• Title/Summary/Keyword: Public certificate

Search Result 334, Processing Time 0.022 seconds

Measuring the Burden of Major Cancers in Korea Using Healthy Life-Year (HeaLY) (건강생활년을 이용한 우리 나라 주요 암 질환의 질병부담 측정)

  • Yoon, Seok-Jun;Kim, Chang-Yup;Shin, Young-Soo;Choi, Yong-Jun
    • Journal of Preventive Medicine and Public Health
    • /
    • v.34 no.4
    • /
    • pp.372-378
    • /
    • 2001
  • Objectives : This study introduced the healthy life-year(HeaLY), a composite indicator of disease burden, and used it to estimate the burden of major cancers in Korea. Methods : We collected data from the national death certificate database, the national health insurance claims database and the abridged life table. This data was used to create a spreadsheet and estimate the burden of major cancers by sex in terms of HeaLYs. Results : The burden of 10 major cancers for males was 2,248.97 person-year in terms of HeaLYs. Stomach cancer, liver cancer, and lung cancer were responsible for 75.2% of the burden of 10 major cancers. The disease burden of 10 major cancers for females was estimated to be 1,567.58 person-years. About two thirds of HeaLYs lost were from stomach cancer, liver cancer, lung cancer, colorectal cancer, and breast cancer. The rankings among 10 major cancers were somewhat different in terms of both HeaLYs and deaths as the HeaLY method considers both mortality and morbidity. Conclusions : Despite the limitations of the data sources, we conclude that HeaLY can aid in setting policy priorities concerning major cancers by estimating the disease burden of these cancers. Time-series analysis of the disease burden using HeaLY and DALY will elucidate the strengths and weaknesses of both methods.

  • PDF

An Improved Protocol for the Secure Mobile IPv6 Binding Updates (안전한 모바일 IPv6 바인딩 갱신을 위한 개선된 프로토콜)

  • You, Il-Sun;Won, You-Seuk;Cho, Kyung-San
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.605-612
    • /
    • 2004
  • In MIPv6, unauthenticated binding updates expose the involved MN and CN to various security attacks. Thus, protecting the binding update process becomes of paramount importance in the MIPv6, and several secure binding update protocols have been proposed. In this paper, we pro-pose a novel protocol for the secure binding updates in MIPv6, which can resolve the drawbacks of the Deng-Zhou-Bao's protocol [2], by adopt-ing Aura's CGA scheme with two hashes [9]. Aura's scheme enables our protocol to achieve stronger security than other CGA-based protocols without a trusted CA, resulting in less cost of verifying the HA's public key than the Deng-Zhou-Bao's protocol. Through the comparison of our protocol with other protocols such as the Deng-Zhou-Bao's protocol, CAM-DH and SUCV, we show that our protocol can provide better performance and manageability in addition to stronger security than other approaches.

DTLS-based CoAP Security Mechanism Analysis and Performance Evaluation (DTLS 기반의 CoAP 보안 메커니즘 분석 및 성능평가)

  • Han, Sang woo;Park, Chang seop;Cho, Jung mo
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.3-10
    • /
    • 2017
  • Standard Protocol Optimized for Resource-Constrained IoT Environment Constrained Application Protocol (CoAP) supports web-based communication between a sensor node in the IoT environment and a client on the Internet. The CoAP is a Request / Response model that responds to the client's CoAP Request message by responding with a CoAP Response message from the server. CoAP recommends the use of CoAP-DTLS for message protection. However, validation of the use of DTLS in the IoT environment is underway. We analyze CoAP and DTLS security mode, evaluate performance of secure channel creation time, security channel creation step time, and RAM / ROM consumption through Cooja simulator and evaluate the possibility of real environment application.

Military Application of Two-factor Authentication to Data Leakage and Access Prevention (데이터 유출 및 접근방지를 위한 이중 인증방식의 군(軍) 적용방안)

  • Jung, Ui Seob;Kim, Jee Won;Kim, Jae Hyun;Jeong, Chan ki
    • Convergence Security Journal
    • /
    • v.18 no.5_2
    • /
    • pp.21-27
    • /
    • 2018
  • Most of the Internet users in Korea are issued certificates and use them for various tasks. For this reason, it is recommended that accredited certification authorities and security related companies and use public certificates on USB memory and portable storage devices rather than on the user's desktop. Despite these efforts, the hacking of the certificate has been continuously occurring and the financial damage has been continuing. Also, for security reasons, our military has disabled USB to general military users. Therefore, this study proposes a two-factor method using the unique information of the USB memory and the PC which is owned by the user, and suggests a method of managing the private key file secure to the general user. Furthermore, it will be applied to national defense to contribute to the prevention of important data and prevention of access by unauthorized persons.

