression analysis was performed. In the probit analysis, the relationship with four independent variables was confirmed for three cases: ISMS-P acquisition, ISO/IEC 27001 acquisition, and both ISMS-P and ISO/IEC 27001 acquisition. As a result of the analysis, it was found that companies that acquired both ISMS-P and ISO/IEC 27001 had a positive correlation with the total number of employees and a negative correlation with business history. In addition, the improvement direction of the ISMS-P certification system and information security disclosure system could also be confirmed.

A Study on the Improvement of Laws Related to the Safety Management of Children's Play Facilities (어린이놀이시설 안전관리법규의 개선방향)

  • Lee, Sang-Suk
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.37 no.2
    • /
    • pp.47-61
    • /
    • 2009
  • The purpose of this study was to understand the laws related to the safety management of children's play facilities(LRSMCPF) including the "Safety Supervision Law of Children's Play Facilities(SSLCPF)" and the "Quality Management and Industrial Products Safety Management Law(QMIPSAL)", in order to analyze the problems by 4 phases-development of products, landscape design, landscape construction and maintenance considering landscape project procedure-and to propose a revision of the laws. The results are as follows: 1. The various LRSMCPF, SSLCPF and QMIPSAL, as basic laws for the safety management of children's play facilities, were insufficient regarding the features of children's play facilities and play spaces, which are both comparatively varied and complex. 2. In development of products, the one-year duration of safety certification based on QMIPSAL was too short and the procedure for safety certification were redundant in both products and plants inspection, and export and import product inspection. 3. The field inspection of construction sites based on SSLCPF was repeated with quality control and a consultation of rules based on "Construction Technology Management Law". 4. There are not enough safety inspection organizations regarding children's play facilities to meet the demand of safety certification, safety inspection, and safety education in the near future. 5. For children's play safety, the establishment of a general safety management system for children's play connected with the phases is needed to ensure safe play equipment, to construct safe playgrounds, and to manage play facilities. The criteria, regulations, and procedure regarding safety certification and safety inspection of play facilities must be revised efficiently and standardized to a global level as well. To improve the system and contents of safety certification and inspection, authorization of safety inspection organizations based on landscape architecture is needed. Further study will be required to concretely analyze in detail the laws, enforcement decrees and rules, and ordinances that consider the practical experience of professional landscape architects, inspectors, and lawyers.

A Study of Innovation Policy regarding Technical Regulation and Conformity Assessment Procedure on ICT Equipments - Focused on Privatization Plan (CT 분야의 기술기준 및 적합성평가시스템의 혁신정책에 관한 연구: 민간화 방안을 중심으로)

  • Lee, Yong-Kyu
    • Journal of Korea Technology Innovation Society
    • /
    • v.19 no.3
    • /
    • pp.439-464
    • /
    • 2016
  • The technical regulation and conformity assessment procedure of our country on ICT equipments is currently required to have more innovation due to the request of main trade countries, the second phase conclusion of MRA, necessity of expansion of conformity assessment service market and demand of manufacturers. The world's leading advanced countries have already proceeded with innovation based on privatization plan. According to the comparative analysis of the level, it turned out that Japan obtained the highest level of privatization while South Korea ranked the lowest level. According to the research result of examination and certification ability of private institutions of our country, it turned out that our country is expected to have possibility of achieving higher level of privatization than that of the present. Moreover, according to the questionnaire survey conducted to the persons concerned regarding privatization direction, they gave positive response to all the indicated survey contents of privatization direction in terms of "delegation of certification services to private sectors (contracting-out)", "transformation of EMC into private voluntary standard" and "changeover of conformity assessment agent". However, from the view of acceptance and conflict model, it is estimated that starting from "delegation of certification services to private sectors (contracting-out)" seems to be the most advisable plan. Also, prior to privatization, it is required to improve relevant systems such as certification examiner system.

Study on FOWT Structural Design Procedure in Initial Design Stage Using Frequency Domain Analysis (주파수 영역 해석을 활용한 부유식 해상풍력 플랫폼 초기 구조설계 절차 연구)

  • Ikseung Han;Yoon-Jin Ha;Kyong-Hwan Kim
    • Journal of Wind Energy
    • /
    • v.14 no.1
    • /
    • pp.29-36
    • /
    • 2023
  • The analysis of the floating offshore wind turbine platform is based on the procedures provided by the IEC including the International Classification Society, which recommends the analysis in the time domain. But time-domain simulation requires a lot of time and resources to solve tens of thousands of DLCs. This acts as a barrier in terms of floating structure development. For final verification, it requires very precise analysis in the time domain, but from an initial design point of view, a simplified verification procedure to predict the quantity of materials quickly and achieve relatively accurate results is crucial. In this study, a structural design procedure using a design wave applied in the oil and gas industries is presented combined with a conservative turbine load. With this method, a quick design spiral can be rotated, and it is possible to review FOWTs of various shapes and sizes. Consequently, a KRISO Semi-Submersible FOWT platform was developed using a simplified design procedure in frequency-domain analysis.

Fourier-Plane Encryption System using Divided Images and a Joint Transform Correlator (분할 영상과 결합변환 상관기를 이용한 주파수 영역에서의 광 암호화 시스템 구현)

  • 최상규;신창목;서동환;김수중;배장근
    • Proceedings of the Optical Society of Korea Conference
    • /
    • 2003.02a
    • /
    • pp.58-59
    • /
    • 2003
  • We propose the optical encryption system using two divided image to hide the original image and a joint transform correlator. The encryption procedure is performed by the Fourier transform of the product of each phase encoded image (divided phase images) and the same random phase image which is generated by computer processing. An autocorrelation term of joint transform correlator contributes to decrypt the original image. This system will be used in optical certification.

  • PDF

A Certification System Using PKI for CITIS Users (PKI 를 이용한 CITIS 사용자 인증 시스템)

  • Jung, Woo-Phil;Park, Jung-Sun
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.26 no.4
    • /
    • pp.411-420
    • /
    • 2000
  • Among the standards of CALS, CITIS(Contractor Integrated Technical Information Service) is a standard in information share procedure which manages all data and services occurred between a contractor and a purchaser. CITIS services have some security problems like authentication problem and repudiation problem, when they are implemented using the Internet. To solve these problems, CITIS needs a user certificate system which can allow to access important information only to qualified users. This paper proposed a PKI(Public Key Infrastructure) Certificate Authority for CITIS, and created a real User Certificate System which can be adjusted to circumstances of real CITIS.

  • PDF