• Title/Summary/Keyword: International Authorization

Search Result 60, Processing Time 0.026 seconds

Current Situation of the International Recognition of Toxicologists -Update of the Japanese Society of Toxicology-

  • Horii, Ikuo
    • Toxicological Research
    • /
    • v.17
    • /
    • pp.193-196
    • /
    • 2001
  • Issuance of certification and licensing for toxicologists authorized by the Japanese Society of Thxicology (JST) became effective on July 24, 1997. The certification system consists of examination, eligibility requirements for the applicants, authorization/license by the board of trustees of JST, and the re-certification of previously authorized qualification. In the last 2-3 years, about 30-40% of candidates for the examination have succeeded. The Committee has estimated that the level of the examination would be sufficient to determine qualified toxicologists. This updated status and a detailed explanation are to be presented at the workshop. In global terms, the JST special committee agrees that "harmonization of certification/registration procedure for qualified toxicologists means to ensure/set the minimum requirement for the global authorization of qualified toxicologists". The following items in global authorization are ad-dressed for further discussion: (1) What's the benefit\ulcorner (2) Toxicological safety assessment standards, and (3) the JST position for authorization.orization.

  • PDF

A Proposed Framework for the Automated Authorization Testing of Mobile Applications

  • Alghamdi, Ahmed Mohammed;Almarhabi, Khalid
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.217-221
    • /
    • 2021
  • Recent studies have indicated that mobile markets harbor applications (apps) that are either malicious or vulnerable, compromising millions of devices. Some studies indicate that 96% of companies' employees have used at least one malicious app. Some app stores do not employ security quality attributes regarding authorization, which is the function of specifying access rights to access control resources. However, well-defined access control policies can prevent mobile apps from being malicious. The problem is that those who oversee app market sites lack the mechanisms necessary to assess mobile app security. Because thousands of apps are constantly being added to or updated on mobile app market sites, these security testing mechanisms must be automated. This paper, therefore, introduces a new mechanism for testing mobile app security, using white-box testing in a way that is compatible with Bring Your Own Device (BYOD) working environments. This framework will benefit end-users, organizations that oversee app markets, and employers who implement the BYOD trend.

Privacy Enhanced Security Mechanism for Grid Applications

  • Park, Sang-Bae
    • International Journal of Contents
    • /
    • v.6 no.3
    • /
    • pp.15-18
    • /
    • 2010
  • Grid system is based on the Grid Security Infrastructure (GSI). GSI uses user's proxy to guarantee availability among multi-trust domains. Since grid system has been developed focusing on availability, GSI provides authentication and authorization performed by systems, but there are lacks of privacy consideration. For this reason, some researchers decide to use their own cluster system and do not want to use public grid systems. In this paper, we introduce a new privacy enhanced security mechanism for grid systems. With this mechanism, user can participate in resource allocation and authorization to user's contents more actively. This mechanism does not need to change previous middleware and minimize the computational overheads.

A Study on the Supply Chain Security Program (수출입 공급망 안전 프로그램에 관한 연구)

  • Han, Byoung Wan
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.58
    • /
    • pp.287-311
    • /
    • 2013
  • In this study, the scope of previous logistics security were focused only on port and ship. Because of it now extends to the overall (export and import) supply chain areas and in regards with supply security programs in the international level, it reviewed supply chain security programs categorized them into 'ships and port security system', 'container screening system', 'logistics chain authorization system' which are expanded to be adopted in the international level. The major features of those programs are summarized as in building risk management system, providing information ahead, selectivity test and benefits to AEO authorized companies in the customs administration level. The government and companies which are to ensure supply chain security and trade facilitation in order to cope actively with international customs administrative atmosphere need to do the followings : First, they need to build an intra-government integrated supply chain security and make efforts to conclude AEO MRA in order to increase trade competitiveness among major trading countries. Second, they need to build supply chain risk management system in order to enhance management performance through overseas market and company level strategy to obtain and maintain AEO authorization in the company level.

  • PDF

Study on domestic implementation of international treaty obligation regarding governmental supervision about national space activities (우주활동 감독에 관한 조약상 의무의 국내 이행을 위한 입법 방향 연구)

  • Shin, Hong-Kyun
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.19 no.1
    • /
    • pp.57-77
    • /
    • 2004
  • According to the dispostions of 1967 Space Treaty, the contracting states should assume legal obligation to assure an authorization and continuing supervision with regard to the national space activities. Any space activities have to abide by the rules of international law as well as specified obligations set by the Treaty. Among several treaty obligations, International responsibility to be bome by the state, and the liability principles are deemed as major outstanding obligations which the state should takeinto account. While nation's first launch site is to be operational in a few years, korean government should assure that its national space activities, such as launching of space object, operation of satellites, etc. should be under governmental authorization and supervision. A legislative effort would be most desirable undertaking for this regard. Especially a specific legislation needs tobe studied forwith such authorization regime so that international responsibilty and the liability as to thelaunching of space object should be under the regulatory scheme. This study focuses upon the necessity of such legislation and proposes some major items and framework for the legislation

  • PDF

Exploratory Factor Analysis of SME Internationalization: Factor Differences between AEO and Non-AEO Authorized Companies