  • PDF

Blockchain-based new identification system (블록체인 기반 새로운 신원확인 체계)

  • Jung, Yong-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.2
    • /
    • pp.452-458
    • /
    • 2021
  • The value and importance of personal information are increasing due to the increasing number of fields where the Internet environment and computing environment are used, and user authentication technology is also changing. Until now, accredited certificates, which are mainly used in the financial sector, are being replaced with biometric authentication technology due to the problem of revocation. However, another problem is that biometric information cannot be modified once it is leaked. Recently, with the advent of blockchain technology, research on user authentication methods has actively progressed. In this paper, both public certificate and blockchain-based user authentication can be used without system change, and a new DID issuance and reissuance method that can replace the resident registration number is presented. The proposed system can be used without restrictions in a blockchain. However, the currently used DID requires installation of an application at the Interworking Support Center for verification. Since a DID can be authenticated without registering as a member, indiscriminate information collection can be prevented. Security, convenience, and determinism are compared with the existing system, and excellence is proven based on various attack methods, its portability, and proxy use.

An Implementation of NEIS′DB Security Using RBAC based on PMI (PMI기반의 RBAC를 이용한 NEIS의 DB 보안 구현)

  • Ryoo Du-Gyu;Moon Bong-Keun;Jun Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.31-45
    • /
    • 2004
  • Public Key Infrastructure(PKI) provides a strong authentication. Privilege Management Infrastructure(PMI) as a new technology can provide user's attribute information. The main function of PMI is to give more specified authority and role to user. To authenticate net and role, we have used digital signature. Role Based Access Control(RBAC) is implemented by digital signature. RBAC provides some flexibility for security management. NEIS(National Education Information System) can not always provide satisfied quality of security management. The main idea of the proposed RNEIS(Roll Based NEIS) is that user's role is stored in AC, access control decisions are driven by authentication policy and role. Security manager enables user to refer to the role stored in user's AC, admits access control and suggests DB encryption by digital signature.

A Study on Needs for Information Design Development of Civil Affair Registration Form Design by User-Experience-Perspective (Focusing on Birth Registration Form) (사용자경험 관점으로 분석한 문서양식 정보디자인의 개선점 연구: 지류 출생신고서를 중심으로)

  • Kim, Jhonghee
    • Journal of Digital Convergence
    • /
    • v.20 no.3
    • /
    • pp.447-457
    • /
    • 2022
  • Form design for information registration should consider and classify various possible cases and each user case and reflect it in the design. In this paper, I analyzed the visual and emotional factors of information design that elicit positive emotions from the user experience point of view, focusing on the birth certificate of among other public documents issued by the government. In order to derive problems and supplements from the user's overall writing experience point of view, Keller's Motivational Behavior Construction Model was used. The process of writing the birth registration form creates recognition, reasoning, relationship, establishment, achievement, expectation. In order to more actively draw an emotional point of view, it is essential to set of information and to materialize the information experience. It is hoped that this will be a good guideline in the process of presenting a new perspective on information design and improving the experience.

Evaluating the knowledge, attitude, perception, and readiness of caregivers of under 5-year-old children to accept malaria vaccine in Nigeria

  • Blessing Nkechi Emmanuel;Abubakar Nuhu Ishaq;Olisaemeka Zikora Akunne;Umar Faruk Saidu
    • Clinical and Experimental Vaccine Research
    • /
    • v.13 no.2
    • /
    • pp.121-131
    • /
    • 2024
  • Purpose: The global burden of disease and mortality is greatly influenced by malaria, particularly in children. Nigeria alone accounts for about 25% of global malaria cases and fatalities. Despite efforts to control and eliminate malaria, conventional treatments have limitations, prompting the need for a vaccine. However, while efforts have focused on researching and developing malaria vaccines, less attention has been given to public acceptance and preparedness for vaccination. Materials and Methods: The study employed a cross-sectional approach to assess the knowledge, perceptions, and readiness of caregivers towards the malaria vaccine. Data were collected through a physical and online survey among a representative sample of caregivers across the six geopolitical regions of Nigeria. The data was analyzed using principal component analysis and percentages. Results: Out of 347 respondents, 180 (51%) men, 165 (46.6%) women, 2 (0.5%) transgender, 156 (45%) rural settlers, and 191 (55%) urban settlers were identified in this study. The study reported an overall acceptance rate of 78.4% and 21.6% resistance rate. The age group between 21-30 years recorded the highest 207 (59.6%). A significant number of participants, 252 (59.6%), held at least a higher or post-secondary certificate, out of which 193 (55.6%) demonstrated strong readiness to accept the malaria vaccine. The study showed that fear of adverse effects was the main reason for malaria vaccine resistance among caregivers. Conclusion: This study's findings offer valuable insights into caregivers' knowledge about the malaria vaccine, highlighting the factors that impact the acceptance of the malaria vaccine.

