• 제목/요약/키워드: security for costs

검색결과 379건 처리시간 0.026초

Third Party Funding in International Arbitration and its most current Development in Asia -Issue of Security for Costs and its main Cases

  • 김세진;김대중
    • 한국중재학회지:중재연구
    • /
    • 제29권4호
    • /
    • pp.77-100
    • /
    • 2019
  • Third-party funding in international and domestic disputes is a fast-growing trend and it is increasingly used by large, solvent companies that simply wish to share risk in their finance. On January 10, 2017, the Civil Law Amendment Bill was passed in Singapore and on June 2017 an "Arbitration and Mediation Legislation (Third Party Funding) Bill" in Hong-Kong had a third-party funding to finance the international arbitration and other dispute resolutions expressly approved. This arbitral tribunal's expanding discretion over critical interim measure of security cost was in issue. In Essar v. Norscot (2016), the arbitrator found that the additional third-party funding costs were recoverable as "other costs of the parties." In here, the decision showed the issue of a tribunal's power over cost measures could spread out to be reviewed and broadened through the legislative process. A recent investor-state arbitration case of ICSID, RSM Production Corporation v. Saint Lucia, covered the express awarding of security for costs where a claimant was funded by a third-party funder. It seems inevitable that the volume of third-party funding industry will grow more as time goes on. The next step would be to formulate guidelines on how to determine criteria against which an application for security for costs is measured.

보안시스템으로 인해 추가되는 예산 외 비용의 요인에 관한 연구 (A Study on the Costs Factors of an being additional Budget by the Security System)

  • 전정훈
    • 한국통신학회논문지
    • /
    • 제36권12B호
    • /
    • pp.1481-1488
    • /
    • 2011
  • 최근 공격기술은 네트워크의 진화와 함께 다양한 형태로 나타나고 있으며, 대부분의 네트워크에서는 다양한 보안장치들을 통해 대응하고 있다. 또한 외부 공격으로부터 내부 네트워크의 정보자산을 보호하기 위해 기존 네트워크에 필요한 보안시스템들을 추가 배치하고 있다. 그러나 이와 같은 보안시스템의 사용은 내부 네트워크의 성능과 보안에 큰 영향을 미칠 뿐만 아니라 이로 인해 경제적인 추가비용을 발생시킨다. 따라서 본 논문은 내부 네트워크의 보안으로 인한 추가 비용의 요인들에 대해 예상하기 어려운 가변적 상황과 정보보호 인식수준, 보안시스템, 정보자산 평가유무 등을 관련 연구자료 및 실험결과를 분석함으로써, 향후 관련 정책수렵과 내부 네트워크의 구축 및 설계에 따른 비용절감의 기초자료로 활용될 것으로 기대한다.

Cost Management for Security Applications

  • Arshi Naim;Zubairul Hasan
    • International Journal of Computer Science & Network Security
    • /
    • 제24권7호
    • /
    • pp.63-72
    • /
    • 2024
  • This is an extended paper, focusing on the cost management for the organizations dealing with the crucial issues of security systems. Information Technology (IT) is an important and irreplaceable need of society and all working sector's success depends on IT to a greater extent; therefore maintaining security features is one of the most important aspects of IT. When security in the IT sector is discussed, Patch Management (P.Mgnt) has to be taken under account. P. Mgnt includes many concerns and areas to be described for IT security such as methods and problems in updating patch, methods of reducing security risks with P.Mgnt, methods of achieving economies of scale by controlling the operational costs and taking decisions in investing as and when necessary. This paper presents a general definition of Patch management, its benefits and management of working cost through theoretical models, also the paper gives methods of feeding techniques for microstrip patch antenna MPA, showing the contracting and non contracting methods.

A Device Authentication Mechanism Reducing Performance Cost in Mobile P2P Networks

  • Jeong, Yoon-Su;Kim, Yong-Tae;Shin, Seung-Soo;Lee, Sang-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권4호
    • /
    • pp.923-948
    • /
    • 2013
  • The main concern in mobile peer-to-peer (P2P) networks is security because jamming or eavesdropping on a wireless link is much easier than on a wired one and such damage can be incurred without physical access or contact. In particular, authentication has increasingly become a requirement in mobile P2P environments. This paper presents a new mutual authentication mechanism which requires less storage space and maintains a high level of security in mobile P2P networks. The proposed mechanism improves efficiency by avoiding the use of centralized entities and is designed to be agile in terms of both reliability and low-cost implementation. The mechanism suggested in the simulation evaluates the function costs occurring in authentication between the devices under mobile P2P network environment comparing to existing method in terms of basic operation costs, traffic costs, communications costs, storage costs and scalability. The simulation results show that the proposed mechanism provides high authentication with low cryptography processing overhead.

An Adaptive JPEG Steganographic Method Based on Weight Distribution for Embedding Costs

  • Sun, Yi;Tang, Guangming;Bian, Yuan;Xu, Xiaoyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권5호
    • /
    • pp.2723-2740
    • /
    • 2017
  • Steganographic schemes which are based on minimizing an additive distortion function defined the overall impacts after embedding as the sum of embedding costs for individual image element. However, mutual impacts during embedding are often ignored. In this paper, an adaptive JPEG steganographic method based on weight distribution for embedding costs is proposed. The method takes mutual impacts during embedding in consideration. Firstly, an analysis is made about the factors that affect embedding fluctuations among JPEG coefficients. Then the Distortion Update Strategy (DUS) of updating the distortion costs is proposed, enabling to dynamically update the embedding costs group by group. At last, a kind of adaptive JPEG steganographic algorithm is designed combining with the update strategy and well-known additive distortion function. The experimental result illustrates that the proposed algorithm gains a superior performance in the fight against the current state-of-the-art steganalyzers with high-dimensional features.

