• Title/Summary/Keyword: Public certificate

Search Result 332, Processing Time 0.032 seconds

Reliability of Education and Occupational Class: A Comparison of Health Survey and Death Certificate Data (면접조사자료와 사망등록자료 간 교육수준 및 직업계층의 신뢰도)

  • Kim, Hye-Ryun;Khang, Young-Ho
    • Journal of Preventive Medicine and Public Health
    • /
    • v.38 no.4
    • /
    • pp.443-448
    • /
    • 2005
  • Objectives : This study was done to evaluate the reliability of education and occupational class between using the health survey and the death certificate data. Methods : The 1998 National Health and Nutrition Examination Survey (NHANES) was conducted on a cross-sectional probability sample of South Korean households, and it contained unique 13-digit personal identification numbers that were linked to the data on mortality from the Korean National Statistical Office. The data from 263 deaths were used to estimate the agreement rates and the Kappa indices of the education and occupational class between using the NHANES data and the death certificate data. Results : The simple and weighted Kappa indices for education were 0.60 (95% CI=0.53-0.68) and 0.73 (95% CI=0.67-0.79) respectively, if the educational level was grouped into five categories: no-formal-education, elementary-school, middle-school, high-school and college or over. The overall agreement rate was 71.9% for these educational groups. The magnitude of reliability, as measured by the overall agreement rates and Kappa indices, tended to increase with a decrease in the educational class. The number of non-educated people with using the death certificate data was smaller than that with using the NHANES data. For the occupational class (manual workers, non-manual workers and others), the Kappa index was 0.40 (95% CI=0.30-0.51), which was relatively lower than that for the educational class. Compared with the NHANES, the number of non-manual workers for the deceased who were aged 30-64 tended to be increased (8 to 12) when using the death certificate data, whereas the number of manual workers tended to be decreased (59 to 41). Conclusions : The socioeconomic inequalities in the mortality rates that were based on the previous unlinked studies in South Korea were not due to a numerator/denominator bias. The mortality rates for the manual workers and the no-education groups might have been underestimated.

The Study of Improvement of Personal Information Leakage Prevention in Mobile Environment (모바일 환경에서 개인정보 유출 방지를 위한 개선 연구)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.3
    • /
    • pp.53-62
    • /
    • 2015
  • Recently, number of tablet or Smartphone users increased significantly in domestic and around the world. But violation of personal information such as leakage, misuse and abuse are constantly occurring by using mobile devices which is very useful in our society. Therefore, in this paper it will talk about the problems in the network environment of the mobile environment such as tablet and Smartphone, Mobile Malware, hacking of the public key certificate, which could be potential threat to mobile environment. This thesis will research for people to use their mobile devices more reliable and safer in mobile environment from invasion and leakage of personal information. In order to use Smartphone safely, users have to use Wi-Fi and Bluetooth carefully in the public area. This paper will research how to use App safely and characteristic of risk of worm and Malware spreading. Because of security vulnerabilities of the public key certificate, it will suggest new type of security certification. In order to prevent from the information leakage and infect from Malware in mobile environment without knowing, this thesis will analyze the improved way to manage and use the mobile device.

Hybrid PKI Public Certificate Security Method Based on Device ID (디바이스 ID 기반의 하이브리드 PKI 공인 인증 보안 기법)

  • Son, Young-Hwan;Choi, Woon-Soo;Kim, Ki-Hyun;Choi, Han-Na;Lee, Dae-Yoon;Oh, Chung-Shick;Cho, Yong-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.5
    • /
    • pp.113-124
    • /
    • 2010
  • In this study, the hybrid authorization quotation technique is based on the device ID for the integrity of the source region guarantee of user certificate, in order to improve the convenience and security for user in the hybrid PKI certificate Mechanism for authentication. The feature of the model in which it is presented from this paper is 5. First, because the user can select the policy himself in which it matches with each authentication situation and security level, the convenience can be improved. Second, the integrity of the source region of the user certificate can be guaranteed through the comparison of the DLDI Key, that is the hash-value of the device ID. Third, the security can be improved by continuously changing an encoding, and the value of the key in which it decodes through the EOTP Key. Fourth, the index value is added to a certificate, and the storage of a certificate is possible at the Multi-Device. Fifth, since the addi the inan aratus for the integrity of the source region guarantee of a certificate is not needed, the authentication process time can be reduced and the computational load of the certificate server can be reduced also.

