• 제목/요약/키워드: International Authorization

검색결과 60건 처리시간 0.02초

Current Situation of the International Recognition of Toxicologists -Update of the Japanese Society of Toxicology-

  • Horii, Ikuo
    • Toxicological Research
    • /
    • 제17권
    • /
    • pp.193-196
    • /
    • 2001
  • Issuance of certification and licensing for toxicologists authorized by the Japanese Society of Thxicology (JST) became effective on July 24, 1997. The certification system consists of examination, eligibility requirements for the applicants, authorization/license by the board of trustees of JST, and the re-certification of previously authorized qualification. In the last 2-3 years, about 30-40% of candidates for the examination have succeeded. The Committee has estimated that the level of the examination would be sufficient to determine qualified toxicologists. This updated status and a detailed explanation are to be presented at the workshop. In global terms, the JST special committee agrees that "harmonization of certification/registration procedure for qualified toxicologists means to ensure/set the minimum requirement for the global authorization of qualified toxicologists". The following items in global authorization are ad-dressed for further discussion: (1) What's the benefit\ulcorner (2) Toxicological safety assessment standards, and (3) the JST position for authorization.orization.

  • PDF

A Proposed Framework for the Automated Authorization Testing of Mobile Applications

  • Alghamdi, Ahmed Mohammed;Almarhabi, Khalid
    • International Journal of Computer Science & Network Security
    • /
    • 제21권5호
    • /
    • pp.217-221
    • /
    • 2021
  • Recent studies have indicated that mobile markets harbor applications (apps) that are either malicious or vulnerable, compromising millions of devices. Some studies indicate that 96% of companies' employees have used at least one malicious app. Some app stores do not employ security quality attributes regarding authorization, which is the function of specifying access rights to access control resources. However, well-defined access control policies can prevent mobile apps from being malicious. The problem is that those who oversee app market sites lack the mechanisms necessary to assess mobile app security. Because thousands of apps are constantly being added to or updated on mobile app market sites, these security testing mechanisms must be automated. This paper, therefore, introduces a new mechanism for testing mobile app security, using white-box testing in a way that is compatible with Bring Your Own Device (BYOD) working environments. This framework will benefit end-users, organizations that oversee app markets, and employers who implement the BYOD trend.

Privacy Enhanced Security Mechanism for Grid Applications

  • Park, Sang-Bae
    • International Journal of Contents
    • /
    • 제6권3호
    • /
    • pp.15-18
    • /
    • 2010
  • Grid system is based on the Grid Security Infrastructure (GSI). GSI uses user's proxy to guarantee availability among multi-trust domains. Since grid system has been developed focusing on availability, GSI provides authentication and authorization performed by systems, but there are lacks of privacy consideration. For this reason, some researchers decide to use their own cluster system and do not want to use public grid systems. In this paper, we introduce a new privacy enhanced security mechanism for grid systems. With this mechanism, user can participate in resource allocation and authorization to user's contents more actively. This mechanism does not need to change previous middleware and minimize the computational overheads.

수출입 공급망 안전 프로그램에 관한 연구 (A Study on the Supply Chain Security Program)

  • 한병완
    • 무역상무연구
    • /
    • 제58권
    • /
    • pp.287-311
    • /
    • 2013
  • In this study, the scope of previous logistics security were focused only on port and ship. Because of it now extends to the overall (export and import) supply chain areas and in regards with supply security programs in the international level, it reviewed supply chain security programs categorized them into 'ships and port security system', 'container screening system', 'logistics chain authorization system' which are expanded to be adopted in the international level. The major features of those programs are summarized as in building risk management system, providing information ahead, selectivity test and benefits to AEO authorized companies in the customs administration level. The government and companies which are to ensure supply chain security and trade facilitation in order to cope actively with international customs administrative atmosphere need to do the followings : First, they need to build an intra-government integrated supply chain security and make efforts to conclude AEO MRA in order to increase trade competitiveness among major trading countries. Second, they need to build supply chain risk management system in order to enhance management performance through overseas market and company level strategy to obtain and maintain AEO authorization in the company level.

