• 제목/요약/키워드: Privilege

검색결과 200건 처리시간 0.024초

피의자 개인의 암호이용 통제정책에 대한 연구 (A Study on National Control Policy for the Use of Encryption Technologies by an Accused Person)

  • 백승조;임종인
    • 정보보호학회논문지
    • /
    • 제20권6호
    • /
    • pp.271-288
    • /
    • 2010
  • 본 논문은 범죄에 사용될 수 있는 암호의 이중사용의 특성 때문에 발생 가능한 수사권 약화라는 암호의 역기능과 키복구 시스템과 복호화명령제도와 같은 피의자 개인의 암호이용에 대한 통제정책에 대해 살펴본다. 또한 피의자로서의 개인의 암호이용에 대한 통제 정책에서 발생가능한 수사권과 프라이버시권 등 다양한 개인의 헌법적 권리들에 대한 침해 위험을 상판L고, 각 정책을 과잉규제금지원칙을 적용하여 구체적으로 분석해본다. 마지막으로 국민의 권리와 수사권 확보를 보장하는 균형 잡힌 국내암호통제정책 수립을 위해 고려해야 할 요소들과 대안적인 정책방향을 제시한다.

Legal Issues in the Introduction of Compelled Decryption According to Device Unlock Limits

  • Chohee Bae;Sojung Oh;Sohyun Joo;Jiyeon Joo;KyungLyul Lee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권2호
    • /
    • pp.591-608
    • /
    • 2023
  • With the emergence of advanced encryption technologies such as Quantum Cryptography and Full Disk Encryption, an era of strengthening information security has begun. Users respond positively to the advancement of privacy-enhancing technology, on the other hand, investigative agencies have difficulty unveiling the actual truth as they fail to decrypt devices. In particular, unlike past ciphers, encryption methods using biometric information such as fingerprints, iris, and faces have become common and have faced technical limitations in collecting digital evidence. Accordingly, normative solutions have emerged as a major issue. The United States enacted the CLOUD Act with the legal mechanism of 'Contempt of court' and in 2016, the United Kingdom substantiated the Compelled Decryption through the Investigatory Powers Act (IPA). However, it is difficult to enforce Compelled Decryption on individuals in Korea because Korean is highly sensitive to personal information. Therefore, in this paper, we sought a method of introducing a Compelled Decryption that does not contradict the people's legal sentiment through a perception survey of 95 people on the Compelled Decryption. We tried to compare and review the Budapest Convention with major overseas laws such as the United States and the United Kingdom, and to suggest a direction of legislation acceptable to the people in ways to minimize infringement of privacy. We hope that this study will be an effective legal response plan for law enforcement agencies that can normatively overcome the technical limitations of decoding.

A Study on Political Reform and Ethical Improvement

  • Kim Taek
    • International Journal of Advanced Culture Technology
    • /
    • 제11권3호
    • /
    • pp.51-58
    • /
    • 2023
  • Through this incident, it reminds me of the idea that personnel appointments are everything once again. Public officials should try to be good at ethics and conduct. If a public official fails to fulfill his or her role as a public official, how can the public trust him or her? You should know that the country does not exist under that official. Looking back on the constitutional history after liberation, it is undeniable that the collusion between politicians and businessmen shocked the people with many suspicions and distrust, and the various irregularities they caused disrupted healthy democracy and the national economic order. In this respect, this paper focuses on Korean political reform measures, but also examines ways to improve public officials' ethics. This paper focuses on that political reform should move in the direction of revitalizing the function of the National Assembly and allowing autonomous and independent parliamentary activities. Parliamentary activities should not be too dampened, and it should not end in a brief promotion in consideration of election votes. The ruling and opposition parties should seriously consider and implement this political reform plan. As one of the people, I hope that this privilege reform plan can be a touchstone for the advancement of political culture. This paper was studied as follows. First, the purpose and justification of political reform were identified. Second, it emphasized the need to improve public service ethics. Third, the problems and improvement measures of political reform were considered.

prEN 1991-1-4:2021: the draft Second Generation Eurocode on wind actions on structures - A personal view

  • Francesco Ricciardelli
    • Wind and Structures
    • /
    • 제37권2호
    • /
    • pp.79-94
    • /
    • 2023
  • This paper traces the drafting of the new EN 1991-1-4 Eurocode 1 - Actions on structures - Part 1-4: General actions - Wind actions within Mandate M/515 of the European Commission to CEN, for the evolution of structural Eurocodes towards their Second Generation. Work of the Project Team started in August 2017 and ended in April 2020, with delivery of a final draft for public enquiry. The revised document contains several modifications with respect to the existing 2005 version, and new sections were added, covering aspect not dealt with in the previous version. It has a renovated structure, with a main text limited in size and containing only fundamental material; all the remaining information, either normative or informative is arranged into thirteen annexes. Common to other Eurocode Parts, general requests from CEN were those of reducing the number of Nationally Determined Parameters and of enhancing the ease of use. More specific requests were those of (a) the drafting of a European design wind map, (b) improving wind models, (c) reviewing force and pressure coefficients, (d) reviewing the procedures for evaluation of the dynamic response, as well as (e) making editorial improvements aimed at a more user friendly document. The author had the privilege to serve as Project Team member for the drafting of the new document, and this paper brings his personal view concerning some general aspects of wind code writing, and some more specific aspects about the particular document.

