• Title/Summary/Keyword: identification restrictions

Search Result 25, Processing Time 0.027 seconds

Efficient RFID Authentication protocol for Distribution Database Environment (분산시스템 환경에 적합한 효율적인 RFID 인증 시스템)

  • Choi, Eun-Young;Lee, Su-Mi;Lim, Jong-In;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.6
    • /
    • pp.25-35
    • /
    • 2006
  • Radio Frequency identification (RFID) will become an important technology in remotely object identification systems. However, the use of RFID tags may create new threats to the sniな and Privacy of individuals holding RFID tags. These threats bring several problems which are information leakage of a tag, location trace of individuals and impersonation of a tag. Low-cost RFID systems have much restrictions such as the limited computing power, passive power mechanism and low storage space. Therefore, the cost of tag's computation should be considered as an important factor in low-cost RFID systems. We propose an authentication protocol, OHLCAP which requires only one one-way hash function operation and hence is very efficient. Furthermore, our protocol is suitable to distribution database environment. Hence our scheme can be applied to ubiquitous computing environment.

Blockchain-based new identification system (블록체인 기반 새로운 신원확인 체계)

  • Jung, Yong-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.2
    • /
    • pp.452-458
    • /
    • 2021
  • The value and importance of personal information are increasing due to the increasing number of fields where the Internet environment and computing environment are used, and user authentication technology is also changing. Until now, accredited certificates, which are mainly used in the financial sector, are being replaced with biometric authentication technology due to the problem of revocation. However, another problem is that biometric information cannot be modified once it is leaked. Recently, with the advent of blockchain technology, research on user authentication methods has actively progressed. In this paper, both public certificate and blockchain-based user authentication can be used without system change, and a new DID issuance and reissuance method that can replace the resident registration number is presented. The proposed system can be used without restrictions in a blockchain. However, the currently used DID requires installation of an application at the Interworking Support Center for verification. Since a DID can be authenticated without registering as a member, indiscriminate information collection can be prevented. Security, convenience, and determinism are compared with the existing system, and excellence is proven based on various attack methods, its portability, and proxy use.

Design of License Management Model for super-distribution between DRM Consumers (DRM 사용자간 재배포를 위한 라이센스관리 모델 설계)

  • Lee, Byung-Wook;Liu, Zong-Hua
    • Journal of Internet Computing and Services
    • /
    • v.8 no.3
    • /
    • pp.9-17
    • /
    • 2007
  • Super-distribution is essential for revitalization of digital contents industry in DRM system. Since existing DRM systems emphasize on security for intellectual property rights, it became restrictions to content distribution and the consumer rights. This paper suggests license management mechanism which strengthen super-distribution between consumers. It is to manage distribution history for each content by inserting consumer's identification information in content head. Client can verify security by comparing header and license after issuing license. It classifies the type of distribution and license, and then applies adaptive distribution methods. It can revitalize contents distribution by releasing proper license for super-distribution.

  • PDF

A TOF-SIMS Study of Artificially Photoaged Silk Fabrics

  • Lee, Boyoung;Ryu, Hyoseon;Park, Sohyun
    • Journal of Conservation Science
    • /
    • v.34 no.2
    • /
    • pp.129-135
    • /
    • 2018
  • Scientific investigation of cultural heritage can provide important information to understand the context of the object. To know the characteristics of the material is also an essential part of objects management and conservation. However, the identification and characterization of organic dyes used in archaeological and historical textiles are often limited by the restrictions in sampling. To cope with the difficulties, applications of high-performance techniques of surface analysis, such as Time of Flight-Secondary Ion Mass Spectra (TOF-SIMS) could be considered as a non or micro-destructive option. This study aims to examine the applicability of TOF-SIMS analysis to the detection of organic dyes from historical textiles. A group of silk fabrics dyed with vegetable dyes were artificially photo-aged to different degrees and analyzed with TOF-SIMS. Molecular and fragment ions from indigo were successfully detected from the aged samples; however, only some fragment ions were observed from gardenia and safflower dyed fabrics. Further studies with actual historical samples with extended examination scope would be necessary to assess the validity of this technique.

