• 제목/요약/키워드: Security Benefit

검색결과 264건 처리시간 0.025초

사적소득이전과 노후소득보장 (Private Income Transfers and Old-Age Income Security)

  • 김희삼
    • KDI Journal of Economic Policy
    • /
    • 제30권1호
    • /
    • pp.71-130
    • /
    • 2008
  • 본 연구는 그동안 사회적 안전망이 미흡한 가운데 우리나라의 고령인구 부양에 중요한 역할을 해온 사적소득이전에 대한 미시적 분석을 통해 향후 노후소득보장정책에 시사점을 제공하고 있다. 한국노동패널 자료에 따르면, 만 60세 이상 노인가구주 세대의 다섯 가구 중 두 가구는 매월 자식들로부터 생활비 등의 경제적 도움을 받고 있는 것으로 조사되었으며, 공공부조 등 공적소득이전은 사적소득이전을 구축하는 효과를 가진 것으로 나타났다. 또한 지금까지는 사적이전이 공적이전보다 빈곤완화효과가 큰 것으로 나타났지만, 외환위기 후 복지지출의 확대와 함께 공적이전의 비중이 대폭 높아져, 공적이전을 주 소득원으로 살아가는 만 60세 이상 고령자는 2003년 기준으로 약 4분의 1에 달하는 것으로 조사되었다. 그러나 같은 해 기준으로 국민기초생활보장제도의 보호지정을 실질적으로 필요로 하면서도 수급권에서 배제된 것으로 추정되는 노인가구주 세대는 약 12%로서, 이들 가구의 빈곤 해소를 위해서는 예산 확보와 함께 사각지대를 없애기 위한 전달체계 개선이 필요할 것으로 보인다. 이처럼 여전히 광범한 빈곤노인계층이 존재하는 한편, 고령인구에 대한 사적 부양이 공적 부양으로 전환되면서 재정건전성이 우려되고 있는 현 상황에서 소득재분배의 효과가 적고 경직적 비용부담이 큰 보편급여의 확대보다는 취약노인계층에 대한 집중적인 지원을 강화할 필요가 있을 것이다.

의료기관 개인건강정보의 이차적 이용 (The Protecton of Privacy on Secondary Use of Personal Health Imformation)

  • 김장한
    • 의료법학
    • /
    • 제11권1호
    • /
    • pp.117-143
    • /
    • 2010
  • Along with the development of digital technologies, the information obtained during the medical procedures was working as a source of valuable assets. Especially, the secondary use of personal health information gives the ordeal to privacy protection problems. In korea, the usage of personal medical information is basically regulated by the several laws in view of general and administrative Act like Medicine Act, Public institutions' personal information protection Act, Information-Network Act etc. There is no specific health information protection Act. Health information exchange program for the blood donor referral related with teratogenic drugs and contagious disease and medical treatment reporting system for income tax convenience are the two examples of recently occurred secondary use of health information in Korea. Basically the secondary use of protected health information is depend on the risk-benefit analysis. But to accomplish the minimal invasion to privacy, we need to consider collection limitation principle first. If the expected results were attained with alternative method which is less privacy invasive, we could consider the present method is unconstitutional due to the violation of proportionality rule.

  • PDF

A Link Between Integrals and Higher-Order Integrals of SPN Ciphers

  • Li, Ruilin;Sun, Bing;Li, Chao
    • ETRI Journal
    • /
    • 제35권1호
    • /
    • pp.131-141
    • /
    • 2013
  • Integral cryptanalysis, which is based on the existence of (higher-order) integral distinguishers, is a powerful cryptographic method that can be used to evaluate the security of modern block ciphers. In this paper, we focus on substitution-permutation network (SPN) ciphers and propose a criterion to characterize how an r-round integral distinguisher can be extended to an (r+1)-round higher-order integral distinguisher. This criterion, which builds a link between integrals and higher-order integrals of SPN ciphers, is in fact based on the theory of direct decomposition of a linear space defined by the linear mapping of the cipher. It can be directly utilized to unify the procedure for finding 4-round higher-order integral distinguishers of AES and ARIA and can be further extended to analyze higher-order integral distinguishers of various block cipher structures. We hope that the criterion presented in this paper will benefit the cryptanalysts and may thus lead to better cryptanalytic results.

