• Title/Summary/Keyword: International Authorization

Search Result 60, Processing Time 0.023 seconds

Proxy-AAA Authentication Scheme with Forwarding Mode Supporting in PMIPv6 Networks

  • Han, JeongBae;Jeong, Jongpil;Jo, Jun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.5 no.2
    • /
    • pp.18-22
    • /
    • 2013
  • Mobile IPv6 (MIPv6) is a host-based protocol supporting global mobility while Proxy Mobile IPv6 (PMIPv6) is a network-based protocol supporting localized mobility. This paper makes its focus on how to reduce the longer delay and extra cost arising from the combination of authentication, authorization and accounting (AAA) and PMIPv6 further. Firstly, a novel authentication scheme (Proxy-AAA) is proposed, which supports fast handover mode and forwarding mode between different local mobility anchors (LMAs). Secondly, a cost analysis model is established based on Proxy-AAA. From the theoretical analysis, it could be noted that the cost is affected by average arrival rate and residence time.

An extended Access Control with Uncertain Context

  • Kang, Woojun
    • International journal of advanced smart convergence
    • /
    • v.7 no.4
    • /
    • pp.66-74
    • /
    • 2018
  • While new information technology advances have made information access and acquisition methods much more diverse and easier, there are side effects that allow illegal access using diverse and high-performance tools. In order to cope with such threats, there are access control methods in database technology, and various studies are being conducted to extend traditional access control to cope with new computing environments. In this paper, we propose an extended access control with uncertain context-awareness. It enables appropriate security policy enforcement even if the contextual constraints specified by the security policy does not match those accompanied by access request query. We extract semantic implications from context tree, and define the argument that can quantitatively measure the semantic difference between two nodes in the context tree. It is used to semantically enforce the security policy, and to prevent the excessive authorization caused by the implication.

Implications of TMF and QuEST Programs to Global Standardization Activities on Internet QoS in the Era of Digital Convergence (ITU-T와 IETF의 NGN 중심의 디지털 컨버전스 시대의 인터넷 QoS 가치사슬과 관련된 글로벌 표준화 활동)

  • Kim, Do-Hoon
    • Journal of Korean Society for Quality Management
    • /
    • v.35 no.3
    • /
    • pp.37-46
    • /
    • 2007
  • Our society is increasingly dependent on the Internet, and this trend will be accelerating in the ear of All-IP convergence. As the core infrastructure of the All-IP convergence, the next generation Internet should enable end-to-end Quality of Service(e2e QoS). For that purpose, major international standardization institutes such as ITU(International Telecommunication Union) and IETF(Internet Engineering Task Force) are building the concept and architecture of the Next Generation Network(NGN). However, these institutes focus only on technical issues, and leave many business/policy-oriented challenges unresolved. For example, the standards raised by ITU assume that the entire service delivery process for e2e QoS services is perfectly working. But required is a standardized business interface and process for seamless inter-operations across many stakeholders including ISPs(Internet Service Providers), CPs(Content Providers), so on. On the other hand, TMF(TeleManagement Forum) and QuEST(Quality Excellence for Suppliers of Telecommunication) Forum, global consortiums of telecom operators and vendors, present sets of interface rules and process which playa crucial role as de facto standards: for example, NGOSS/eTOM and TL9000 authorization system. However, these standards focus on telephone services, and provide little principle for the next generation Internet. Our study seeks a way to combine these two strains for a successful implementation of NGN. In particular, we find a missing link in the NGN architecture and the elements that could be complemented with the help of NGOSS/eTOM and TL9000. Finally, presented is a strategic direction that our standardization policy should purse in order to reinforce our global leadership for the next generation Internet.