Certificate Education for Geriatric Physician: Satisfaction and Feasibility (노인병 인정의 양성 교육: 만족도와 현실성)

  • Lee, Sung-Chun;Kim, Hwa-Joon;Park, Hyung-Joon;Yun, Jong-Lull;Kim, Chang-Yup;Moon, Ok-Ryun;Jang, Soong-Nang
    • Journal of Preventive Medicine and Public Health
    • /
    • v.41 no.1
    • /
    • pp.10-16
    • /
    • 2008
  • Objectives : Korea faces a number of challenges to meet demands in the area of geriatric professional medicine in a country with a rapidly ageing population. We evaluated the satisfaction and feasibility of the current education certification for geriatric physicians. Methods : Geriatric physicians who were deemed qualified by the Korean Geriatrics Society during the period of 2001 to 2005 (n=2,200) were asked to complete structured questionnaires sent to them by mail about their satisfaction of and need for certificates of education, as well as their opinions on their geriatric specialty training. A total of 419 physicians responded. Descriptive analysis and hierarchical regression were performed to rate the respondents' satisfaction, the characteristics of the need for clarity and utility in education certification, and the characteristics of their patients. Results : Although most respondents were satisfied with their education certification, those who had more elderly patients, aged 65 or older, and those who had more cognitively impaired patients, rated their education as significantly lower than did other physicians. Both groups expressed the need for more the comprehensive care and assessment concerning of their education. Multiple regression analysis indicated that satisfaction with geriatric physician qualification was associated with a physician's age, specialty, and percentage of elderly patients. Conclusions : This study suggests that the current system of education certification is limited in terms of feasibility and physician satisfaction.

A study on approach thesis of protection martial arts (경호기법에 입각한 경호무도의 학문적 접근)

  • Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.6
    • /
    • pp.103-122
    • /
    • 2003
  • Protection sciences are new science. therefore, protection martial arts sciences are will studied be based on study of protection in order to supply high level by request. Moreover, It is reconstruction that protection martial arts masters education, systematic manage, certificate system, protection martial arts recognition certificate, protection martial arts equipment, practice of protection martial arts. Protection martial arts occurs on the unforeseen accident and body guarding, therefore martial arts concept of protection martial arts different general martial arts and sport. In order to develope of protection martial arts First, scientific thesis need of protection martial arts learning. Especially, aims of present protection martial arts is not protect oneself, protect the VIP to safely from all dangers is different thing with aims of general martial arts. Instinct that VIP protect rather than oneself should study and develop. Second, techniques and model of protection martial arts spread to who in connection with security service by systematic and organized. Preferentially, study of protection martial arts Techniques and model possible the protection martial arts learned society, found laboratory and endowed protection martial arts society organize and prevention for random of protection martial arts and must make the original protection martial arts. Third, protection martial arts official certificate and license system must organize in order to training and manage of protection martial art master, Match director(First Second), life physical director(First, Second, Third) is systematically manage by Ministry of Culture & Tourism Republic of Korea. Like this protection martial arts also classify the certificate by scholarship and experience. Fourth, In union to university, private security service company, public institution, police and system that possible leaning to protection martial arts certificate course important. In addition, destroy the commercial character of present martial arts and cultivate the pure martial arts mind, should develop to martial arts in order to improve the humanism and temperament of right body guard.

  • PDF

Securing the Private Key in the Digital Certificate Using a Graphic Password (그래픽 비밀번호를 활용한 공인인증서 개인키 보호방법에 관한 연구)

  • Kang, Byung-Hoon;Kim, Beom-Soo;Kim, Kyung-Kyu
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.1-16
    • /
    • 2011
  • A digital certificate mandated by the Electronic Signature Act has become familiar in our daily lives as 95% of the economically active population hold certificates. Due to upgrades to 256 bit level security that have become effective recently, the security and reliability of digital certificates are expected to increase. Digital certificates based on Public Key Infrastructure (PKI) have been known as "no big problem," but the possibility of password exposure in cases of leaked digital certificates still exists. To minimize this vulnerability, various existing studies have introduced alternative password methods, expansion of certificate storage media, and multiple certification methods. These methods perform enhanced functions but also have limitations including the fact that the secureness of passwords is not guaranteed. This study suggests an alternative method for enhancing the level of password secureness as a way to improve password security. This new method improves security management and enhances the convenience of using digital technologies. The results may be used for developing digital certificate related security technologies and research in the future.