Debug Port Protection Mechanism for Secure Embedded Devices

  • Park, Keun-Young;Yoo, Sang-Guun;Kim, Ju-Ho
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • 제12권2호
    • /
    • pp.240-253
    • /
    • 2012
  • In this paper we propose a protection mechanism for the debug port. While debug ports are useful tools for embedded device development and maintenance, they can also become potential attack tools for device hacking in case their usage is permitted to hackers with malicious intentions. The proposed approach prevents illicit use of debug ports by controlling access through user authentication, where the device generates and issues authentication token only to the server-authenticated users. An authentication token includes user access information which represents the user's permitted level of access and the maximum number of authentications allowed using the token. The device authenticates the user with the token and grants limited access based on the user's access level. The proposed approach improves the degree of overall security by removing the need to expose the device's secret key. Availability is also enhanced by not requiring server connection after the initial token generation and further by supporting flexible token transfer among predefined device groups. Low implementation cost is another benefit of the proposed approach, enabling it to be adopted to a wide range of environments in demand of debug port protection.

범용 전자기파 시뮬레이터를 이용한 사실적 표적 모델에 대한 역합성 개구면 레이다 영상 합성 (Generation of ISAR Image for Realistic Target Model Using General Purpose EM Simulators)

  • 김석;니키틴 콘스탄틴;가민호
    • 한국전자파학회논문지
    • /
    • 제26권2호
    • /
    • pp.189-195
    • /
    • 2015
  • 전자기파 시뮬레이션을 통해 SAR 영상을 생성하는 방법은 그동안 많은 연구가 이루어져 왔다. 특히, SAR(Synthetic Aperture Radar) 영상 생성 전용 분석 S/W가 있긴 하지만, 대부분 국방 및 보안 특성상 일반인들에게 공개되지 않고 있다. 본 논문에서는 범용 EM(Electro Magnetic) simulator를 이용하여 다양한 방법으로 사실적 표적 모델을 분석하는 방법에 대해 설명한다. 특히, 역합성 개구면 레이다(inverse synthetic aperture radar) 영상을 생성하고, 처리하는 방법을 설명한다. 이 방법을 잘 활용하면, 막대한 비용이 들어가는 수많은 실제 표적들에 대한 표적 인식(target recognition) 데이터베이스 구축을 상대적으로 저렴하고 시간효율적으로 수행할 수 있게 된다.

A Study on Application of Web 3.0 Technologies in Small and Medium Enterprises of India

  • Potluri, Rajasekhara Mouly;Vajjhala, Narasimha Rao
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제5권2호
    • /
    • pp.73-79
    • /
    • 2018
  • The purpose of this study is to explore how small and medium enterprises in India has identified the opportunities and challenges in adopting the Web 3.0 technologies to improve their productivity and efficiency. After an in-depth literature review, researchers framed a semi-structured questionnaire with open-ended questions for collecting responses from managers working in 40 Indian SME's representing five key economic sectors. The collected data was analyzed, and themes were encoded using the NVivo 11 computer-assisted qualitative data analysis software. Content analysis was used to analyze the data collected with the semi-structured interviews. This study identified five key themes and 12 subthemes illustrating the key advantages and challenges as perceived by the managerial leadership of SMEs. The five key themes identified in this study include integration of data and services, the creation of new functionalities, privacy and security, financial and technological challenges, and organizational challenges. The results of this study will benefit the organizational leadership of SMEs in planning and developing their short-term and long-term information systems strategies and will enable SME leaders to make optimal use of their information technology assets, improving the productivity and competitiveness of the firms. Web 3.0 technologies are considered as emerging technologies, so the advantages and challenges of using these technologies for SMEs have not been explored in the context of emerging economies, such as India.

