• Title/Summary/Keyword: mutual security

Search Result 476, Processing Time 0.035 seconds

Development of Chinese Maritime Related Laws and Status and Interpretation in Legislation System (중국 해양관련 법령의 발전과 입법체계에서의 지위 및 해석)

  • Yang, Hee-Cheol;Lee, Moon-Suk;Park, Seong-Wook;Kang, Ryang
    • Ocean and Polar Research
    • /
    • v.30 no.4
    • /
    • pp.427-444
    • /
    • 2008
  • The most important bases of maritime laws in China are laws enacted by Constitution, a legislative institution of National People's Congress and Legislation of NPC Standing Committee. However, in reality, the institution, which become the basis of Chinese marine policy and leads overall maritime affairs, is a State Council of the Chinese central government and many objects of our researches on Chinese marine policy and laws are composed centering on this administration law. Therefore, in understanding Chinese maritime laws, it becomes an important prerequisite to understand relevant laws (statutes), administration law, statutes of local province, mutual authority relationships of these legislative institutions, and interpretation authority regarding laws (statutes). In May 2003, Chinese State Council ratified and declared ${\ll}$Guideline of the national maritime economic development plan${\gg}$ and this is the first macroinstructive document enacted by the Chinese government for promoting maritime economy in integration development. This plan guideline shows very well a new policy and deployment direction of maritime policy in China. China is already striving to lead its maintenance stage of domestic legislation into a new stage under the UN maritime laws agreement system and this is an expression of intention to take national policy regarding the ocean as a new milestone for the national economy through concurrent developments in various fields such as national territory, economy, science technology, national defense, and maritime biology. In this point, Chinese maritime policy and maritime legislation provide lots of indexes of lessons in many parts. In particular, regarding Korea, which has to solve many issues with China in Yellow Sea, East China Sea, and Balhae, we have to realize that we can maximize national interest only with a systematic approach to research on changes of domestic policies and maritime legislation within China. In addition, in understanding Chinese maritime related laws, we have to realize it is an important task to not only understand legislative subjects for mutual creation of order within the entire frame of law orders of China but also to predict and react to direction of policy of Chinese domestic legislation through dynamics of these subjects.

Design of PUF-Based Encryption Processor and Mutual Authentication Protocol for Low-Cost RFID Authentication (저비용 RFID 인증을 위한 PUF 기반 암호화 프로세서와 상호 인증 프로토콜 설계)

  • Che, Wonseok;Kim, Sungsoo;Kim, Yonghwan;Yun, Taejin;Ahn, Kwangseon;Han, Kijun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.12
    • /
    • pp.831-841
    • /
    • 2014
  • The attacker can access the RFID systems illegally because authentication operation on the RFID systems are performed in wireless communication. Authentication methods based on the PUF were presented to defend attacks. Because of Hash and AES, the cost is expensive for the low-cost RFID tag. In this paper, the PUF-based encryption processor and the mutual authentication protocol are proposed for low-cost RFID authentication. The challenge-response pairs (PUF's input and output) are utilized as the authentication key and encrypted by the PUF's characteristics. The encryption method is changed each session and XOR operation with random number is utilized. Therefore, it is difficult for the attacker to analyze challenge-response pairs and attack the systems. In addition, the proposed method with PUF is strong against physical attacks. And the method protects the tag cloning attack by physical attacks because there is no authentication data in the tag. Proposed processor is implemented at low cost with small footprint and low power.

The Comparative Study on Arbitration System of South Korea, North Korea, and China (남북한 및 중국 중재제도의 비교연구)