A Study on Improvement Plans for Flight and Cabin Crew Fatigue Management System after COVID-19 Pandemic (코로나19 팬데믹 이후 승무원 피로관리시스템 개선방안 연구)

  • Je-Hyung Jeon;Hwayoung Sung;Sua Chon;Geun-Hwa Jeong
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.31 no.1
    • /
    • pp.43-56
    • /
    • 2023
  • The aviation industry has continued to grow despite the influence of external environmental factors such as SARS and MERS. However, this growth has led to a sharp decrease in air traffic and a crisis of flight suspension due to the collapse of the global value chain and the decline of the world economy as the World Health Organization (WHO) declared a COVID-19 pandemic. Due to the decrease in the number of international flights, aviation workers such as pilots and cabin crew were exposed to high psychological stress and fatigue, such as large-scale layoffs, job instability, decrease in income, and increased risk of infection during. Recently, the international community has eased immigration restrictions through quarantine activities, and airlines are taking a step further to recover existing air demand. However, during the crisis period, a significant number of professional workers have been turned off or fired, and the physical and mental fatigue of those who can perform their duties is increasing. Therefore, this paper intends to examine the direction of policy improvement and the identification of problems in aviation safety and fatigue management after the pandemic.

A Study on Improving the Storm and Wind Damage Management System of Coastal Cities (연안도시 풍수해 관리체계 개선방안에 관한 연구)

  • Oh, Sang-Baeg;Lee, Han-Seok
    • Journal of Navigation and Port Research
    • /
    • v.43 no.3
    • /
    • pp.209-218
    • /
    • 2019
  • Coastal cities suffer a great deal of storm and wind damage. The storm and wind characteristics vary between cities. Therefore, a storm and wind damage management system suited for specific characteristics is required for each coastal city. In this study, we analyze the current situation and establish the problem of storm and wind damage management system in regards to urban management, coastal management and disaster management. We also review the storm and wind damage management system for the USA and Japan. We consequently propose a plan to improve the storm and wind damage management system. As a result of the study, in terms of city management, we recommend the compulsory identification of disaster prevention districts, implementation of the integrated coastal city management plan, designation of natural disaster risk mitigation area as disaster prevention district, the division of disaster prevention district into wind damage prevention district, storm damage prevention district, erosion damage prevention district, the building of restrictions at the disaster prevention district by ordinance, etc. In regards to coastal management, we suggest the delegation of authority to delegate coastal erosion management area to the local government, the subdivision of coastal erosion management area into erosion serious area, erosion progress area, erosion concern area, the building restrictions at coastal erosion management area by ordinance, development of erosion prediction chart, etc. In relation to disaster management, we recommend the integration of "countermeasures against natural disasters act" and "disasters and safety management basic act", the local government-led disaster prevention system, the local disaster management network, and the customized local disaster prevention plan, etc.

A Study on the Linkage and Gap in Personal Information Policy in Cloud Services between Multinational Companies' Human Resource Management and Domestic Companies' Human Resource Management (제조 전문 국제기업 인사관리와 국내 인사관리 클라우드 서비스 운영 개인정보정책과의 연계 및 괴리에 대한 연구)

  • Seo, Woo-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.1
    • /
    • pp.639-643
    • /
    • 2018
  • Laws concerning the protection of personal information have been enacted and revised as the legislation on personal information protection on the basis of the Act on the Protection of Personal Information Maintained by Public Institutions. Nevertheless, there have been continuing threats resulting from the fact that restrictions on security subject to laws remain unclear. By proposing protected access utilizing a unique identification key of enterprises, regarding the personal information of various internal and external clients held by international manufacturing companies and attempting to make policy aspect and management access at the same time, there is a change of gradual decline in cloud personnel information management service, which is the domestic ISP service for personnel management as the technology facilitated to reduce the burden on personnel and cost for the protection of personal information and the market is also changing to the direction for companies to directly operate. Therefore, this study intends to examine the convenience of integrated management for ensuring security, while confirming the gap on flexibility and safety on management point regarding the human resources of international manufacturing companies arising from its interactions.