미국 관세청의 선적전 추가 보안관련 정보 제출법안(10+2 Rule)에 관한 연구 (A Study on the Importer Security Filing and Additional Carrier Requirements(10+2 rule) in U.S.)

  • 송선욱
    • 통상정보연구
    • /
    • 제10권4호
    • /
    • pp.395-416
    • /
    • 2008
  • The advance information for oceangoing cargoes destined to th United States enable CBP to evaluate the potential risk of smuggling WMD and to facilitate the prompt release of legitimate cargo following its arrival in the Unites States. On January 1, 2008, CBP promulgate regulations, also known as 10+2 rule, to require the electronic transmission of additional data elements for improved high-risk targeting, including appropriate security elements of entry data for cargo destined to the United States by vessel prior to loading of such cargo on vessels at foreign seaports. The potential impact to an importer's international supply chain will be as follows ; Firstly, importers will take incremental supply chain costs and filing costs. Secondly, anticipate delay in shipment of containerized cargo. Thirdly, importers could be charged fines if they fail to file and file inaccurate or missing data. Companies exporting to the United States should be interested in 10+2 rule, analyze their current processes and procedures to ensure that they are prepared to handle the additional filing requirements of 10+2 rule. And they should focus on how 10+2 impacts their supply chain in terms of costs and sourcing. They will be necessary to revise service legal agreements with their forwarders, customs brokers or carriers in order to meet filing requirements of 10+2 rule.

  • PDF

품질과 비용을 고려한 프로세스 기반의 보안공학방법론에 관한 연구 (A Study on a Security Engineering Methodology for Information Security Systems Considering Quality and Cost)

  • 최명길
    • Journal of Information Technology Applications and Management
    • /
    • 제16권2호
    • /
    • pp.23-43
    • /
    • 2009
  • For reliability and confidentiality of information security systems, the security engineering methodologies are accepted in many organizations. To improve the effectiveness of security engineering, this paper suggests a security methodology ISEM, which considers both product assurance and production processes, takes advantages in terms of quality and cost. To verify the effectiveness of ISEM, this paper introduces the concepts of quality loss, and compares the development costs and quality losses between ISEM and CC through the development of VPN system.

  • PDF

국제투자중재와 제3자 자금제공: 국제적 논의와 중재판정례에서의 쟁점 (Third-Party Funding in International Discussions and Treaty Arbitration)

  • 엄준현
    • 한국중재학회지:중재연구
    • /
    • 제31권4호
    • /
    • pp.3-27
    • /
    • 2021
  • Recent Discussions on Third-Party Funding (TPF) in the forums of UNCITRAL, ICSID, and ICC are making different levels of progress towards finalizing the rules. However, they also have similarities in dealing with legal issues related to TPF, such as definitions, disclosure, allocation of costs, and security for costs. International treaty tribunals have dealt with TPF issues, too. When it comes to the standing of funded claimants, the tribunal in Ambiente v. Argentina did not accept the argument that claimants were controlled by the TPF provider. Concerning the scope of the disclosure, the tribunal in Tennant v. Canada ordered the disclosure of the TPF arrangement. As for the allocation of costs, the tribunal in Kardassopoulos v. Georgia noted that there is no reason why a TPF agreement should be treated differently than an insurance contract. Regarding the security for costs, the tribunal in South American Silver v. Bolivia considered the mere existence of a third-party funder as not an exclusive factor to determine costs in the earlier stage of the proceedings. Lastly, relating to TPF as a ground for annulment, the tribunal in Teinver v. Argentina declined the respondent's argument that the TPF agreement was the vehicle of fraud.

환경친화적 식량생산을 위한 꿀벌의 다원적 가치 (Multi-functionality of honey bees for eco-friendly food production)

  • 정철의
    • 식품과학과 산업
    • /
    • 제55권2호
    • /
    • pp.166-175
    • /
    • 2022
  • Current food system has developed with the agricultural innovation to feed the increasing population of the world, but with high costs such as environmental contamination and inequality with low sustainability. Human has developed long history of mutualistic interaction with honey bee. This manuscript describes the multi-functionality of honey bee for food production. Firstly honey bee produces honey, bee pollen, royal jelly and propolis which are rich in functionality. Second honey bee serves as the main pollinator for crop production which is worth for 28% of total crop production values in Korea. Lastly honey bee can be an alternative meat produciton system with lower energy, carbon costs but higher nutritional security. This manuscript described those parts and discussed the multi-functionality of honey bees for eco-friendly food security pursuing lowered environmental cost and carbon-zero strategies in the climate change era.

LCC 분석을 이용한 효과적인 신호 설비 분류에 관한 연구 (A Study on The Effective Classification of Signal Facilities using LCC Analysis)

  • 김두석;김영훈;안찬기;장성용
    • 한국철도학회:학술대회논문집
    • /
    • 한국철도학회 2011년도 정기총회 및 추계학술대회 논문집
    • /
    • pp.2711-2717
    • /
    • 2011
  • This paper presents the classification scheme of the signal facilities on the railroad considering the construction costs and maintenance costs in a low population area. The construction costs of the new signal facility system can be compare with the costs of the present signal facilities as the classification scheme. The signal facilities on the railroad were classified as the railroad security regulations and then the scheme is considered through the LCC analysis. In order to test this research, the costs of signal facilities obtained from ones on TAEBACK railroad line. The costs categorized the construction costs, the labor cost and the maintenance costs can be effectively applied to the LCC analysis. The scheme is very useful to make a decision whether the new signal facilities on railroad in low population area is build or not in terms of the costs.

  • PDF