  • Shin, Koon-Jae;Lee, Joo-Won
    • Journal of Arbitration Studies
    • /
    • v.17 no.2
    • /
    • pp.101-124
    • /
    • 2007
  • The legal systems and open-door policies to foreign affairs in North Korea have been followed by those of China. Whereas an arbitration system of South Korea accepted most parts of UNCITRAL Model Law, North Korea has succeeded to an arbitration system of a socialist country. China, under the arbitration system of socialist country, enacted an arbitration act reflected from UNCITRAL Model Law for keeping face with international trends. We have used these three arbitration system as a tool for analyzing an arbitration system in North Korea. With an open-door policy, North Korea and China enacted an arbitration act to provide a legal security. Therefore, the core parts of arbitration system in North Korea and China are based on a socialist system while those of South Korea is on liberalism. So, North Korea and China enacted an arbitration act on the basis of institutional arbitration, on the other side, South Korea is based on ad-hoc arbitration. Because of these characters, in terms of party autonomy, it is recognized with the order as South Korea, China and North Korea. Also North Korea enacted separate 'Foreign Economic Arbitration Act' to resolve disputes arising out of foreign economies including commercial things and investments. There are differences in arbitration procedures and appointment of arbitrators : South Korea recognizes parties' autonomy, however parties should follow the arbitration rules of arbitration institutes in North Korea and China. According to an appointment of arbitrators, if parties fail to appoint co-arbitrators or chief arbitrators by a mutual agreement, the court has the right to appoint them. In case of following KCAB's rules, KCAB secretariats take a scoring system by providing a list of candidates. A party has to appoint arbitrators out of the lists provided by arbitration board(or committee) in North Korea. If a party may fail to appoint a chief arbitrator, President of International Trade Arbitration Board(or Committee) may appoint it. In China, if parties fail to appoint a co-arbitrator or a chief arbitrator by a mutual agreement, Secretary general will decide it. If a arbitral tribunal fails to give a final award by a majority decision, a chief arbitrator has the right for a final decision making. These arbitration systems in North Korea and China are one of concerns that our companies take into account in conducting arbitration procedures inside China. It is only possible for a party to enforce a final arbitral award when he applies an arbitration inside North Korea according to International Trade Arbitration Act because North Korea has not joined the New York Convention. It's doubtful that a party might be treated very fairly in arbitration procedures in North Korea because International Trade Promotion Commission controls(or exercises its rights against) International Trade Arbitration Commission(or Board).

  • PDF

Testing the Convergence of Military Expenditure and Arms Imports in Northeast Asian Countries (동북아 국가의 국방비 지출 및 군수물자 수입 수렴성 검정)

  • Rhee, Hyun-Jae
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.2
    • /
    • pp.475-487
    • /
    • 2013
  • The aim of this study is to examine an existence of mutual interdependency in terms of military expenditure and arms imports between Northeast Asian countries such as South Korea, North Korea, China, Japan, and U.S. Recently, the mood of post cold war and intensified globalization lead to be disarmament in pursuing a policy on national defence in many countries. Since potential menace to national security has been receiving more concern rather than a direct armed clash, mutual interdependency on military spending should be fully understood. For a methodological tools, ${\beta}$ and ${\sigma}$-convergences, convergence with rational expectation, and Granger causality test are employed. Empirical evidence shows that the convergences which are evaluated by ${\beta}$, ${\sigma}$, and by a model based on rational expectation are in general revealed, and differences are more sensitive to a military decision making procedures. Granger causality, however, is not being existed. To this end, it would be concluded that the Northeast Asian countries are going with a trend in the world than forming their own tendency in this region.

A Robust Biometric-based User Authentication Protocol in Wireless Sensor Network Environment (무선센서네트워크 환경에서 생체기반의 개선된 사용자 인증 프로토콜)

  • Shin, Kwang-Cheul
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.3
    • /
    • pp.107-123
    • /
    • 2013
  • In a wireless sensor network environment, it is required to ensure anonymity by keeping sensor nodes' identifiers not being revealed and to support real-time authentication, lightweight authentication and synchronization. In particular, there exist possibilities of location information leakage by others, privacy interference and security vulnerability when it comes to wireless telecommunications. Anonymity has been an importance issue in wired and wireless network environment, so that it has been studied in wide range. The sensor nodes are interconnected among them based on wireless network. In terms of the sensor node, the researchers have been emphasizing on its calculating performance limit, storage device limit, and smaller power source. To improve of biometric-based D. He scheme, this study proposes a real-time authentication protocol using Unique Random Sequence Code(URSC) and variable identifier for enhancing network performance and retaining anonymity provision.

A Method of Authenticating WLAN APs for Smartphones (스마트폰을 위한 무선 AP 인증 방법)

  • Shin, DongOh;Kang, Jeonil;Nyang, DaeHun;Lee, Sokjoon;Lee, KyungHee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.1
    • /
    • pp.17-28
    • /
    • 2014
  • The increase of smartphone users have made mobile carriers offload increasingly congested traffic of 3/4G by providing Wi-Fi hot-spots in the public places such as coffee shops and subway stations. In the traditional authentication in WLAN, the users should convince the service providers that they are valid customers before they use WLAN services. Since the authentication protocol is designed for service providers. Even with the mutual authentication based on the IEEE 802.1X, which is supported by IEEE 802.11 standard, it is difficult to be convinced of that the service providers really have installed the WLAN APs, which users are confronted with. An attacker can install rogue APs that masquerade as legitimate APs by copying the SSID, MAC address, etc. in order to obtain users' private information. In this paper, we introduce a method of authenticating legitimate APs for smartphone users. And we show our proposal can be well utilized for the current Wi-Fi hot-spots as a security plug-in and prove it through our experiments.

