• Title/Summary/Keyword: credential management

Search Result 32, Processing Time 0.023 seconds

Establishment of Credential on Health Educator for Activation of Health Promotion Program (국민건강증진사업 활성화를 위한 보건교육사 자격인정제도 도입방안)

  • Kim, Myung;Ko, Seung-Duk;Kim, Young-Bok
    • Korean Journal of Health Education and Promotion
    • /
    • v.15 no.2
    • /
    • pp.67-79
    • /
    • 1998
  • Health education is essential service of health promotion program, and health promotion is external extension of health education. However, the implementation of health education in community is not well because of lack of budget and health education specialist, deficient cognition for health promotion. Hence, introduction for the credential on health educator is to assist community and school health through the training of the specialist This study was carried out to establish the credential health educator for activation of health promotion program in Korea. In detail, this study aimed at 1) to confirm the law for health education, 2) to understand the credential on health education specialist in U. S. and the certification on other parts in Korea, 3) to establish the proper credential on health educator in Korea. Finding the results were as follows: The law on health education was Regulation on Health Promotion which has defined the health educator and responsibility of health education. In case of U. S., the credential on health education specialist has implemented since 1992, and the sort of credential on health education specialist were community health educator, public health educator, school health educator, and health promotion specialist. Therefore, major opinion to introduce the proper credential on health education in Korea were suggested: the first, establishment of educational processing on the training of specialized health educator, the second, introduction of examination on the evaluation for ability as health educator. the last. planning for application of health educator in community.

  • PDF

A study on the actual state of learning competences in students at a college (J 대학교 재학생의 학습역량 실태조사)

  • Song, Kyoung-hee
    • Journal of Korean Dental Hygiene Science
    • /
    • v.1 no.2
    • /
    • pp.21-39
    • /
    • 2018
  • The purpose of this study was to examine the learning competencies of students at a college from September 1 to November 30, 2017, in an effort to provide some information on how to foster learning competencies in college years, which lay the foundation for work and social lives. 1. The learning competencies of the subjects consisted of academic vision, student identity, cognitive regulation, emotional regulation, learning management and creating learning environments. Out of five points, they scored the highest in academic vision and student identity with 3.34, followed by learning management with 3.20, creating learning environments with 3.18, emotional regulation with 3.16 and cognitive regulation with 3.14. 2. There were statistically significant differences in academic vision according to age, the area of major, the academic credential of their fathers, commuting time, military service experience and career plans. 3. There were statistically significant differences in student identity and cognitive regulation according to gender, age, the area of major, the academic credential of their fathers, commuting time, military service experience and career plans. 4. There were statistically significant differences in emotional regulation according to age, the area of major, the academic credential of their fathers, commuting time, career plans and daily mean study hours. 5. There were statistically significant differences in learning management according to gender, age, the area of major, grade point average, the academic credential of their fathers, career plans and daily mean study hours. 6. There were statistically significant differences in creating learning environments according to gender, age, the area of major, the academic credential of fathers, commuting time, career plans and daily mean study hours. As they were poorest at the cognitive regulation area among the areas of learning competencies, self-directed learning programs that deal with how to study, learning process, how to take notes and arrange them, how to link different pieces of acquired knowledge and how to map out study plans should be developed to give support to students.

FinDID : A DID service supporting the standard service scheme for the financial sector

  • Lee, Young-Eun;Kim, Hye-Won;Lee, Myung-Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.5
    • /
    • pp.127-138
    • /
    • 2022
  • In this paper, we present FinDID (Financial Decentralized IDentity), a blockchain-based DID(Decentralized IDentity) service that can flexibly control personal information or credentials through a systematic verification method while complying with the standard service scheme of decentralized identity for the financial sector. DID is an identity management system used in a decentralized environment without a specific certification authority, and as a technology that allows users to control their own information, it can realize self-sovereignty over users' own personal information. Through FinDID, users receive credentials that authenticate their various personal information from the issuer, select only the claims required by the target financial service using their personal electronic wallet, create presentations from credentials. Then they submit it to the financial service, leading to their qualification from the service. FinDID consists of electronic wallet, credential issuer, credential storage, DID service including DID management contract and credential management contract, and financial services using this service scheme. The DID service manages each user's DID and supports all verification processes of the associated identity management scheme.