  • PDF

우주활동 감독에 관한 조약상 의무의 국내 이행을 위한 입법 방향 연구 (Study on domestic implementation of international treaty obligation regarding governmental supervision about national space activities)

  • 신홍균
    • 항공우주정책ㆍ법학회지
    • /
    • 제19권1호
    • /
    • pp.57-77
    • /
    • 2004
  • 1967년 우주조약에서 규정된 우주활동에 대한 국가의 감독 의무가 구체적으로 어떠한 방식으로 이행되는가에 대해서는 각국의 입법 사례에 따라 다르며, 아울러 그 의무의 강제력에 대한 논의도 지속되어 왔다. 다수의 국적 위성을 발사하고, 발사장을 곧 건설, 운용할 대한민국 정부는 그러한 감독 의무를 이제는 이행하기 위한 구체적인 조치를 취할 단계에 이른 것으로 판단되며, 이에 입법 방향을 검토해 보고자 한다. 1967년 우주조약은 우주활동 주체들이 국제법을 포함한 1967년 우주조약을 준수하고, 그에 따른 국제책임을 국가가 부담할 것을 규정하고 있다. 이에 전 국가를 위한 우주 이용의 원칙, 우주공간의 비영유원칙, 및 우주활동에 대한 국가 감독 및 책임 원칙 등이 준수하여야 할 국제협약상의 의무로 요약되며, 그 이행을 위한 입법 조치가 필요하다고 판단된다. 국내 입법 체계상, 기존의 타 법령과의 조화를 꾀하면서, 우주 발사체의 발사 허가제도 등을 내용으로 하는 입법 조치가 필요하다고 판단된다.

  • PDF

Exploratory Factor Analysis of SME Internationalization: Factor Differences between AEO and Non-AEO Authorized Companies

  • Son, Sung-Kyun;Kim, Tae-Joong;Kim, So-Hyung
    • 유통과학연구
    • /
    • 제12권7호
    • /
    • pp.5-12
    • /
    • 2014
  • Purpose - This study identified internationalization factors forKorean SMEs and explored factor differences between AEO and non-AEO authorized companies. Research design, data, and methodology - The study was designed to assess internationalization factors for AEO authorization in Korea through a questionnaire survey and an empirical analysis. The questionnaires were conducted for AEO and Non-AEO authorized companies that were undergoing AEO authorization. The study was conducted through e-mail and AEO manager education classes. Ninety-five questionnaires were collected. We employed the exploratory factor analysis methodology to derive internationalization factors for KoreanSMEs, and explored the factor differences between AEO and Non-AEO authorized companies. Results - AEO authorized companies outperformed Non-AEO authorized companies in R&D and technology. This indicated that AEO authorized companies were recognized as reliable and safe companies by the Korea Customs Service and other Customs services in trade facilitation and customs clearance processes. Conclusions - This study has some implications for AEO authorization and internationalization processes, and involved the empirical analysis of SMEs and the exploratory factor analysis in the internationalization process.

한국적 CALS 표준화 구축방안 (Construction of Korean Korea CALS Standardization)

  • 김철환;김규수;신영인
    • 한국전자거래학회지
    • /
    • 제1권1호
    • /
    • pp.117-140
    • /
    • 1996
  • CALS is recognized as a national response to the new chapter of information society. It is essential that the standardization in Korea should be constructed compatible with not only domestic but also international standardization trend. This study aims to propose a proper direction of CALS standardization in Korea, based on the international CALS standardization movement. This paper classifies standard into five types and provides a proper direction and guidance far each standard. As a trend of CALS standard, all ten data files are converted using SGML standard far the interchangeability of data among heterogenous systems. CAD and Graphic data arc also moving toward to the STEP as their standard. In this regard, this paper discusses how to implement SGML and STEP Model. Finally, this paper proposes a method how to construct an EDI system with CALS standard and how to establish a standard authorization institute which will be responsible far the standard authorization. Furthermore, this paper also proposes the CALS Test Network (CTN) as its experimental method.

