• Title/Summary/Keyword: security requirement

Search Result 393, Processing Time 0.025 seconds

Consolidation of Protection for Lessees by Improvement of Opposing Power System of the Unregistered Housing Leases (미등기 주택임대차의 대항력 관련 제도개선을 통한 임차인보호 강화)

  • No, Hann-Jang
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.8
    • /
    • pp.466-475
    • /
    • 2014
  • According to the Housing Lease Protection Act, even though it is not registered, if the lessee has completed delivery of a house and the resident registration, the lease shall take effect against the third person from the following day thereof. Any lessee who has met the requirements for opposing power and obtained the fixed date on the lease contract document, shall be entitled to receive the repayment of the deposit from the converted price of the leased house, in preference to any junior obligors and other creditors, at the time of an auction as provided by the Civil Execution Act and a public sale as prescribed by the National Tax Collection Act. The lessee shall be entitled to receive a repayment of a specified amount of the deposit in preference to other persons having the security rights in the leased house. However those provisions give rise to many problems because the Housing Lease Protection Act allows the opposing power and the right of preferential payment from the following date of fulfillment of the requirement. For the purpose of solving the problems, this study suggests that the Housing Lease Protection Act need to be amended as follows. The fixed date should be added to the requirement of opposing power and the preferential right of specified deposit repayment. In addition, the commencement of opposing power and preferential right of deposit repayment need to be taken effect from the day that the requirement is fulfilled.

The Effects of the National Basic Livelihood Security System on labor supply (국민기초생활보장제도의 노동공급 효과)

  • Lee, Sang-Eun
    • Korean Journal of Social Welfare
    • /
    • v.56 no.2
    • /
    • pp.71-91
    • /
    • 2004
  • The National Basic Livelihood Security System implemented from October 2000 has expanded cash assistance to cover the poor households that have work ability. The cash assistance for the households with work ability has positive aspects of providing basic livelihood security for all people, but many people have worried about its negative aspects such as the decrease of labor supply among the low-income people with work ability. However, there has been few study that evaluated the effects of the NBLS implementation on labor supply. One of the reason for this may be related with the difficulty of research methodology that there were neither program group nor control group, because NBLS was implemented for all the people at the same time. This study suggests alternative program groups and control groups based on work ability and education. Using wave1 to wave5 data of the Korean Labor and Income Survey, this study estimated the effects of the NBLS implementation on employment and work hours. A difference-in-difference approach was applied to these alternative program and control groups. I found that the implementation of NBLS did not have any statistically significant effects on employment an work hours. It is too early to conclude from this result that cash assistance for the poor households with work ability does not induce any labor supply decrease in Korea. Rather, I interpret this result as reflecting that the NBLS system was too limited to induce any sizable decrease of labor supply or that the work requirement imposed on the recipients with work ability was effective in deterring work disincentive among the low-income population. Future research need to explore better program and control groups and investigate long-term effects.

  • PDF

A Study on Cryptography Scheme and Secure Protocol for Safety Secure Scheme Construction in 13.56Mhz RFID (13.56Mhz RFID 환경에서 안전한 보안 스킴 구축을 위한 암호 스킴 및 보안 프로토콜 연구)

  • Kang, Jung-Ho;Kim, Hyung-Joo;Lee, Jae-Sik;Park, Jae-Pyo;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.3
    • /
    • pp.1393-1401
    • /
    • 2013
  • What is RFID Microchip tag attached to an object, the reader recognizes technology collectively, through communication with the server to authenticate the object. A variety of RFID tags, 13.56Mhz bandwidth RFID card, ISO/IEC 14443 standards based on NXP's Mifare tag occupies 72.5% of the world market. Of the Mifare tags, low cost tag Mifare Classic tag provided in accordance with the limited hardware-based security operations, protocol leaked by a variety of attacks and key recovery vulnerability exists. Therefore, in this paper, Cryptography Scheme and Secure Protocol for Safety Secure Scheme Construction in 13.56Mhz RFID have been designed. The proposed security scheme that KS generated by various fixed values and non-fixed value, S-Box operated, values crossed between LFSR and S-Box is fully satisfied spoofing, replay attacks, such as vulnerability of existing security and general RFID secure requirement. Also, It is designed by considering the limited hardware computational capabilities and existing security schemes, so it could be suit to Mifare Classic now.