Infection control among dental hygienists according to infection control education experiences (치과위생사의 감염관리 교육경험에 따른 감염관리 실태)

  • Kim, Ji-Hyun;Kim, Jin-Kyoung
    • Journal of Korean society of Dental Hygiene
    • /
    • v.11 no.4
    • /
    • pp.547-556
    • /
    • 2011
  • Objectives : The purpose of this study was to examine the relationship between the infection control education experiences of dental hygienists and the state of their infection control. Methods : The subjects in this study were the dental hygienists who worked in Seoul. The relationship of their infection control education experiences to their gender, marital status, academic credential, workplace, length of service, infection control implementation, experience of being exposed to infection, way of coping with it, hand washing, use of personal protection devices and equipment management was analyzed. Results : It is found that the variable to affect the state of infection control was educational experiences about handpiece water pipe management, ultrasonic scaler water pipe management and three-way syringe water pipe management. Conclusions : Dental hygienists who are one of major dental personnels should receive systematic education on infection control to acquire accurate knowledge to ensure the successful prevention of cross infection.

A Systematic Review on the Certified Geriatric Pharmacist Program of the U.S.: Certification, Education and Outcomes (미국의 노인전문약사 제도에 대한 체계적 고찰: 인증, 교육 및 성과)

  • Nam, Hye Yeon;Cho, Eun
    • YAKHAK HOEJI
    • /
    • v.58 no.2
    • /
    • pp.129-140
    • /
    • 2014
  • Background: As elderly population has been increasing, pharmacists need to possess special knowledge and skills to provide enhanced pharmaceutical care for senior patients. Purpose: This study aims to systematically review on (1) the certified geriatric pharmacists (CGP) system, (2) the curriculum related to geriatric pharmacy education, and (3) the CGP's performance in terms of clinical, economic and humanistic outcomes in the U.S. Method: The information related to CGP system and curriculum was obtained through the official websites of 'American Society of Consultant Pharmacists', 'Commission for Certification in Geriatric Pharmacy' and the selected pharmacy school samples. Articles about on the outcomes of pharmacist-provided cognitive services including Medication Therapy Management were searched through PubMed. Results: To gain the CGP credential, pharmacists need 2-year experience as pharmacist in advance and take the CGP examination. This certification must be renewed every 5 year. Most pharmacy schools provide geriatric-related curriculum through didactic or pharmacy practice classes for pharmacy students and certificate or dual degree in gerontology are given on completion. Most previous outcomes research reported that pharmacists have played a role in yielding favorable results regarding clinical, economic and humanistic outcomes for nursing facilities, hospitals and community pharmacy settings. Conclusion: Considering the organized CGP certification system and concrete educational courses established the basis for pharmacists to exert their ability for senior patients of the U.S., it is suggested to build a geriatric pharmacist credential model for pharmacists to provide the increasing elderly patients with the requisite safe and effective pharmacy care in Korea.

A Study on Secure and Improved Single Sign-On Authentication System against Replay Attack (재전송 공격에 안전하고 개선된 Single Sign-On 인증 시스템에 관한 연구)

  • Kim, Hyun-Jin;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.769-780
    • /
    • 2014
  • In general, internet users need to remember several IDs and passwords when they use diverse web sites. From an effective management perspective, SSO system was suggested to reduce user inconvenience. Kerberos authentication, which uses centralized system management, is a typical example of a broker-based SSO authentication model. However, further research is required, because the existing Kerberos authentication system has security vulnerability problems of password and replay attacks. In SSO authentication systems, a major security vulnerability is the replay attack. When user credentials are seized by attackers, an authorized session can be obtained through a replay attack. In this paper, an improved SSO authentication model based on the broker-based model and a secure lightweight SSO mechanism against credential replay attack is proposed.

