• Title/Summary/Keyword: Public Authority

Search Result 509, Processing Time 0.024 seconds

Healthcare System using Pegged Blockchain considering Scalability and Data Privacy

  • Azizan, Akmal;Pham, Quoc-Viet;Han, Suk Young;Kim, Jung Eon;Kim, Hoon;Park, Junseok;Hwang, Won-Joo
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.5
    • /
    • pp.613-625
    • /
    • 2019
  • The rise of the Internet of Things (IoT) devices have greatly influenced many industries and one of them is healthcare where wearable devices started to track all your daily activities for better health monitoring accuracy and even down to tracking daily food intake in some cases. With the amounts of data that are being tracked and shared between from these devices, questions were raised on how to uphold user's data privacy when data is shared between these IoT devices and third party. With the blockchain platforms started to mature since its inception, the technology can be implemented according to a variety of use case scenarios. In this paper, we present a system architecture based on the healthcare system and IoT network by leveraging on multiple blockchain networks as the medium in between that should enable users to have direct authority on data accessibility of their shared data. We provide proof of concept implementation and highlight the results from our testing to show how the efficiency and scalability of the healthcare system improved without having a significant impact on the performance of the Electronic Medical Record (EMR) that mostly affected by the previous solution since these solutions directly connected to a public blockchain network and which resulted in significant delays and high cost of operation when a large amount of data or complicated functions are involved.

A Study on the Development of a Marine Industrial Cluster in Seosan-Daesan Port (서산 대산항 해양산업 클러스터 추진방안에 관한 연구)

  • Yun, Kyong-Jun;Seo, Su-Wan
    • Journal of Korea Port Economic Association
    • /
    • v.35 no.1
    • /
    • pp.19-38
    • /
    • 2019
  • The Seosan-Daesan Port is closest to the major ports of China; hence, it is recognized as the ideal port for trade with China. Well-developed industrial infrastructure in its hinterland, including petrochemical, automotive, and electronic component complexes and recent developments of port facilities that aim to strengthen its function as a commercial port clearly highlight the necessity to develop it as a comprehensive port by building a marine industrial cluster. In this study, prerequisites for marine industrial cluster development in Seosan-Daesan Port are identified; they include the following. First, the conditions to be met for being designated a marine industrial cluster should be amended; Second, the central government should delegate authority to local governments to ensure the development of marine industries; Third, changes related to marine industrial cluster development in the governance structure of local governments (Seosan City and Chungnam Province) are required; and Last, a consultative body should be established to facilitate discussions on developing a marine industrial cluster in Seosan-Daesan Port and build public consensus.

Recognition or Enforcement of Arbitral Awards under the German Civil Procedure Act (독일민사소송법상 외국중재판정의 승인 및 집행 - 「독일민사소송법」 제1061조를 중심으로 -)

  • Sung, Joon-Ho
    • Journal of Arbitration Studies
    • /
    • v.29 no.2
    • /
    • pp.107-132
    • /
    • 2019
  • The arbitration procedure, which is a private trial, does not have a separate enforcement agency. Therefore, unless a party consents to the arbitration award and voluntarily fulfills the award, its execution is accomplished through the implementation of the national court. In particular, the decision in the foreign arbitration procedure will be refused or rejected for the arbitration award in case the proceedings of the law and procedure on which the judgment is based are caused by inconsistency with the domestic law or procedural defect. However, all foreign arbitration awards generally do not have to go through the approval process, and it will come into force with the arbitration award. In the case of Germany in the revision of the German Civil Procedure Act of 1996, the main provisions of the New York Convention concerning the ratification and enforcement of arbitration proceedings are reflected. Germany provides for the arbitration procedures in the arbitration proceedings of Book 10 of the Civil Procedure Act. Particularly, with Article 1061 in Book 10 Section 8 below, the approval and enforcement of foreign arbitrators shall be governed. Article 1061 has been referred to as "The New York Convention on the Recognition and Enforcement of Foreign Jurisdictions," Article 5 (1). The main reasons for approval and enforcement rejection are: (1) Reason for the acceptance or refusal of enforcement by request of the parties: Reason for failure of subjective arbitration ability, invalidation of arbitration agreement, collapse of attack or defense method, dispute not included in arbitration agreement, (2) Reasons for the approval and enforcement of arbitration considered by the competent authority of the arbitrator: violation of objective arbitration ability, violation of public order, but not based on the default of German statute.