  • PDF

Security Threat Identification and Prevention among Secondary Users in Cognitive Radio Networks

  • Reshma, CR.;Arun, kumar B.R
    • International Journal of Computer Science & Network Security
    • /
    • 제21권5호
    • /
    • pp.168-174
    • /
    • 2021
  • The Cognitive radio (CR) is evolving technology for managing the spectrum bandwidth in wireless network. The security plays a vital role in wireless network where the secondary users are trying to access the primary user's bandwidth. During the allocation the any malicious user either he pretends to be primary user or secondary user to access the vital information's such as credentials, hacking the key, network jam, user overlapping etc. This research paper discusses on various types of attack and to prevent the attack in cognitive radio network. In this research, secondary users are identified by the primary user to access the primary network by the secondary users. The secondary users are given authorization to access the primary network. If any secondary user fails to provide the authorization, then that user will be treated as the malicious user. In this paper two approaches are suggested one by applying elliptic curve cryptography and the other method by using priority-based service access.

망관리 정보베이스 접근 제어 시스템 (The Access Control System of Network Management Information Base)

  • 김종덕;이형효;노봉남
    • 한국정보처리학회논문지
    • /
    • 제5권5호
    • /
    • pp.1246-1256
    • /
    • 1998
  • 망관리 시스템의 여러 가지 구성 요소들 중 가장 핵심적인 요소 중의 하나는 망관리에 필요한 정보들인 관리 객체들의 개념적인 저장소인 관리 정보베이스이다. 관리 정보베이스에 저장된 관리 객체들은 망관리에 필수적이며 중요한 모든 정보들을 유지하고 있기 때문에 안전하게 유지되어야 한다. 본 논문에서는 접근 제어를 위한 포괄적인 클래스 정의 및 접근 제어 보안 모델을 정의한 ISO/IEC 10164-9 권고안을 바탕으로 기존의 표준 관리 객체 클래스 구조를 명시적 규칙과 묵시적 규칙으로 세분화함으로써 크게 확장 및 보완하였다. 또한 세분화된 접근 제어 규칙에 따라 해당 규칙이 적용되는 절차를 각 접근 제어 정책에 적용하여 봄으로써 접근 제어 규칙 수행의 타당성을 검증하였으며, 접근 제어 시스템의 각 기능과 권고안 및 확장된 모델에 정의된 GDMO의 비정형적인 구조를 명세언어 Z를 이용해 정형화된 구조로 표현하였다.

  • PDF

중국의 국제상사중재합의 효력에 관한 연구 (A Study on the Effectiveness of International Commercial Arbitration Agreement in China)

  • 하현수
    • 한국중재학회지:중재연구
    • /
    • 제22권3호
    • /
    • pp.25-46
    • /
    • 2012
  • China instituted arbitration law on September 1, 1995, after having legislated the law under the UNCITRAL Model Law. However, Chinese arbitration law has some problems related to the effectiveness of its arbitration agreement, unlike the UNCITRAL Model Law. Thus, parties in dispute who want to settle a dispute based on Chinese arbitration law as governing law have more to take into consideration because there could be serious problems related to the effectiveness of the arbitration agreement. Therefore, this paper attempted to analyze the classification of jurisdiction related to the authorization of effectiveness in arbitration agreement of arbitral organization and Chinese, verify the problems, and suggest the solutions. Moreover, the author tried to verify the problems in applying the law related to the authorization of effectiveness in Chinese arbitration agreements and suggest some improvements. This paper also suggests improvements and problems related to the selection of arbitral organizations among several conditions for effective arbitration agreement in Chinese arbitration law. Finally, the author suggests some cautions and countermeasures related to arbitrations agreement for domestic investors and traders dealing with the Chinese.

  • PDF