Medical Care Utilization Pattern of Medical Aid Program Beneficiaries (의료보호대상자(醫療保護對象者)의 의료이용(醫療利用) 양상(樣相))

  • Kim, Ju-Ho
    • Journal of Preventive Medicine and Public Health
    • /
    • v.17 no.1
    • /
    • pp.37-45
    • /
    • 1984
  • This study was conducted to identify the problems in the medical aid program by reviewing the medical care utilization pattern of the beneficiaries. The data were abstracted from the monthly bills and vouchers for medical care of the whole benefi챠aries(17,527) in Gyeongsan Gun submitted by the physicians to county government for the period of 1 calendar year from October 1981 to September 1982. The number of medical aid beneficiary accounted for 12.7% of the total county population, a higher proportion than the national average-9.5%. Monthly primary care utilization rate per 100 beneficiaries was 9.3 persons with 14.0 visits and 42.9 medication days. for the 2nd and 3rd care, there were 1.7 admissions and 9.3 OPD visits per 100 beneficiaries per year. The beneficiaries of the first class medical aid program had a higher utilization rate of both the primary and secondary/tertiary care facilities. Females utilized more the primary care facilities than males while males utilized more the secondary/tertiary care facilities than females. A significantly lower utilization rate was observed in January than in the other months and this was seemed due to the renewal process of the medical aid certificate. Among 1,931 patients utilized the 2nd/3rd care facilities 84.4% was out-patients and the lowest ratios were in the minor specialties including ENT, ophthalmology, dermatology and urology. The average hospital days per in-patient were 21.2 days and OPD days per out patient were 4.7 days. The average hospital days for a psychiatry in-patient was 74.4 days which was the longest average hospital days among all the specialties. Average medical care cost per beneficiary in a year was W9,821:W24,240 for the 1st class and W7,464 for the 2nd class. The medical care cost for the primary care per patient was W3.901 and W840 per day compared with W49,875 per patient and W5,822 per day for the secondary/tertiary care. From the findings of this study following recommendations were made to improve the medical care program: 1) The renewal process of the medical care certificate should be expedited. 2) Minor specialty clinics should be designated as the primary medical care facility for the medical aid program to reduce the expenses by absorbing more patients referred to the secondary/tertiary care facilities directly. 3) The medical care cost for the primary care facility should be escalated to reduce the differential between the primary and secondary/tertiary care facilities.

  • PDF

Environmental Auditing-Analysis of Enterprises (환경감사 - 기업분석)

  • Wotte, Joris
    • Journal of Environmental Impact Assessment
    • /
    • v.4 no.3
    • /
    • pp.9-13
    • /
    • 1995
  • In July 1993 a new prescription of the EC was finished, concerning the voluntary participation of enterprises in a common auditing system. By this in the EC-member countries there must be founded centers of environmental auditing where experienced experts of environmental auditing should be accredited. These accredited experts are controllers for evaluating and certification of carried out environmental-auditings. An environmental-auditing practically represents an environmental assessment for an already existing enterprise with establishing corresponding programmes and strategies for the internal management to improve the environmental relations. Much experiences, which could be collected in the field of EIA during the last years may be transfered to this new task immediately. Only an essential difference there should not be overseen because of national legislation EIA in the defined cases must be carried out. By the EC-prescription carrying out an environmental-auditing for an enterprise is optional, it is recommended only. It was not introduced as a must. In spite of this fact because of the hard competition on the market there will be developed a pressure for the enterprises, to carry out such environmental-auditings. At present already a number of first projects in this direction can be seen, in the first line above all enterprises with the necessary economic power want to use this possibility, to gain better positions on the market. We have already gathered the first experiences in this field. We arranged corresponding contacts to several enterprises within the surroundings of Dresden. Within an opening discussion, where the project is explained and discussed with the management of the enterprise very detailed, the understanding, the readiness and the cooperation for the project are generated necessary prerequesits for the success of the whole work. By means of careful detail-work in collaboration with all departments and on all levels of the enterprise the total mass and energy-balances of the factory established and analysed. There are included also such ranges like material delivery, personal policy, public relations and sale as well as waste management. It is important that all people working in the factory have the feeling to be our partners, and not to have the impression to be checked or controled by an outside organization. This one of the most important factors of environmental auditing, in order to wake up and to develop a common interest on all sides. At the end of the environmental auditing there will be according to the prescription of the EC a catalogue of measures to do immediately, short time, mean time and long time for improvement of the environmental situation of the enterprise. All proposals are made in connection with a corresponding economic evaluation. These measures and programmes are declared as the environmental manual and are the basis for the work of the environmental management of the enterprise for the next three years. According to the EC-prescription, the enterprise with this environmental manual can get a corresponding certificate, which may be used for public relation purposes.

  • PDF