A Study on the Design and Implementation of E-AV Models for University Academic Qualification Verification (대학 학력 검증을 위한 E-AV 모델 설계와 구현 방법에 관한 연구)

  • Jung-Oh Park
    • Journal of Industrial Convergence
    • /
    • v.21 no.5
    • /
    • pp.133-142
    • /
    • 2023
  • In recent years, the problem of academic credential falsification is not simply the manipulation of certificates generated by educational institutions, but also the difficulty of trusting automated relationship verification and verification itself, such as falsely recording completion as graduation while still in school. This is due to the lack of sharing of educational background databases among university institutions and the establishment/operation of independent systems that make it difficult to track educational backgrounds. This study designs and implements an E-AV model for academic credential verification centered on university institutions. It summarizes and stores the linked information on the existing academic background in an encrypted database and implements it with web standard technology considering the compatibility and scalability of the existing system. The results of sample data verification show that it improves safety against forgery and complies with storage space and execution performance. This study aims to contribute to the improvement of online verification services such as academic records management in domestic universities.

Design of User Data Management System for Grid Service (그리드 서비스를 위한 사용자 데이터 관리 시스템 설계)

  • Oh, Young-Ju;Kim, Beob-Kyun;An, Dong-Un;Chung, Seung-Jong
    • Proceedings of the KIEE Conference
    • /
    • 2005.05a
    • /
    • pp.224-226
    • /
    • 2005
  • Grid computing enables the fundamental computing shift from a localized resource computing model to a fully-distributed virtual organization with shared resources. In the grid computing environment, grid users usually get access rights by mapping their credential to local account. The mapped total account is temporally belongs to grid user. So, data on the secondary storage, which is produced by grid operation, can increase the load of system administration or can issue grid user's privacy. In this paper, we design a data management system for grid user to cover these problems. This system implements template account mechanism and manages local grid data.

  • PDF

A STUDY ON IMPROVED PKMv2 FRAMEWORK FOR FAST MOBILITY IN 802.16e NETWORKS

  • Suh, Gi-Jun;Yun, Seung-Hwan;Yi, Ok-Yeon;Lee, Sang-Jin
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2009.01a
    • /
    • pp.400-403
    • /
    • 2009
  • EAP (Extensible Authentication Protocol) is often used as an authentication framework for two-party protocol which supports multiple authentication algorithms known as "EAP method". And PKMv2 in 802.16e networks use EAP as an authentication protocol. However, this framework is not efficient when the EAP peer executing handover. The reason is that the EAP peer and EAP server should re-run EAP method each time so that they authenticate each other for secure handover. This makes some delays, so faster re-authentication method is needed. In this paper, we propose a new design of the PKMv2 framework which provides fast re-authentication. This new framework and usage of the keys which used as a short-term credential bring better performance during handover process.

  • PDF

A Design of Device Identification and Communication Method for Secure Device Monitoring based Smart Phone (스마트폰 기반에서 안전한 디바이스 모니터링을 위한 디바이스 식별 및 통신 기법 설계)

  • Jin, Byungwook;Ahn, Heuihak;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.69-78
    • /
    • 2017
  • As the smartphone-based devices are diffused and developed rapidly, they provide the convenience to the users. The abovementioned sentence technologies are being used not only in the existing sensor and wireless network technology but also in the application services of the diverse fields application services such as smart appliance, smart car, smart health care, etc. and the new fusion paradigm from the industry is presented by undertaking the researches in diverse area by the enterprises and research institutions. However, the smart environment exposes its weaknesses in the mobile terminal area, existing wireless network and IT security area. In addition, due to new and variant ways of attack, not only the critical information are disclosed However also the financial damages occur. This paper proposed the protocol to perform the smartphone-based safe device monitoring and safe communication. The proposed protocol designed the management procedure of registration, identification, communication protocol and device update management protocol and the safety against the attack techniques such as the an-in-the-middle-attack, impersonation attack, credential threat, information leaks and privacy invasion was analyzed. It was observed that the proposed protocol showed the performance improved by approximately 52% in the communication process than the existing system.