모바일 클라우드 컴퓨팅 환경의 스마트 디바이스용 일회용 인증서 기반 권한 관리 기술 (Privilege Management Technology based-on One-time Certificate for Smart Device in Mobile Cloud Computing Environment)

  • 문종식;한승완;이임영
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2011년도 춘계학술발표대회
    • /
    • pp.832-835
    • /
    • 2011
  • 공인인증서의 사용은 꾸준히 증가하고 있으나 증가하는 사용량에 비례하여 하드디스크에 저장된 공인인증서 해킹으로 인한 피해 사례가 증가하고 있다. 이에 따라 정부는 하드디스크 내 공인인증서 저장을 금지하고 이동형 저장매체에 저장하도록 하는 방침을 내놓았다. 또한 모바일 클라우드 컴퓨팅 환경에서는 중앙의 스토리지에 데이터가 저장되기 때문에 공인인증서를 중앙 스토리지에 저장하는 것은 매우 위험한 일이다. 이러한 방침으로 인해 앞으로 USB 메모리 및 스마트폰과 같은 이동형 저장매체에 대한 중요성이 높아질 것이며, 분실 위험이 높은 USB 메모리 및 스마트폰의 특징에 따라 인증서가 저장된 저장매체 없이도 인증서를 사용할 수 있는 방안이 필요하게 될 것이다. 본 논문은 일회용 인증서에 대한 요구사항 분석 및 형식을 설계하고, PKI 인증서를 기반으로 경량화된 일회용 인증서를 발급받아 인증서를 사용할 수 있도록 하였다. 또한 모바일 클라우드 컴퓨팅 환경에서 일회용 인증서를 이용한 권한 관리 기술을 제안하여 안전성과 효율성을 제공하도록 하였다.

Benefits and Challenges of Modular Integrated Construction in Hong Kong: A Literature Review.

  • Abdelmageed, Sherif;Abdelkhalek, Sherif;Zayed, Tarek
    • 국제학술발표논문집
    • /
    • The 8th International Conference on Construction Engineering and Project Management
    • /
    • pp.278-288
    • /
    • 2020
  • Modular Integrated Construction (MiC) has gained quite momentum as it provides solutions for several problems in the construction sector, particularly in Hong Kong. MiC is converting the building into modules and erecting them easily on site providing various benefits, such as cost and time savings, better quality, lower risk, higher sustainability, less injuries and accidents, etc. The MiC is considered the best alternative to traditional construction approaches in solving the huge housing demand problem in many cities all over the world due to the time-saving privilege. The utilization of MiC is facing a lot of challenges, which are considered obstacles to the wide acceptance of this technique in the construction industry in Hong Kong. This, in turn, has led the interests of the research community to investigate its benefits and challenges aiming at addressing several solutions to harness the benefits of this technique and to tackle these challenges. The present research aims to review the main concept of MiC and to determine the benefits and the challenges of implementing MiC in construction industry. The findings of this research highlight the advantages and limitations of incorporating MiC technique in Hong Kong, which will help the stakeholders to effectively utilize this technique in the construction industry.

  • PDF

조선 후기 의약(醫藥) 관련 왕실(王室) 의례(儀禮) 연구 - 『탁지오례고(度支五禮考)』를 중심으로 (A study on medicine-related royal rituals: Focusing on Takji-oryego)

  • 박훈평
    • 한국의사학회지
    • /
    • 제34권1호
    • /
    • pp.23-29
    • /
    • 2021
  • Takji-oryego (A Review of the Five manners related to the Ministry of Finance) is a book organized by Hojo (Joseon's Ministry of Finance) and the cost and details of royal events held according to five manners. This book contained a lot of information on medicine-related rituals in the late Joseon Dynasty. Thus, it was found that the royal rituals related to medicine include not only childbirth and fertility, but also Heuljeon and Sangjeon. Through this study, the following facts were newly discovered: 1) The time of transcription was between October 1840 and October 1841. 2) Huljeon (Privilege given to save) is also related to the rise of the status of medical officials after King Sukjong. 3) According to Heuljeon, medical bureaucrats in the late Joseon Dynasty had a higher position than other technical officials. 4) The contents of reward were complementary to the existing literature. The date of death of a medical official, which was unknown in previous studies, is documented. In a case like Sansilcheong, there are contents that are unknown through other sources.