ECC 연산을 위한 가변 연산 구조를 갖는 정규기저 곱셈기와 역원기 (Scalable multiplier and inversion unit on normal basis for ECC operation)

  • 이찬호;이종호
    • 대한전자공학회논문지SD
    • /
    • 제40권12호
    • /
    • pp.80-86
    • /
    • 2003
  • 타원곡선 암호(Elliptic Curve Crypto-graphy : ECC)는 기존의 어떤 공개키 암호 시스템보다 우수한 비트 당 안전도를 제공하고 있어 최근 큰 관심을 끌고 있다. 타원곡선 암호 시스템은 보다 작은 키 길이를 갖고 있어 시스템의 구현에 있어서 작은 메모리 공간과 적은 처리 전력을 필요로 하므로 다른 암호화 방식에 비해 임베디드 어플리케이션에 적용하는데 유리하다 본 논문에서는 제곱 연산이 용이한 정규기저로 표현된 유한체에서의 곱셈기를 구현하였다. 이 곱셈기는 타원곡선 암호에서 사용되는 GF(2/sup 193/) 상에서 구현하였고, Massey와 Omura가 제시한 병렬 입력-직렬 출력 곱셈기의 구조를 변형하여 출력의 크기와 설계면적을 조절할 수 있다. 또한 제안한 곱셈기를 적용하여 정규기저 역원기를 구현하였다. 곱셈기와 역원기는 HDL을 이용하여 설계하구 0.35㎛ CMOS 셀 라이브러리를 이용하여 구현하였으며 시뮬레이션을 통해 동작과 성능을 검증하였다.

후방산란성 엑스레이를 이용한 데이터 획득 시스템 개발 (Development of Data Acquisition System using the Backscattered X-ray)

  • 황인호;정진석;육선우;유선국
    • 한국정밀공학회지
    • /
    • 제26권10호
    • /
    • pp.129-133
    • /
    • 2009
  • Considerable attention has been focused on digital X-ray systems with transmission. However, only a few attempts have been made using X-ray backscatter systems. This study developed a Data Acquisition System (DAS) for backscattered X-rays. The imaging system used X-ray backscatter at low energy levels, which has unique advantages in terms of acquiring information that cannot be obtained using the transmission system. Such systems are of potential benefit in the medical, industrial, security and military fields because of its practical benefits and the low doses used. The developed system is a similar body scan system. Experiments were carried out using a several metal materials and a fish, which produces results similar to those obtained using the human body during X-ray testing.

한국전력 송전계통 보호 데어터베이스 구축 (A Development of Power Transmission System Protection Database for Korea Electric Power Company)

  • 안영태;이승재;최면성;강상희;김호표;이운희;최홍석
    • 대한전기학회논문지:전력기술부문A
    • /
    • 제48권7호
    • /
    • pp.847-854
    • /
    • 1999
  • The setting of protective relays, which is critical to the power system security and reliability, requires a huge volume of data processing and repetitive calculation. Since it has been performed by relay engineers manually, it is vulnerable to human errors, its computerization has been pursued, in which the efficient management of the data is the key to the success. The database for power system protection must accommodate not only the power system network data but also a variety of protective devices. Also its information should be able to be viewed and updated with easy by operators and by computer programs. This paper describes several existing database designs for power system protection, their advantages and disadvantages. Also this paper has identified the required function and designed the database for the KEPCO power system data structure for the benefit of the relay setting process, etc..

  • PDF

Public Perception of establishing Marine Protected Areas in Guimaras Province, Philippines using Contingent Valuation Method

  • Kim, Tae-Goun
    • 한국항해항만학회:학술대회논문집
    • /
    • 한국항해항만학회 2014년도 추계학술대회
    • /
    • pp.91-93
    • /
    • 2014
  • Philippine fisheries code of 1998 (Republic Act 8550), which is enacted to achieve food security by managing, conserving and protecting fishery resources, obliges local governments to designate no less than 15% of jurisdictional municipal water as fisheries resource protection zone. Accordingly, Marine Protected Areas (MPAs) are the most extensively established as fisheries management and conservation tool and over 1,500 MPAs are reported in the Philippines. But there has been debate on the pros and cons of implementing MPAs because of the positive and negative impacts on local communities and fishermen. A dichotomous-choice contingent-valuation survey was conducted in the two municipalities of Guimaras, Philippines to investigate public opinion in debates over MPAs and to estimate willingness to pay (WTP) for MPAs to protect and conserve marine habitats for fishery resources. For the benefits and costs of MPAs, 43.6% of respondents thought the costs would be larger than the benefit, but 91% respondents voted in favor of increasing MPAs for fisheries resources as a protective measure. Finally, the estimated Turnbull lower-bound mean WTP (36.75ha) was php 493.6(US$ 11.3) per household to establish the additional MPA (36.75ha) in their municipality waters.

  • PDF