Protection Technologies against Large-scale Computing Attacks in Blockchain (블록체인에서 대용량 컴퓨팅 공격 보호 기술)

  • Lee, Hakjun;Won, Dongho;Lee, Youngsook
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.11-19
    • /
    • 2019
  • The blockchain is a technique for managing transaction data in distributed computing manner without the involvement of central trust authority. The blockchain has been used in various area such as manufacturing, culture, and public as well as finance because of its advantage of the security, efficiency and applicability. In the blockchain, it was considered safe against 51% attack because the adversary could not have more than 50% hash power. However, there have been cases caused by large-scale computing attacks such as 51% and selfish mining attack, and the frequency of these attacks is increasing. In addition, since the development of quantum computers can hold exponentially more information than their classical computer, it faces a new type of threat using quantum algorithms. In this paper, we perform the security analysis of blockchain attacks composing the large computing capabilities including quantum computing attacks. Finally, we suggest the technologies and future direction of the blockchain development in order to be safe against large-scale computing attacks.

A Study on the Analysis of Validity and Importance of Event Log for the Detection of Insider Threats to Control System (제어시스템의 내부자 위협 탐지를 위한 Event Log 타당성 및 중요도 분석에 관한 연구)

  • Kim, Jongmin;Kim, DongMin;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.77-85
    • /
    • 2018
  • With the convergence of communications network between control system and public network, such threats like information leakage/falsification could be fully shown in control system through diverse routes. Due to the recent diversification of security issues and violation cases of new attack techniques, the security system based on the information database that simply blocks and identifies, is not good enough to cope with the new types of threat. The current control system operates its security system focusing on the outside threats to the inside, and it is insufficient to detect the security threats by insiders with the authority of security access. Thus, this study conducted the importance analysis based on the main event log list of "Spotting the Adversary with Windows Event Log Monitoring" announced by NSA. In the results, the matter of importance of event log for the detection of insider threats to control system was understood, and the results of this study could be contributing to researches in this area.

  • PDF

A Study on Event Log Correlation Analysis for Control System Threat Analysis (제어시스템 위협분석을 위한 Event Log 상관분석에 관한 연구)

  • Kim, Jongmin;Kim, Minsu;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.35-40
    • /
    • 2017
  • The control system can have such threats as information leakage and falsification through various routes due to communications network fusion with public network. As the issues about security and the infringe cases by new attack methods are diversified recently, with the security system that makes information data database by simply blocking and checking it is difficult to cope with new types of threats. It is also difficult to respond security threats by insiders who have security access authority with the existing security equipment. To respond the threats by insiders, it is necessary to collect and analyze Event Log occurring in the internal system realtime. Therefore, this study could find out whether there is correlation of the elements among Event Logs through correlation analysis based on Event Logs that occur real time in the control system, and based on the analysis result, the study is expected to contribute to studies in this field.

The necessity of ban on opening and operating the multiple medical institutions in medical law in Dental case (의료법에서의 의료기관 이중개설 금지조항의 필요성에 대한 치과 사례연구)

