• Title/Summary/Keyword: Privilege

Search Result 199, Processing Time 0.028 seconds

A Study on the Legal Application for Sport Pilot Certificate in Korea (스포츠조종사 자격증명의 국내 적용에 대한 연구)

  • Noh, Yo-Sup;Kim, Young-Hoon
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.13 no.3
    • /
    • pp.43-60
    • /
    • 2005
  • In september 2004, a new pilot certificate scheme referred to as Sport Pilot Certificate was declared official and standardized in the US. The designation of Light-sport aircraft and the details of the relevant pilot certificate policy was announced out of the perception that a new regulation is required to be applied whereby the limitations on the manufacturing process enhancements and current aviation rules are considered the triggering factors. US Federal Aviation Regulation retains a comprehensive range of airworthiness certificates and aircrafts are managed systematically in accordance with FAR 21, 103. The airworthiness are further segregated into sub categories, which allows differentiated management. Korean Aviation Law classify aircraft into five different categories and powered air vehicle that weighs more than 150kg(19liters fuel capacity) for one seat, 225kg for two seats(38liters fuel capacity) while the systems that fall under a specific mass threshold level are known as ultralight vehicle. The research discusses the policy of the sport pilot certificate and the light-sport aircraft ratings announced official by the Federal Aviation Administration in an intuitive fashion with the analysis of the operations providing the evidence as to the viability of adopting the policy in local grounds. Based on the findings, the report discusses the case for introducing the light-sport aircraft and make recommendation on a strategy of applying the policy in Korea with respect to the pilot certificates, safety agenda, and the written test for the pilot certificate, and operating efficiency.

  • PDF

A Secure Data Processing Using ID-Based Key Cryptography in Mobile Cloud Computing (모바일 클라우드 컴퓨팅 환경에서 ID-기반 키 암호화를 이용한 안전한 데이터 처리 기술)

  • Cheon, EunHong;Lee, YonSik
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.3-8
    • /
    • 2015
  • Most mobile cloud computing system use public key cryptography to provide data security and mutual authentication. A variant of traditional public key technologies called Identity-Based Cryptography(IBC) has recently received considerable attention. The certificate-free approach of IBC may well match the dynamic qualities of cloud environment. But, there is a need for a lightweight secure framework that provides security with minimum processing overhead on mobile devices. In this paper, we propose to use hierarchical ID-Based Encryption in mobile cloud computing. It is suitable for a mobile network since it can reduce the workload of root Public Key Generators by delegating the privilege of user authentication and private key generation. The Identity-Based Encryption and Identity-Based Signature are also proposed and an ID-Based Authentication scheme is presented to secure data processing. The proposed scheme is designed by one-way hash functions and XOR operations, thus has low computation costs for mobile users.

A Study of File Format-Aware Fuzzing against Smartphone Media Server Daemons (스마트폰 미디어 서버 데몬에 대한 파일 포맷 인식 기반의 퍼징 연구)

  • Shin, MinSik;Yu, JungBeen;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.541-548
    • /
    • 2017
  • The smartphone operates the media server daemon to handle audio service requests. Media server daemons, running with a high privilege in the background, caused many vulnerabilities to applications most frequently used in smart devices including smartphones. Fuzzing is a popularly used methodology to find software vulnerabilities. Unfortunately, fuzzing itself is not much effective in such format-strict environments as media services. In this paper, we propose a file format-aware fuzzing in order to efficiently detect vulnerabilities of media server daemon. We acquired a remote arbitrary code execution vulnerability on iOS/tvOS/MacOS/watchOS, and we verified the effectiveness by comparing our methodology with the fuzzers FileFuzz and ZZUF.

An Access Control using Reputation Information in P2P File Sharing System (P2P 파일 공유 시스템에서 평판 정보를 이용한 접근 제어)

  • Shin Jung-Hwa;Shin Weon;Rhee Kyung-Hyune
    • The KIPS Transactions:PartA
    • /
    • v.12A no.6 s.96
    • /
    • pp.493-498
    • /
    • 2005
  • P2P service is a method that can share various information through direct connection between computer of a person who have information and a Person who have information without server in the Internet and it is getting a lot of popularity by method for free ex change of file. P2P file sharing systems have become popular as a new paradigm for information exchange. Because all users who use service in P2P file sharing system can use shared files of several users freely by equal access privilege, it is happening the 'free rider' that only download shared file of other users without share own files. Although a user share a malicious file including virus, worm or file that have title differing with actuality contents, can use file sharing service without limitation. In this paper, we propose a method that restrict access of 'free rider' that only download using reputation information that indicate reliability of user. Also, we restrict usage ons hared file of other users about users who share harmful file.

