• Title/Summary/Keyword: revocation

Search Result 146, Processing Time 0.02 seconds

A Study on the Improvement Directions for the Industrial Housing Accreditation System in Korea (공업화주택 인정제도 개선 방향 설정에 관한 연구)

  • Hwang, Eun-Kyoung;Lee, Jong-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.1
    • /
    • pp.171-177
    • /
    • 2021
  • The demand for promoting industrialization construction methods is increasing in Korea to cope with various construction environments, such as the lack of construction engineers, aging construction workers, and the government's 52-hour workweek policy. The industrial housing accreditation system was introduced in 1992 to recognize and improve the quality of industrial housing, but only six companies are currently certified, and there are no records of constructing industrial houses. Currently, the industrialized housing accreditation system in Korea comprises standards for the recognition, revocation of recognition, and promoting the construction of industrial houses. Therefore, this study analyzed the regulations of the industrialized housing accreditation system, derived the problems of each regulation, and derived improvement directions to promote the industrialized housing accreditation system in Korea. Specific measures include expanding the current industrial housing accreditation scope to quasi (semi)-housing, revising the performance and production standards of industrialized housing, relaxing the building standards, and providing financial support to promote industrialized housing.

Efficient and Secure Member Deletion in Group Signature Scheme (그룹 서명 기법에서의 효율적이고 안전한 구성원 탈퇴 방법)

  • 김현정;임종인;이동훈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.6
    • /
    • pp.41-51
    • /
    • 2001
  • Group signature schemes allow a group member to sign messages anonymously on behalf of the group. In case of dispute, only a designated group manager can reveal the identity of the member. During last decade, group signature schemes have been intensively investigated in the literature and applied to various applications. However, there has been no scheme properly handling the situation that a group member wants to leave a group or is excluded by a group manager. As noted in[3], the complexity of member deletion stands in the way of real world applications of group signatures and the member deletion problem has been a pressing open problem. In this paper we propose an efficient group signature scheme that allows member deletion. The length of the group public key and the size of signatures all independent of the size of the group and the security of the scheme relies on the RSA assumption. In addition, the method of tracing all signatures of a specific member is introduced.

CRL Distribution Method based on the T-DMB Data Service for Vehicular Networks (차량통신에서 T-DMB 데이터 서비스에 기반한 인증서 취소 목록 배포 기법)

  • Kim, Hyun-Gon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.161-169
    • /
    • 2011
  • There is a consensus in the field of vehicular network security that public key cryptography should be used to secure communications. A certificate revocation list (CRL) should be distributed quickly to all the vehicles in the network to protect them from malicious users and malfunctioning equipment as well as to increase the overall security and safety of vehicular networks. Thus, a major challenge in vehicular networks is how to efficiently distribute CRLs. This paper proposes a CRL distribution method aided by terrestrial digital multimedia broadcasting (T-DMB). By using T-DMB data broadcasting channels as alternative communication channels, the proposed method can broaden the network coverage, achieve real-time delivery, and enhance transmission reliability. Even if roadside units are not deployed or only sparsely deployed, vehicles can obtain recent CRLs from the T-DMB infrastructure. A new transport protocol expert group (TPEG) CRL application was also designed for the purpose of broadcasting CRLs over the T-DMB infrastructure.

An efficient privacy-preserving data sharing scheme in social network (소셜 네트워크에 적합한 효율적인 프라이버시 보호 데이터 공유 기법)

  • Jeon, Doo-Hyun;Chun, Ji-Young;Jeong, Ik-Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.447-461
    • /
    • 2012
  • A social network service(SNS) is gaining popularity as a new real-time information sharing mechanism. However, the user's privacy infringement is occurred frequently because the information that is shared through a social network include the private information such as user's identity or lifestyle patterns. To resolve this problem, the research about privacy preserving data sharing in social network are being proceed actively. In this paper, we proposed the efficient scheme for privacy preserving data sharing in social network. The proposed scheme provides an efficient conjunctive keyword search functionality. And, users who granted access right to storage server can store and search data in storage server. Also,, our scheme provide join/revocation functionality suited to the characteristics of a dynamic social network.