Multimorbidity and Its Impact on Workers: A Review of Longitudinal Studies

  • Cabral, Giorgione G.;de Souza, Ana C. Dantas;Barbosa, Isabelle R.;Jerez-Roig, Javier;Souza, Dyego L.B.
    • Safety and Health at Work
    • /
    • v.10 no.4
    • /
    • pp.393-399
    • /
    • 2019
  • Objective: This study investigates the impact of multimorbidity on work through a literature review of longitudinal studies. Methods: A systematic review was carried out in the databases Lilacs, SciELO, PAHO, PubMed/Medline, Scopus, Web of Science, and Cochrane. There were no restrictions regarding the year of publication or language to maximize the identification of relevant literature. The quality of studies was assessed by the protocol STrengthening the Reporting of OBservational studies in Epidemiology (STROBE). Results: An initial database search identified 7522 registries, and at the end of the analysis, 7 manuscripts were included in the review. Several studies have demonstrated direct and indirect impacts of multimorbidity on the health of workers. For this, the number of missed days due to health-related issues was evaluated, as well as the reduction in work productivity of the unhealthy worker, vulnerability of the worker with multimorbidity regarding higher indices of dismissal and recruitment difficulties, and incidence of early retirement and/or receipt of benefits due to disabilities. Conclusions: Multimorbidity has a negative impact on work, with damages to quality of life and work productivity, worsening the absenteeism/presenteeism indices, enhancing the chances of temporary or permanent leaves, and lowering employability and admission of individuals with multimorbidity.

Development of Feedback Data Automated Verification Program for Mission S/W (임무 S/W 시험을 위한 피드백 데이터의 기댓값 검증 자동화 도구 개발)

  • Kwon, GI-Bong;Lee, Ha-Yoeun;Ha, Seok-Wun
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.49 no.10
    • /
    • pp.871-877
    • /
    • 2021
  • Aircraft defects are important matters directly related to the operation of the aircraft and the life of the pilot. The defects in the mission software that occur during aircraft control seriously affect the pilot's mission performance and safety. Therefore, the organization in charge of aircraft development or software defects are reinforced in the process to identify and eliminate defects in the early stages of development, and a lot of labor and time are spent, but due to the nature of the mission software, strong functional coupling with other avionics and high complexity, so there are restrictions on the identification and removal of software defects through the existing test method. This study analyzes the effect of securing mission software integrity and reducing test cost through data integrity verification by developing a tool that automates the verification of expected value of feedback data among communication data of mission computer interlocking equipment.

Fraud Detection in E-Commerce

  • Alqethami, Sara;Almutanni, Badriah;AlGhamdi, Manal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.312-318
    • /
    • 2021
  • Lack of knowledge and digital skills is a threat to the information security of the state and society, so the formation and development of organizational culture of information security is extremely important to manage this threat. The purpose of the article is to assess the state of information security of the state and society. The research methodology is based on a quantitative statistical analysis of the information security culture according to the EU-27 2019. The theoretical basis of the study is the theory of defense motivation (PMT), which involves predicting the individual negative consequences of certain events and the desire to minimize them, which determines the motive for protection. The results show the passive behavior of EU citizens in ensuring information security, which is confirmed by the low level of participation in trainings for the development of digital skills and mastery of basic or above basic overall digital skills 56% of the EU population with a deviation of 16%. High risks to information security in the context of damage to information assets, including software and databases, have been identified. Passive behavior of the population also involves the use of standard identification procedures when using the Internet (login, password, SMS). At the same time, 69% of EU citizens are aware of methods of tracking Internet activity and access control capabilities (denial of permission to use personal data, access to geographical location, profile or content on social networking sites or shared online storage, site security checks). Phishing and illegal acquisition of personal data are the biggest threats to EU citizens. It have been identified problems related to information security: restrictions on the purchase of products, Internet banking, provision of personal information, communication, etc. The practical value of this research is the possibility of applying the results in the development of programs of education, training and public awareness of security issues.