A Study on Efficient Plans for Acquisition of Office Automation Certificate of Qualification Relating to Computer (컴퓨터 관련 사무자동화 자격증취득을 위한 효율화 방안)

  • Lee Kyong-Oh
    • Management & Information Systems Review
    • /
    • v.15
    • /
    • pp.165-186
    • /
    • 2004
  • When certificates of qualification relating to computer have shown up like dam water and meeting the age of office automation (OA) utilizing computer throughout the community, and at the point of time when the promotion of efficiency of duty is attempted by utilizing internet, the improvement plans should be groped for to expect to cultivate the national industrial manpower efficiently and by easily approaching the related OA certificates of qualification related to computer so that everyone can acauire the additional points for recognition of credit, entering company and promotion by the dimension of public trust, recognition degree, practial using level in actual affairs, reliability of problems and after manpower management of the certificates of qualification less expensively and saving time. the concrete plans are as follows: First, in the standard of making questions for the examination of 'Computer Utilizing Ability' executed by the chamber of commerce and Industry, there is the independent examination, but by inserting the presentation portion in the higher grade and middle grade, it should be contributed to improve office efficiency both in mane and reality. Second, though the internet retriever's examination is executed by the nongovernment specialized examination, since it is actually widely utilized in the office activities due to universality of using internet, it is now the time to newly establish and accommodate it as the national examination of 'internet Utilizing Ability', not the interest specialized retriever. Third, the applicants, shall take examination for the nongoverment certificate of qualification or enterprise's certificate of qualification at the date and place designated by the applicant, but there are much restrictions for the national certificate of qualification, so the date of examination shall be decided flexibly and efficiently to give chances to students by adjusting to the semesters of the students. Fourth, in this rapidly changing age of the informationalization community, the acquisition of the certificates of qualification through the university and the designated and entrusted educational institutes should be increased the proportion of activation to become officially recognized, and the extent of special treatment for obtainers of the certificate of qualification should be expanded to equip manpower competitive power in the age of informationalization.

  • PDF

Critical Path Analysis for Codesign of Public Key Crypto-Systems (공개키 연산기의 효율적인 통합 설계를 위한 임계 경로 분석)

  • Lee Wan bok;Roh Chang hyun;Ryu Dae hyun
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.1
    • /
    • pp.79-87
    • /
    • 2005
  • In e-commerce applications, a public key cryptosystem is an important and indispensible element for the basic security operations such as authentication, digital signaturing, and key distribution. In wired network environments, the public key infrastructure certificate, which is based on X.509 specification, has been widely used. On the other hand, it still remains difficult to use the certificate information in wireless network environments due to the inherent limitations of the hand-held devices such as low computational power and short battery life. In this paper, we facilitate a codesign approach by implementing a software public-key cryptosystem and classifying its internal computation overheads quantitatively using a software profiling technique. Moreover, we propose a method to analyze the profiled data and apply it to the problem of software/hardware partitioning in a codesign approach. As an illustrative example, we analyze the computational overheads of an EC-Elfagamal application and examine a critical computational path.

  • PDF

Authentication Technology of Public Key Infrastructure for Electronic Commerce (전자상거래를 위한 공개키 기반 하부구조의 인증 기술)

  • 유창열;임신영;송유진;함호상
    • Proceedings of the CALSEC Conference
    • /
    • 1997.11a
    • /
    • pp.167-184
    • /
    • 1997
  • 암호화 기술의 확장성과 비도 측면에서 우수한 공개키 기반 하부구조(Public Key Infrastructure)는 공개키를 보증하는 기반 기술과 인증서의 안전한 사용 기술로 구성되어있으며, 전자상거래의 기본 기술중 하나이다. 이러한 기본 기술 중에는 키 복구(Key Recovery) 및 비밀 분산(Secret Sharing) 기술등이 포함되며, 인증기관(Certificate Authority: CA)을 통한 키 관리 효율성 및 인중 기관과 사용자 간 안전한 정보 교환 기술이 요구된다. 본 논문에서는 인터넷 기반의 전자 상거래 시 사용되는 공개키 기반 하부구조에 대하여 검토 분석한다.

  • PDF

An Efficient Public Key Based Security Architecture for Wireless Sensor Networks

  • Haque, Mokammel;Pathan, Al-Sakib Khan;Hong, Choong-Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1098-1099
    • /
    • 2007
  • In this paper, we propose a public key based security architecture for Wireless Sensor Networks (WSNs). The basic architecture comprises of two schemes; a key handshaking scheme based on simple linear operations for fast computation and an identity based cryptosystem which does not require any certificate authority. Our analysis shows that, the combined scheme ensures a good level of security and is very much suitable for the energy constrained trend of wireless sensor network.

  • PDF