Current status and tasks of the transmission of Gyeonggi Province intangible cultural assets (folk songs) (경기도 향토민요 관련 무형문화재의 전승현황과 과제)

  • Jang, hee-sun
    • (The) Research of the performance art and culture
    • /
    • no.35
    • /
    • pp.405-439
    • /
    • 2017
  • In this article, I suggest issues and tasks in transmission of Gyeonggi Province folk songs after thorough study of designation of Gyeonggi Province folk songs as intangible cultural asset, reproduction and transmission. Intangible cultural assets are classified into seasonal playing and songs. Originally, category or extension of folk songs is above mere songs and it also embraces personal lives as well as village communities. Intangible assets of folk songs are folk art, group events and non-stage events at the same time based on tradition, history, uniqueness, characters of field value. Gyeonggi Province has 9 intangible assets now because of the revocation of several assets (All Gyeonggi Province, Hwasung, Gwacheon) within five years after initial designation of 13 assets in 1998. They are mostly distributed in the north Gyeonggi region where is close to the DMZ and delay in development seems to have enabled the preservation. Most of the intangible cultural assets are farming songs and weeding which show characteristics of Gyeonggi Province. Most of the designees are who performed excavation, recovery, excluding a few cases without designees on designation, and almost all the designee passed away. Number of cases have been revoked because transmission was not completed or some cases were transmitted to groups rather than specific designees. Subscription concert, the biggest and most representative event, is performed once a year with all of the 9 intangible cultural assets in the original complete forms of the designation. Intangible cultural assets are classified into seasonal playing and songs. In general, current performance of the intangible cultural assets and folk songs are same as the originally designated forms and are not in varied forms other than folk songs like songs for rice-planting and weeding. Funeral songs are transmitted in Yangju and Yangpyeong. In terms of the operation, preservation societies having training centers have been performing more constant activities for preservation including lecture, performance and transmission. Members are quite aged and the societies are suffering from lack of support fund for reproduction and transmission. Problems in reproduction and tasks for the transmission I would like to suggest are like followings. First, preservation and value of the cultural assets. Second, new understanding of designation and revocation of the intangible cultural assets. Third, record of performance and sound source. Fourth, liaison with local communities. Fifth, organization of professional resources and establishment of systematic support and management.

A Study of Category Standardization according to Non-benefit Medical Expense in Tertiary Hospitals (상급종합병원 비급여 진료비 변이에 따른 항목 표준화에 관한 연구)

  • Roh, Ock-Hee;Ahn, Sang-Yoon;Kim, Yong-Ha;Lee, Chong Hyung;Park, Arma;Kim, Kwang-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.5
    • /
    • pp.274-280
    • /
    • 2020
  • The purpose of this study was to identify the average cost and present status of non-benefit medical expenses by using the data of tertiary hospitals released by the Health Insurance Review and Assessment Service(HIRA), and to compare the data to find cost variations. The target of analysis was the present status of the non-benefit medical expenses reported by 41 tertiary hospitals among the 44 previously designated hospitals (three were excluded due to revocation or new designation) for 2015, 2016, 2017, and 2018 (until April). This study was conducted after approval of using the released data of the HIRA's data opening system. This study was analyzed by its general characteristics, annual non-benefit medical expenses by frequency analysis, and annual understanding of variation by designating Coefficient of Variation (C.V.). The research found out that the number of details of non-benefit medical expense was gradually increased: the numbers of categories were 51 in 2015, 53 in 2016, and 98 in 2017, but there was a rapid increase in 2018 by 193. As a result, to standardize non-benefit medical expense items across tertiary hospitals due to their variations in the expenses, the government should expand standardized non-benefit medical expenses and make it mandatory for medical institutions to use the standardized items or names of such expenses.

Review of Allowable Condition of the Discretionary not Covered Service (임의비급여 허용요건에 관한 검토)

  • Park, Tae-Shin
    • The Korean Society of Law and Medicine
    • /
    • v.13 no.2
    • /
    • pp.11-38
    • /
    • 2012
  • The Supreme Court stand in the position in specific lawsuit that it doesn't allow the discretionary not covered service, but recently in revocation suit of fine disposal that is imposed on medical fee of leukemia patient, it altered the existing adjudgement and admitted the discretionary not covered service exceptionally. It put forward the allowable condition roughly in that case. According as this alteration, it has become more important to embody the allowance conditions of exceptions. The Supreme Court presented three things, which are procedural condition, medical condition and subscriber's agreement. Concerning procedural condition, several present conciliation procedures are as follows: medical care benefit arret request, relative value conciliation etc, prior request on anti-cancer drug among chemicals which exceed acceptance criteria, request of non benefit object on common drugs. To be granted the existence of those system, there should be no obstacle to use that. Even if it were so, we should take circumstances into consideration; individual situation is unescapable concerning substance and urgency of the discretionary not covered service, process of the procedure, time required etc. Regarding medical condition, safety and effectiveness will be verified through evaluation procedures of new medical skill. About the necessity, the Supreme Court made clear through a sentence that it allow the discretionary not covered service, in case that needs to treat a patient out of the standard of medical benefit. Strict interpretation is right and it answer the purpose of the sentence that the supreme court permit the discretionary not covered service, exceptionally. We need to differentiate medical necessity and medical validity. Subscriber's agreement should holds true if it entails full explanation, and if it is preliminary, explicit and individual. On this account, it should be difficult to admit that someone agree effectively when he call for the affirmation that he is recipient of medical care. Reasonable expense needs to be a part of review whether the agreement is valid. Meanwhile If we adjust system of medical expense and eventually reorganize a fee for consultation payment system (Fee-for-service controlled by item to DRG (Diagnosis Related Groups)), controversial area of the discretionary not covered service will be decreased and that will guarantee the discretion of the doctor.