Distributed Trust Management for Fog Based IoT Environment (포그 기반 IoT 환경의 분산 신뢰 관리 시스템)

  • Oh, Jungmin;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.731-751
    • /
    • 2021
  • The Internet of Things is a huge group of devices communicating each other and the interconnection of objects in the network is a basic requirement. Choosing a reliable device is critical because malicious devices can compromise networks and services. However, it is difficult to create a trust management model due to the mobility and resource constraints of IoT devices. For the centralized approach, there are issues of single point of failure and resource expansion and for the distributed approach, it allows to expand network without additional equipment by interconnecting each other, but it has limitations in data exchange and storage with limited resources and is difficult to ensure consistency. Recently, trust management models using fog nodes and blockchain have been proposed. However, blockchain has problems of low throughput and delay. Therefore, in this paper, a trust management model for selecting reliable devices in a fog-based IoT environment is proposed by applying IOTA, a blockchain technology for the Internet of Things. In this model, Directed Acyclic Graph-based ledger structure manages trust data without falsification and improves the low throughput and scalability problems of blockchain.

A Study on the Lightweight Cryptographic Algorithms for Remote Control and Monitoring Service based on Internet of Things (사물인터넷 기반 원격 제어 및 모니터링 서비스를 위한 경량 암호화 알고리즘 연구)

  • Jeong, Jongmun;Bajracharya, Larsson;Hwang, Mintae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.5
    • /
    • pp.437-445
    • /
    • 2018
  • Devices have a lot of small breakdowns rather than big breakdowns. But it often wastes time and increases cost of maintenance, such as calling a service technician for small breakdowns. So, if we use remote control and monitoring service using Internet of Things, we can minimize the time period and cost for the maintenance. However, security is important because remote control and monitoring services contain personal information which when leaked, may be dangerous. There are many types of Internet based monitoring devices that are in use, but it is difficult to expect a high level of security because there are many cases in which the performance is minimal. Therefore, in this paper, we classify remote control and monitoring services based on Internet of Things type and derive encryption requirement for four types. We also compared and analyzed the lightweight cryptographic algorithms that can be expected to use high performance even on the Internet of Things. And it is derived that LED is used as a equipment management type, DESLX as a environment management type, CLEFIA as a healthcare management type and LEA as a security management type are the optimal lightweight cryptographic algorithms for each type.

The Japanese Wagyu beef industry: current situation and future prospects - A review

  • Gotoh, Takafumi;Nishimura, Takanori;Kuchida, Keigo;Mannen, Hideyuki
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.31 no.7
    • /
    • pp.933-950
    • /
    • 2018
  • In Japan, Wagyu cattle include four Japanese breeds; Black, Brown, Shorthorn, and Polled. Today, the renowned brand name Wagyu includes not only cattle produced in Japan, but also cattle produced in countries such as Australia and the United States. In recent years, the intramuscular fat percentage in beef (longissimus muscle) from Japanese Black cattle has increased to be greater than 30%. The Japanese Black breed is genetically predisposed to producing carcass lipids containing higher concentrations of monounsaturated fatty acids than other breeds. However, there are numerous problems with the management of this breed including high production costs, disposal of untreated excrement, the requirement for imported feed, and food security risks resulting from various viral diseases introduced by imported feed. The feeding system needs to shift to one that is more efficient, and improves management for farmers, food security for consumers, and the health environment for residents of Japan. Currently, we are developing a metabolic programming and an information and communications technology (ICT, or Interne of Things) management system for Wagyu beef production as future systems. If successful, we will produce safe, high-quality Wagyu beef using domestic pasture resources while solving the problems of how to utilize increasing areas of abandoned agricultural land and to make use of the plant-based feed resources in Japan's mountainous areas.

Monitoring of Landslide in Kangwondo Area using 2-Pass DInSAR Technique (2-Pass DInSAR 기술을 활용한 강원도 지역 산사태 탐측)

  • Yoo, Su Hong;Sohn, Hong Gyoo;Jung, Jae Hoon;Choi, Si Kyong
    • Journal of Korean Society of societal Security
    • /
    • v.2 no.2
    • /
    • pp.85-90
    • /
    • 2009
  • In recent days, climatic change cause abnormal weather all over the world and we have a great loss of life and property every year. In Korea, we suffer from landslide problem because large regions of Korea Peninsula are composed of mountain. In order to detect rapidly and to take follow-up measures of disaster, the remote sensing is being used actively as conventional field survey has many restrictions in accessibility because of more time and man power requirement. In additions interferometric SAR is one of the techniques that have our attention because it can provide many kinds of accurate surface information without restriction of atmospheric and ground conditions by using L-band. In this study, we aimed to monitor the displacement of mountain area in Kangwondo and this results will be used for detecting landslide. Also we build the web system for detecting and analyzing the landslide.