  • Ju, Jin-han;Lee, Ga-yeong;Jung, Ku-chan;Lee, Jae-yong;Min, Gyeong-ho
    • The Journal of the Korean dental association
    • /
    • v.57 no.9
    • /
    • pp.514-522
    • /
    • 2019
  • In accordance with Article 33(8) of the Korean Medical Law, it is stated that a medical person cannot open or operate a medical institution by borrowing the name of another medical person. However, the publicity of medical care is threatened by the recent illegal network dental clinics. The purpose of this study is to investigate the actual condition of illegal network dentistry and to analyze the cases and to find out the reason why the prohibition of double opening & operating of medical institution. As a result, the illegal network dental clinics treated less health care insurance treatment such as dental caries and periodontal treatment than general dental hospitals. In contrast, the rate of implementation of illegal network dentistry was high in endodontics treatment and extraction, which could lead to uninsured treatments such as crowns and implants. As a result of Supreme Court precedent analysis, it is concluded that illegal act is not only the opening of a medical institution by borrowing the name of other medical personnel, but also the duplicated operation which has the authority to make decision about management matters of medical institutions. The results of the patient's case survey also showed that excessive dental treatment due to such as dental staff incentive system. In conclusion, the illegal network dental clinics not only threatens the oral health of the public, but also causes leakage of health insurance premiums. In other words, the ban on opening and operating the multiple medical institution should be strictly applied as a strong protection device for protecting the patient in dental case.

  • PDF

An Implementation of NEIS′DB Security Using RBAC based on PMI (PMI기반의 RBAC를 이용한 NEIS의 DB 보안 구현)

  • Ryoo Du-Gyu;Moon Bong-Keun;Jun Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.31-45
    • /
    • 2004
  • Public Key Infrastructure(PKI) provides a strong authentication. Privilege Management Infrastructure(PMI) as a new technology can provide user's attribute information. The main function of PMI is to give more specified authority and role to user. To authenticate net and role, we have used digital signature. Role Based Access Control(RBAC) is implemented by digital signature. RBAC provides some flexibility for security management. NEIS(National Education Information System) can not always provide satisfied quality of security management. The main idea of the proposed RNEIS(Roll Based NEIS) is that user's role is stored in AC, access control decisions are driven by authentication policy and role. Security manager enables user to refer to the role stored in user's AC, admits access control and suggests DB encryption by digital signature.

An Exploratory Study on News Perception of YouTube Current Affairs and Political Channel Users (유튜브 시사정치채널 이용자의 뉴스 관점에 관한 탐색적 연구)

  • Ryu, Yongmin
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.4
    • /
    • pp.628-644
    • /
    • 2021
  • The main purpose of this study is to search for variables that influence the perception of news of YouTube current affairs and political channel users. Existing studies have focused on providing normative criticism by examining the public opinion influence of YouTube channels, which play a role similar to the media, in terms of political polarization, fake news, and confirmation bias. However, this study attempts to examine the changes and meanings of users' perception of news with the advent of YouTube. To this end, an online survey was conducted for users with experience in using YouTube's current affairs and political channels. As a result of the study, it was found that the news perception of YouTube current affairs and political channel users was mixed with the perception of news from the perspective of professional journalism and the perception of newly added news in the digital environment. Based on these results, the researcher examined the implications of the professional news media's response direction to the platform environment.

Problems of Decentralization in Korea and Its Development Direction (한국 지방분권의 문제점과 발전방향)

  • Park, Jong Gwan
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.7
    • /
    • pp.126-135
    • /
    • 2022
  • Decentralization is a structural characteristic surrounding the allocation of power within an organization and is discussed at the organizational, national and local levels. This study examined the evaluation and decentralization direction of decentralization of public officials to derive problems and development directions of decentralization in Korea. We also derive our decentralization task. The decentralization task is, first, the expansion of autonomy in organization composition. The organization of local governments shall be determined according to the details and amount of local affairs. Second, it is to secure autonomy in personnel management. It is desirable for local governments to handle local gardens and manpower management autonomously rather than central uniform control. However, it is necessary to leave the checks and supervision to the local council, civic groups, and local residents. Third, the expansion of fiscal decentralization. First of all, the tax rate should be determined by ordinance within the scope prescribed by law to expand the autonomous financial authority. Next, it is necessary to expand local finances through the conversion of national taxes to local taxes. Next, it is necessary to expand local income taxes and local consumption taxes. Decentralization requires cooperation between the central and local governments and participation of local residents and stakeholders, breaking away from central unilateral and short-term thinking.