  • Son, Sung-Kyun;Kim, Tae-Joong;Kim, So-Hyung
    • Journal of Distribution Science
    • /
    • v.12 no.7
    • /
    • pp.5-12
    • /
    • 2014
  • Purpose - This study identified internationalization factors forKorean SMEs and explored factor differences between AEO and non-AEO authorized companies. Research design, data, and methodology - The study was designed to assess internationalization factors for AEO authorization in Korea through a questionnaire survey and an empirical analysis. The questionnaires were conducted for AEO and Non-AEO authorized companies that were undergoing AEO authorization. The study was conducted through e-mail and AEO manager education classes. Ninety-five questionnaires were collected. We employed the exploratory factor analysis methodology to derive internationalization factors for KoreanSMEs, and explored the factor differences between AEO and Non-AEO authorized companies. Results - AEO authorized companies outperformed Non-AEO authorized companies in R&D and technology. This indicated that AEO authorized companies were recognized as reliable and safe companies by the Korea Customs Service and other Customs services in trade facilitation and customs clearance processes. Conclusions - This study has some implications for AEO authorization and internationalization processes, and involved the empirical analysis of SMEs and the exploratory factor analysis in the internationalization process.

Construction of Korean Korea CALS Standardization (한국적 CALS 표준화 구축방안)

  • 김철환;김규수;신영인
    • The Journal of Society for e-Business Studies
    • /
    • v.1 no.1
    • /
    • pp.117-140
    • /
    • 1996
  • CALS is recognized as a national response to the new chapter of information society. It is essential that the standardization in Korea should be constructed compatible with not only domestic but also international standardization trend. This study aims to propose a proper direction of CALS standardization in Korea, based on the international CALS standardization movement. This paper classifies standard into five types and provides a proper direction and guidance far each standard. As a trend of CALS standard, all ten data files are converted using SGML standard far the interchangeability of data among heterogenous systems. CAD and Graphic data arc also moving toward to the STEP as their standard. In this regard, this paper discusses how to implement SGML and STEP Model. Finally, this paper proposes a method how to construct an EDI system with CALS standard and how to establish a standard authorization institute which will be responsible far the standard authorization. Furthermore, this paper also proposes the CALS Test Network (CTN) as its experimental method.

  • PDF

Security Threat Identification and Prevention among Secondary Users in Cognitive Radio Networks

  • Reshma, CR.;Arun, kumar B.R
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.168-174
    • /
    • 2021
  • The Cognitive radio (CR) is evolving technology for managing the spectrum bandwidth in wireless network. The security plays a vital role in wireless network where the secondary users are trying to access the primary user's bandwidth. During the allocation the any malicious user either he pretends to be primary user or secondary user to access the vital information's such as credentials, hacking the key, network jam, user overlapping etc. This research paper discusses on various types of attack and to prevent the attack in cognitive radio network. In this research, secondary users are identified by the primary user to access the primary network by the secondary users. The secondary users are given authorization to access the primary network. If any secondary user fails to provide the authorization, then that user will be treated as the malicious user. In this paper two approaches are suggested one by applying elliptic curve cryptography and the other method by using priority-based service access.

The Access Control System of Network Management Information Base (망관리 정보베이스 접근 제어 시스템)

  • Kim, Jong-Duk;Lee, Hyung-Hyo;Noh, Bong-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.5
    • /
    • pp.1246-1256
    • /
    • 1998
  • MIB(Management Information Base), one of the key components of network management system, is a conceptual repository for the information of the various managed objects. MIB stores and manages all the structural and operational data of each managed resources. Therefore, MIB should be protected properly from inadvertant user access or malicious attacks. International standard ISO/IEC 10164-9 describes several managed object classes for the enforcement of MIB security. Those managed object classes described access control rules for security policy. But the exact authorization procedures using those newly added managed object classes are not presented. In this paper, we divide managed object classes into two groups, explicit and implicit ones, and describe the access authorization procedure in Z specification language. Using Z as a description method for both authorization procedure and GDMO's action part, the behaviour of each managed object class and access authorization procedure is more precisely and formally defined than those of natural language form.

  • PDF

A Study on the Effectiveness of International Commercial Arbitration Agreement in China (중국의 국제상사중재합의 효력에 관한 연구)

  • Ha, Hyun-Soo
    • Journal of Arbitration Studies
    • /
    • v.22 no.3
    • /
    • pp.25-46
    • /
    • 2012
  • China instituted arbitration law on September 1, 1995, after having legislated the law under the UNCITRAL Model Law. However, Chinese arbitration law has some problems related to the effectiveness of its arbitration agreement, unlike the UNCITRAL Model Law. Thus, parties in dispute who want to settle a dispute based on Chinese arbitration law as governing law have more to take into consideration because there could be serious problems related to the effectiveness of the arbitration agreement. Therefore, this paper attempted to analyze the classification of jurisdiction related to the authorization of effectiveness in arbitration agreement of arbitral organization and Chinese, verify the problems, and suggest the solutions. Moreover, the author tried to verify the problems in applying the law related to the authorization of effectiveness in Chinese arbitration agreements and suggest some improvements. This paper also suggests improvements and problems related to the selection of arbitral organizations among several conditions for effective arbitration agreement in Chinese arbitration law. Finally, the author suggests some cautions and countermeasures related to arbitrations agreement for domestic investors and traders dealing with the Chinese.

  • PDF