Design and Implementation of a Low-Code/No-Code System

  • Hyun, Chang Young
    • International journal of advanced smart convergence
    • /
    • v.8 no.4
    • /
    • pp.188-193
    • /
    • 2019
  • This paper is about environment-based low-code and no-code execution platform and execution method that combines hybrid and native apps. In detail, this paper describes the Low-Code/No-Code execution structure that combines the advantages of hybrid and native apps. It supports the iPhone and Android phones simultaneously, supports various templates, and avoids developer-oriented development methods based on the production process of coding-free apps and the produced apps play the role of Java virtual machine (VM). The Low-Code /No-Code (LCNC) development platform is a visual integrated development environment that allows non-technical developers to drag and drop application components to develop mobile or web applications. It provides the functions to manage dependencies that are packaged into small modules such as widgets and dynamically loads when needed, to apply model-view-controller (MVC) pattern, and to handle document object model (DOM). In the Low-Code/No-Code system, the widget calls the AppOS API provided by the UCMS platform to deliver the necessary requests to AppOS. The AppOS API provides authentication/authorization, online to offline (O2O), commerce, messaging, social publishing, and vision. It includes providing the functionality of vision.

The Development of Certificates Criteria and Curriculum in Home Healthcare Nurse Specialist Program (가정전문간호사 교육프로그램 인정기준 및 표준 교육과정 개발)

  • 신경림;주수경;김혜영;김분한;양숙자
    • Journal of Korean Academy of Nursing
    • /
    • v.33 no.3
    • /
    • pp.395-404
    • /
    • 2003
  • Purpose: To make a contribution to raising the quality of nursing and home healthcare services through reviewing the present state of home healthcare nurse specialist training institutions and education programs and creating concrete measures to establish high-quality education courses. Method: International comparative study of accreditation criteria and curriculum in home healthcare nurse specialist program. Result: The Authorization Standards of home healthcare nurse training institutions consists of 8 items, 23 evaluation criteria and 72 evaluation indexes. Proposal to develop a specialist training program: Curriculum. Modify and complement a present homecare nurse education program. Curriculum I. Designate two forms of certification. The first certification has been granted the authority to serve as a manager and open a home healthcare agency to nurses having masters degrees and clinical experience for five years. The second certification is allowed to perform general home healthcare after having completed a short term training course. Currculum 2. To meet increasing demands, granting a certification to perform home healthcare to registered nurses having clinical experience of more than three years. Conclusion: These results can be utilized in the home healthcare educational program for raising the quality of nurses and home healthcare services.

Breeding of Productive Bivoltine Hybrid, CSR16${\times}$CSR17 of Silkworm Bombyx mori L.

  • Reddy, N.Mal;Basavaraja, H.K.;Kumar, N.Suresh;Joge, P.G.;Kalpana, G.V.;Dandin, S.B.;Datta, R.K.
    • International Journal of Industrial Entomology and Biomaterials
    • /
    • v.8 no.2
    • /
    • pp.129-133
    • /
    • 2004
  • The breeding work was initiated by utilizing two Japanese hybrids namely C135${\times}$N134 and N137${\times}$C146 along with two evolved Indian breeds, J14 and A24. The breed CSR16 which is characterized with marked larvae and white dumbbell cocoons was evolved from the Japanese hybrid C135${\times}$N134 by crossing with J14, while the breed CSR17 which is characterized with plain larvae and white oval cocoons was evolved from the Japanese hybrid N137${\times}$C146 by crossing with A24. The hybrid of these evolved breeds i.e., CSR16${\times}$CSR17 has shown superior over control hybrid $KA{\times}{NB_4}{D_2}$ and on par with the ruling hybrid of CSR2${\times}$CSR4. The hybrid CSR16${\times}$CSR17 was authorized during 1999 by Central Silk Board, Bangalore, Government of India for commercial exploitation during favourable months based on national level race authorization test.