미니돼지에서 다능성 피부유래 전구세포의 추출과 이의 다배엽 세포로의 분화유도에 대한 연구 (ISOLATION OF PORCINE MULTIPOTENTIAL SKIN-DERIVED PRECURSOR CELLS AND ITS MULTILINEAGE DIFFERENTIATION)

  • 최문정;변준호;강은주;노규진;김종렬;김욱규;박봉욱
    • Journal of the Korean Association of Oral and Maxillofacial Surgeons
    • /
    • 제34권6호
    • /
    • pp.588-593
    • /
    • 2008
  • There are increasing reports regarding regeneration of the defected tissues using tissue engineering technique. In this technique, multipotential stem cells are essential. There are many potential sources of adult stem cells, such as bone marrow, umbilical cord blood, fat, muscle, dental tissues and skin. Among them, skin is highly accessible and easily obtained with a minimum of donor site complications. Moreover, skin is an abundant adult stem cell sources and has the potential for self-replication and immune privilege. In this study, we isolated skin-derived precursor cells (SKPs) from the ear of adult miniature pigs. In these SKPs, the expression of transcriptional factors, Oct-4, Sox-2, and Nanog were detected by RT-PCR. In vitro osteogenesis and adipogenesis were observed at 3 weeks after transdifferentiations as assayed by positive von Kossa and Oil-red O staining, respectively. In addition, expression of osteocalcin and osteonectin in the osteogenic differentiation medium and $PPAR{\gamma}2$ and aP2 in the adipogenic differentiation medium were detected by RT-PCR. In vitro neurogenesis of porcine SKPs was observed during 24 and 72 hours after treatment of neurogenic differentiation medium. The results of this study suggest that SKPs demonstrate the properties of pluripotence or multipotence and multi-lineage differentiation. This indicates that autogenous SKPs are a reliable and useful source of adult stem cells for regenerative medicine.

Open Authorization에서의 안전한 사용자 권한 인증 방법에 관한 연구 (Secure User Authority Authentication Method in the Open Authorization)

  • 채철주;이준환;조한진
    • 디지털융복합연구
    • /
    • 제12권8호
    • /
    • pp.289-294
    • /
    • 2014
  • 최근 다양한 웹 서비스와 어플리케이션들이 사용자에게 제공되고 있다. 이러한 서비스들은 인증된 사용자에 한해서 서비스를 제공하기 때문에 사용자는 매번 서비스 별로 인증을 수행해야 하는 불편함을 겪고 있다. 이러한 불편함을 해결하기 위해 3rd Party 어플리케이션이 웹 서비스에 대하여 제한된 접근 권한을 얻을 수 있게 해주는 OAuth(Open Authorization) 프로토콜이 등장하게 되었다. 이러한 OAuth 프로토콜은 사용자에게 편리하고 유연한 서비스를 제공하지만 권한 획득에 대한 보안 취약점을 가지고 있다. 그러므로 본 논문에서는 OAuth 2.0 프로토콜에서 발생할 수 있는 보안 취약점을 분석하고 이러한 보안 취약점을 보완한 방안을 제시한다.

소비자 중심의 현대 패션제품 디자인 개발에 대한 연구 (The Customized Modern Fashion Product Design)

  • 고현진
    • 복식
    • /
    • 제58권3호
    • /
    • pp.93-104
    • /
    • 2008
  • The purposes of this study are to examine the concept of customized fashion product design as a new industrial paradigm reflecting individual customers' needs in modern society, and to grasp its sociocultural meaning. It is thought that this study will be helpful to investigate the cultural thinking of contemporaries represented through the consumption. For this, the documentary study and practical case study have been executed. As modern fashion business becomes more consumer-oriented due to the industrial paradigm shift, there appeared the prosumer as both consumer and producer. The type of customized fashion product design can be classified as 1) the traditional custom-made design in haute couture and classic tailoring 2) the tailor-made design in the prestige line of ready to wear 3) DIY custom design 4) mass customized design of customer involvement. The traditional custom-made design in haute couture and classic tailoring and the tailor-made design in the prestige line of ready to wear is to provide the distinguished product which has the best quality as well as the excellent beauty for VIP consumer. The DIY custom design is for creative consumer searching for the fun of craftsmanship to take part in producing personally. The mass customized design of customer involvement is to personalize product by selecting design module in mass production. Ultimately the sociocultural meaning of the customized fashion product design can be interpreted as (1)endowing special meaning to personal identity (2)distinguishing the privilege by rarefied authenticity (3)returning to analog sensibility 4)pursuing creative fun 5)thinking in a user-centered way.