An Access Control using SPKI Certificate in Peer-to-Peer Environment (P2P 환경에서 SPKI 인증서를 이용한 접근 제어)

  • Shin, Jung-Hwa;Lee, Young-Kyung;Lee, Kyung-Hyune
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.793-798
    • /
    • 2003
  • The P2P service is a technology that can share their information with each other who is able to be connected ith a relating program without passing by a server. Since all personal compiters that linked to the internet under the P2P service can opetate as server or a client, they can provide and share both their information and services through the direct connection. Currently, the P2P service is giving an equal privilege to all users for sharing their resources,.Under this situation, a lot of vulnerability against the various sttacks through the Unternet is possoble, more sophisticated security services are necessary. In this paper, We propose and access control schemae using SPKI(Simple Public Key Infrastructure). The scheme designates and access and acces control by providing the certificate to users who request a connection for resource sharing and limits the resource usage of information provider according to the access right that is given to their own rights.

A Study on the Development Cadastral Model for 3D Cadastre Registration (3차원 지적등록을 위한 모형개발에 관한 연구)

  • Kim Kam Lge;Lim Gun Hyuk;Park Se Jin;Hwang Bo Sang Won
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.23 no.2
    • /
    • pp.129-136
    • /
    • 2005
  • The usage of the land is enlarged with above-surface space and sub-surface space as well as surface, as the concern about the land use is increased because there are many factors like the recent development of the science technique, Rapid increase of the population, Rapid city's diffusion, industrialization. According to the cubicalness of the land usage such as these, We have the limit to register the right-objects in space like various buildings and facilities by present registration method of 2D cadastre registration because of 2D registration object. Thus, it is necessary for plan to register an ownership, other privilege relations and the physical objects like various buildings and facilities established on both surface and space. There are two steps in this study. First step is the necessity of 3D cadastre registration and object analysis of cadastre registration, second step is 3D cadastre division and its visualization. Finally, this study will present the realizable model for a 3D cadastre registration.

The characteristics of Colombian liberalistic reformation and federalism in the 19th century (라틴아메리카의 자유주의와 보수주의: 19세기 콜롬비아의 자유주의 개혁의 특징과 연방제)

  • Cha, Kyung Mi
    • Cross-Cultural Studies
    • /
    • v.27
    • /
    • pp.31-57
    • /
    • 2012
  • The 19th century could not relatively receive attention from local researchers because it was treated as the past cut off from the present as the formative period of modern states of Latin America. According to the characteristics of area studies which focus on changes of politics and society, studies on past affairs could not have been the main focus of attention. But as new liberalism has appeared in Latin America, is throwing the spotlight on liberalism. In addition, the studies on the 19th century have been activated and gradually expanded. And interpretation about the 19th century's history has been variously arranged. Especially, discussion on liberalism and conservatism was established as the key words which can understand and reconsider Latin America in the 19th century. Colombian liberalism which could not overcome heritage of the colonial period in the 19th century and did appear advocating reformation was another form of authoritarianism. Reformation promoted by liberalism was utilized to keep privilege of the ruling class, not to remove the social and economic structure derived from the colonial period. New reformist forces which advocated mercantilism after the middle of the 19th century but they were formed based on the existing system. Colombian Liberal Party was developed as "Another name of conservatization" by reflecting understanding of the conservatives. Colombian liberalists preferred federalism to cut off from repressive characteristics of Spanish colonial rule and secure autonomy of local control through reformation based on economic understanding. Therefore, discussion on the form of government which focused on federalism and centralism acted as the causes of conflict between Colombian liberalism and conservatism. Based on this point, this study tries to analyze liberalism reforms which is the main issue in the Colombian history in the 19th century and consider history of Colombian political conflicts focusing on federalism. The origin of Violencia which is the political violence and Colombian history in the 19th century which has been a series of rebellion can be considered through this procedure.