  • PDF

A Study on A Biometric Bits Extraction Method of A Cancelable face Template based on A Helper Data (보조정보에 기반한 가변 얼굴템플릿의 이진화 방법의 연구)

  • Lee, Hyung-Gu;Kim, Jai-Hie
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.47 no.1
    • /
    • pp.83-90
    • /
    • 2010
  • Cancelable biometrics is a robust and secure biometric recognition method using revocable biometric template in order to prevent possible compromisation of the original biometric data. In this paper, we present a new cancelable bits extraction method for the facial data. We use our previous cancelable feature template for the bits extraction. The adopted cancelable template is generated from two different original face feature vectors extracted from two different appearance-based approaches. Each element of feature vectors is re-ordered, and the scrambled features are added. With the added feature, biometric bits string is extracted using helper data based method. In this technique, helper data is generated using statistical property of the added feature vector, which can be easily replaced with straightforward revocation. Because, the helper data only utilizes partial information of the added feature, our proposed method is a more secure method than our previous one. The proposed method utilizes the helper data to reduce feature variance within the same individual and increase the distinctiveness of bit strings of different individuals for good recognition performance. For a security evaluation of our proposed method, a scenario in which the system is compromised by an adversary is also considered. In our experiments, we analyze the proposed method with respect to performance and security using the extended YALEB face database

A Study about the efficient Control against the sexual violence in medical area (의사의 성범죄에 대한 최근 의료법 개정법률안 검토)

  • Jeong, Baekeun
    • The Korean Society of Law and Medicine
    • /
    • v.20 no.2
    • /
    • pp.207-229
    • /
    • 2019
  • It is a general recognition that more serious criminal acts in a certain area of society should be given more serious condemation than the same general crimnal act. In particular, considering the purpose of the medical treatment and the trust relationship between the doctor and the patient, the sexual violence by doctor in medical field can not be placed on the same line as that of the general public. But the special legislation to solve this through criminal legal sanctions is not desirable. The basic principle of criminal law ist ultima ratio, so the principle of supplementality. It means to try to solve by all possible means and finally to enter with punishment. A flat and hasty Reaction without the considering of the speciality of medical treatment will cause serious cracking in that area. In addition, it will not be able to expect desirable results in legal practice by breaking down the legal system. Rather, administrative regulation is more efficient than punishment sanctions. But the best way is autonomous control by members of the medical area. Penalties in criminal law must make an enterance at the last, and administrative regulation should be timely intervene in specific situations through diversification. In conclusion, state interventions should be farthest in order to proceed to autonomous control of medical area.

Identity-Exchange based Privacy Preserving Mechanism in Vehicular Networks (차량 네트워크에서 신원교환을 통해 프라이버시를 보호하는 방법)

  • Hussain, Rasheed;Oh, Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1147-1157
    • /
    • 2014
  • Intelligent transportation system (ITS) is realized through a highly ephemeral network, i.e. vehicular ad hoc network (VANET) which is on its way towards the deployment stage, thanks to the advancements in the automobile and communication technologies. However, it has not been successful, at least to date, to install the technology in the mass of vehicles due to security and privacy challenges. Besides, the users of such technology do not want to put their privacy at stake as a result of communication with peer vehicles or with the infrastructure. Therefore serious privacy measures should be taken before bringing this technology to the roads. To date, privacy issues in ephemeral networks in general and in VANET in particular, have been dealt with through various approaches. So far, multiple pseudonymous approach is the most prominent approach. However, recently it has been found out that even multiple pseudonyms cannot protect the privacy of the user and profilation is still possible even if different pseudonym is used with every message. Therefore, another privacy-aware mechanism is essential in vehicular networks. In this paper, we propose a novel identity exchange mechanism to preserve conditional privacy of the users in VANET. Users exchange their pseudonyms with neighbors and then use neighbors' pseudonyms in their own messages. To this end, our proposed scheme conditionally preserves the privacy where the senders of the message can be revoked by the authorities in case of any dispute.