A Session Key Establishment Scheme in Mobile Ad-Hoc Networks (이동 애드혹 네트워크에서 세션 키 설정 방안)

  • 왕기철;정병호;조기환
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.4
    • /
    • pp.353-362
    • /
    • 2004
  • Mobile Ad-Hoc network tends to expose scarce computing resources and various security threats because all traffics are carried in air along with no central management authority. To provide secure communication and save communication overhead, a scheme is inevitable to serurely establish session keys. However, most of key establishment methods for Ad-Hoc network focus on the distribution of a group key to all hosts and/or the efficient public key management. In this paper, a secure and efficient scheme is proposed to establish a session key between two Ad-Hoc nodes. The proposed scheme makes use of the secret sharing mechanism and the Diffie-Hellman key exchange method. For secure intra-cluster communication, each member node establishes session keys with its clusterhead, after mutual authentication using the secret shares. For inter-cluster communication, each node establishes session keys with its correspondent node using the public key and Diffie-Hellman key exchange method. The simulation results prove that the proposed scheme is more secure and efficient than that of the Clusterhead Authentication Based Method(1).

A Landscape Design Study on Chung Ra Pro-Environmental Park (청라환경공원 조성 설계연구)

  • 신현돈
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.32 no.1
    • /
    • pp.104-126
    • /
    • 2004
  • The recognition of the environment and its importance have generated various types of parks, such as the ecological put the environmental put and the natural academy. They are considered the connecting media for the creation of space as a new paradigm in design for the 21st century from the late 1990s, environmental designs in space planning have been created from various angles of Perspectives including restoration of the natural ecosystem and introduction of natural circulation systems. Based on the aye facts and through theoretical examination of environmental park models, this research (1) establishes the concept and the significance of environmental parte; and, based on this, classifies the types of industrial sublimity; (2) presents environmental designing principles and standards; and (3) presents the "Chung Ra pro-Environmental Park plan" based on these ideas. The following is the summary of research results: First, while existing city parks are human-oriented, interior-oriented, and shape-centered, an environmental park considers human and nature equally and gives great importance to the relationship between the internal and external of the subject. It is a mark of environmental education that considers the natural ecosystem. Therefore, the environmental park is the 21st Century′s type of an open park for creating new forms of nature, as well as for incorporating culture and values through education. In such an environmental system, nature, culture, and human beings pursue balance, harmony, and security through mutual recognition. Second, in a broad sense, the types of environmental park can be classified into Cultural Restoration, Ecological Conservation, and Environmental Replacement. Third, by selecting Chung na environmental park in Incheon, which is a filtration plant lot, as a research subject, I have presented alternative planning for environmental parte in which culture and nature coexist on the basis of environmental planning principles and standards.

Smart Card Based User Authentication Scheme Secure Against Password Guessing Attack

  • Joo, Young-Do
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.4 no.3
    • /
    • pp.182-188
    • /
    • 2011
  • Recently Yoon et al. proposed the remote user authentication scheme using smart cards. But their scheme has not satisfied security requirements which should be considered in the user authentication scheme using the password based smart card. In this paper, we prove that Yoon et al.'s scheme is vulnerable to a password guessing attack in case that the attacker steals the user's smart card and extracts the information from the smart card. Accordingly, this paper proposes the improved user authentication scheme based on the hash functin and random nonce that can withstand various possible attacks including a password guessing attack. The result of comparative analysis demonstrates that the proposed scheme is more secure and efficient than Yoon et al.'s scheme, with a trivial trade-off to require just a few more exclusive-OR operations.

Contextual Understanding of North Korea Nuclear Problem (북한 핵의 맥락적 이해)

  • Park, Bong-gyu
    • Korea and Global Affairs
    • /
    • v.1 no.1
    • /
    • pp.97-114
    • /
    • 2017
  • This article aims for searching the clue of North Korea nuke-problem by understanding it contextually. We must see this from the beginning as many trials in settling the problem have failed. North Korea nuke-problem is related to the change of international implication as well as the domestic process of its development. At first, it started from the regime survival, which evolved with the effect of learning. During the Cold War, its development had combined the principle of 'self-defense' because of Sino-Russia conflict. Particularly, its meaning varied dramatically due to the collapse of Cold War system plus the advent of post-Cold War system. North Korea nuclear program has became a global problem based on the deterioration of North Korea's security milieu and Bush administration's policy. Therefore, the area of common solution for NK nuke-problem must be found in the context of regime survival and the change of its meaning by continual convergence effort.