De-Centralized Information Flow Control for Cloud Virtual Machines with Blowfish Encryption Algorithm

  • Gurav, Yogesh B.;Patil, Bankat M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.235-247
    • /
    • 2021
  • Today, the cloud computing has become a major demand of many organizations. The major reason behind this expansion is due to its cloud's sharing infrastructure with higher computing efficiency, lower cost and higher fle3xibility. But, still the security is being a hurdle that blocks the success of the cloud computing platform. Therefore, a novel Multi-tenant Decentralized Information Flow Control (MT-DIFC) model is introduced in this research work. The proposed system will encapsulate four types of entities: (1) The central authority (CA), (2) The encryption proxy (EP), (3) Cloud server CS and (4) Multi-tenant Cloud virtual machines. Our contribution resides within the encryption proxy (EP). Initially, the trust level of all the users within each of the cloud is computed using the proposed two-stage trust computational model, wherein the user is categorized bas primary and secondary users. The primary and secondary users vary based on the application and data owner's preference. Based on the computed trust level, the access privilege is provided to the cloud users. In EP, the cipher text information flow security strategy is implemented using the blowfish encryption model. For the data encryption as well as decryption, the key generation is the crucial as well as the challenging part. In this research work, a new optimal key generation is carried out within the blowfish encryption Algorithm. In the blowfish encryption Algorithm, both the data encryption as well as decryption is accomplishment using the newly proposed optimal key. The proposed optimal key has been selected using a new Self Improved Cat and Mouse Based Optimizer (SI-CMBO), which has been an advanced version of the standard Cat and Mouse Based Optimizer. The proposed model is validated in terms of encryption time, decryption time, KPA attacks as well.

The influence of Hollywood Movies and Marsé's novels - Based on Caligrafía de los sueños (2011) (마르세의 소설과 할리우드 영화의 영향 - Caligrafía de los sueños(2011)를 중심으로)

  • Kim, Kwanghee
    • Cross-Cultural Studies
    • /
    • v.34
    • /
    • pp.201-236
    • /
    • 2014
  • Juan $Mars{\acute{e}}$ was born in 1933 in Barcelona. Being the son of a City cleaner, he was able to watch, from a very early age, all the films he desired, as many times as he wished. This privilege meant a great help in future years, when having to develop the plots and characters of his works. In his last (latest) novel, Caligrafía de los $sue{\tilde{n}}os$, published in 2011, as he has done in his previous works he uses a cinematographic frame again. The explicit references to Hollywood's Golden Age -such as John Ford's Stagecoach and Cecil B. DeMiller's The Plainsman- bring very specific and vivid images to the reader's mind, leading to clear physical and psychological associations. The aim is achieved: the reader's attention is caught immediately. However, characters, plot and cinematographic structures are actually distracting mirages. They make the reader expect a predictable ending which, in fact, will be very different. Therefore, the surprised reader must step back, in order to approach the main topics of the novel from a certain distance. Doing so, he's following the Theory of the Distancing Effect. He becomes aware of the need of a new perspective on social problems that he had considered as familiar justo a few moments before. Thus, he is getting prepared for a more objective interpretation, such as the futility of war and the ideological differences that led to the (Spanich) Civil War and all its devastationg effects.

Meltdown Threat Dynamic Detection Mechanism using Decision-Tree based Machine Learning Method (의사결정트리 기반 머신러닝 기법을 적용한 멜트다운 취약점 동적 탐지 메커니즘)

  • Lee, Jae-Kyu;Lee, Hyung-Woo
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.209-215
    • /
    • 2018
  • In this paper, we propose a method to detect and block Meltdown malicious code which is increasing rapidly using dynamic sandbox tool. Although some patches are available for the vulnerability of Meltdown attack, patches are not applied intentionally due to the performance degradation of the system. Therefore, we propose a method to overcome the limitation of existing signature detection method by using machine learning method for infrastructures without active patches. First, to understand the principle of meltdown, we analyze operating system driving methods such as virtual memory, memory privilege check, pipelining and guessing execution, and CPU cache. And then, we extracted data by using Linux strace tool for detecting Meltdown malware. Finally, we implemented a decision tree based dynamic detection mechanism to identify the meltdown malicious code efficiently.