  • PDF

Security Analysis of Broadcast Encryption System Based on 2-Subset Difference Method (2-SD 방식에 기반한 브로드캐스트 암호시스템의 안전성 분석)

  • Lee, Jae Hwan;Park, Jong Hwan
    • Journal of Broadcast Engineering
    • /
    • v.19 no.4
    • /
    • pp.502-509
    • /
    • 2014
  • Broadcast encryption is a cryptographic primitive that allows a sender to securely transmit a message to a set of receivers. The most influential broadcast encryption system was proposed in 2001 by Naor, Naor, Lotspiech, based on binary trees and the Subset Difference (SD) method. In 2006, Jang, Nyang, and Song suggested a new broadcast encryption system that can reduce transmission rate by 50% compared to the SD method, by introducing the so-called '2-SD' method. Their result was later given the registration of a patent in Korea (registration number: 100879083). Unfortunately, however, this paper shows that Jang et. al.'s broadcast encryption system is not secure against collusion attacks that are considered as being the basic security requirement in designing broadcast encryption.

A Study on Residents' Satisfaction Degree of Differentiated Elements in Outdoor Space of Apartment Housing (아파트 옥외공간 차별화 요소에 대한 주민 만족도 분석에 관한 연구)

  • 서주환;김도경;최성숙;김대환
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.27 no.3
    • /
    • pp.98-108
    • /
    • 1999
  • The purpose of this research is to help outdoor space planning reflected real needs of apartment residents in the differentiation elements of outdoor space, by using USC trade-off game in three apartment complexes in Seoul. This game method was used to evaluate their preference, reliability of preference degree, satisfaction degree, requirement elements such as improvement, sacrifice, maintenance of present condition, and payment possibility for improving and maintaining present condition, in addition to their preference and payment possibility of differentiation of outdoor space in the apartment complex in the future. From the statical analysis, we found the following results: 1. Reliability of preference degree was valid, inasmuch as the first elements they preferred were the almost same as the last things. 2. Elements of preference were pedestrian ways, pedestrian security facilities, various athletic facilities, and variety and high-class facilities in a play ground. 3. Satisfaction degree of differentiation elements of outdoor space was low not only in total complexes but also in each complex. As a result of analysis, these elements were not satisfied with residents. 4. Most of the differentiation elements of outdoor space in three apartment complexes, except planting traditional trees, were required to improve and maintain present condition. The cost to improve and maintain these elements able to pay by them was about 2.18 million won. Through this result, these elements were not options but prerequisites for planning outdoor space in apartment complexes. 5. In the future preference elements of differentiation of outdoor space in apartment complexes were pedestrian and jogging ways, places with water, various athletic places and facilities, multi-function resting places, green spaces in experiences, pedestrian security facilities, various athletic facilities, variety and high-class facilities in a play ground, and payment possibility for these elements was about 3.20 million won.

  • PDF

A Study on the Distribute Authentication Method Scheme through Authentication and Right Mechanism Trend of the Ubiquitous Environment (유비쿼터스 환경의 인증 및 권한 메커니즘 동향을 통한 분산 인증기법 방안 연구)

  • Oh, Dong-Yeol;Sung, Kyung-Sang;Kim, Bae-Hyun;Oh, Hae-Seok
    • Convergence Security Journal
    • /
    • v.8 no.1
    • /
    • pp.35-42
    • /
    • 2008
  • While an information system and administration for an application that a user contacts with raise a head by an important problem, a system approach and methodology for administration are mentioned. Authentication technology of various configuration is used, but non-efficiency by complicated authentication administration and operation inappropriate use are for a successful expansion of various and new business of wire/wireless environment. In addition, under the mobile computer environment with different authentic method each other, it is difficult at all to expect flexible and continuous service. Under the ubiquitous computing environment, It is very important thing plan to research and develop compatibility and the side of variance authentication plan that preservation characteristics are helped. Hereby, This paper look around an requirement items and authority mechanism for the administration and the operation mechanism of the distributed authentication considering expansion possibility of the ubiquitous computing environment not only fixed computing environment but also mobile computing. In future, we expect it by can guide positive participation about distributed authentication technique of the genuine ubiquitous environment.

  • PDF