A new breed of silkworm variety, Juhwangjam, for light pink cocoon

  • Kim, Seong-Wan;Park, Jong-Woo;Kim, Su Bae;Yu, Jeong Hee;Hong, Jeong Won;Kang, Sang Kug;Kim, Nam Suk;Kim, Kee Young
    • International Journal of Industrial Entomology and Biomaterials
    • /
    • v.40 no.2
    • /
    • pp.51-55
    • /
    • 2020
  • A new silkworm variety, Juhwangjam, was bred for the producing of light pink colored cocoon. The Juhwangjam variety was selected and succeeded from the F1 of 2303 × BP Heehong in 2016 autumn. Hatchability (96%) and pupation percentage (97.6%) of Juhwangjam was matched to the authorization criteria for commercial silkworm variety. Laval period and other economical characters of Juhwangjam were similar to the authorized silkworm variety, Goldensilk. Cocoon yield of Juhwangjam in spring and autumn season was 20.0 and 14.3 kg, respectively. Therefore, a new silkworm variety, Juhwangjam for light pink cocoon, might be adaptable to culture in spring season rather than autumn season.

Study on Comparison of Korean and Japanese National Park Systems from the Conservation Perspective (보전적 측면에서 바라본 한국과 일본의 국립공원제도 비교)

  • Jo Tae-Dong
    • Journal of Environmental Science International
    • /
    • v.13 no.10
    • /
    • pp.871-882
    • /
    • 2004
  • Korea's national park system resembles that of Japan in many ways. In this study, National park Systems of the two countries are compared from a standpoint of their historical backgrounds to be formed and in aspect of its conservation by the main revision of national park laws in perspective. In conclusion it was found out that Korea's toleration-based regulations on building park amenities have gradually neglected the park conservation effort, whereas Japan's authorization-oriented regulations have streng thened their emphasis on park conservation. From the comparison as above, the polices to be modified for Korean national park are proposed as follows: 1. National park system, which values diversity of species, is to be proposed. For this, the Article 8 which allows a development of National parks, Enforcement Ordinance Article 4, The Article 18 of Law, Enforcement Regulation Article 6 & 7 of National Park Law should be reviewed for deletion and revision. 2. On the basis of the laws, zoning system should be readjusted by discriminated conservation policy. Also, the readjustment of zoning system should be enforced after thorough analysis and research on the value of natural resources in the national park. 3. Korea should closely review the recently revised Japanese laws on the national parks and nature revitalization promotion for applying them to conservation policy of Korean national parks.

Security Architecture and Authentication Protocol in Portable Internet (휴대인터넷의 보안 구조 및 인증 프로토콜)

  • Lee, Ji-Yong;Choo, Yeon-Seong;Ahn, Jeong-Cheol;Ryu, Dae-Hyeon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.872-875
    • /
    • 2005
  • Portable Internet extended from wireless LAN has a large cell size, similar to a wireless mobile communication, and can provides the seamless service which offers middle-low speed mobility. IEEE 802.16e, the international standard of Portable Internet, uses PKMv2(Privacy Key Management) protocol for authorization and key exchange between a MSS(Mobile Subscriber Station) and a BS(Base Station). This paper first reviews and studies overall security architecture of TTA HPi standard and IEEE 802.16e which supports mobility based on WMAN(Wireless Metropolitan Area Network) standard(IEEE 802.16)

  • PDF

Attribute Certificate Profile Research (속성인증서 프로화일 연구)

  • 윤이중;류재철
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.5
    • /
    • pp.75-84
    • /
    • 2001
  • Existent public key certificates provide authentication information through some information on user\`s public key. However, an attribute certificate which stores and manage user\`s attribute information, provides various privilege information such as position, privilege and role. In recent, international organizations establishes standards on attribute certificate, and the researches and developments on attribute certificate have been widely made. In addition it may be expected to be used many real application area requiring for authorization information as well as authentication information. Therefore, this paper considers background and standardization trends of attribute certificate and describes the profile and related techniques of attribute certificate currently established by IETF. In addition, it introduces and access control system using attribute certificate and specifies applications of attribute certificate.