• Title/Summary/Keyword: Delegation of Rights

Search Result 15, Processing Time 0.021 seconds

The Performance of Franchisees from the Franchisor's and Franchisee's Intangible Assets

  • Kim, Young-Ho;Bae, Il-Hyun;Kim, Janghyun
    • Journal of Distribution Science
    • /
    • v.16 no.4
    • /
    • pp.35-47
    • /
    • 2018
  • Purpose - This study seeks to find out the factors affecting the performance of franchisees from the franchisor's and franchise's intangible assets. In order to explain the process, this study explores the concept of LMX, Relational Capital, and Decision Rights Delegation. Research design, data, and methodology - To verify the proposed hypotheses, a questionnaire survey was conducted for franchise store owners, and to test the hypotheses, structural equation modeling was established. Results - First, franchisor's intangible assets affect the quality of LMX, but don't affect the relational capital. And the quality of LMX affects the relational capital. In addition, "the effect of delegation of decision rights on relational capital" and "the effect of relational capital on franchisee's performance" were significant. However, the effect of delegation of decision rights on franchisee's performance wasn't significant. Second, the intangible assets of the franchise have a positive effect on the quality of the LMX and the degree of delegation of decision rights, and the quality of the LMX has a positive effect on the delegation of decision rights. Conclusions - This study would suggest operational implications for the formation of vertical and horizontal relationships and the cooperation between the main members of the franchise business.

A Nested Token-Based Delegation Scheme for Cascaded Delegation in Mobile Agent Environments (이동 에이전트 환겨에서의 연속된 위임을 위한 내포된 토큰 기반 위임 기법)

  • Kwon, Hyeog-Man;Kim, Moon-Jeong;Eom, Young-Ik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.1C
    • /
    • pp.25-34
    • /
    • 2004
  • In mobile agent environments, cascaded delegations among places occur frequently due to the mobility of agents. Cascaded delegation in mobile agent environments can be defined as the process whereby the delegated place delegates the rights of the delegating place further. The representative study for delegation in mobile agent environments is Berkovits et al.'s study. Their study only defines the messages that is sent between the place executing the agent and the place where the agent migrates. Because their study considers only the delegation between two places which participate in migration of an agent, it is inadequate in the situation that the cascaded delegation is necessary. In other words, the relationships among the messages sent from and to places is necessary. However, their study does not exist the relationships. In this paper, we propose a delegation scheme that provides agents with secure cascaded delegation. The proposed scheme achieves the goal by nesting each delegation token within the signed part of the next immediate delegation token. We prove that the proposed scheme is secure against the attack of replaying a message and of substituting a delegation token.

Delegation using D-RBAC in Distributed Environments (분산환경에서 도메인-RBAC을 이용한 권한위임)

  • 이상하;채송화;조인준;김동규
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.6
    • /
    • pp.115-125
    • /
    • 2001
  • Authentication and access control are essential requirements for the information security of distributed environment. Delegation is process whereby an initiator principal in a distributed environment authorizes another principal to carry out some functions on behalf of the former. Delegation of access rights also increases the availability of services offer safety in distributed environments. A delegation easily provides principal to grant privileges in the single domain with Role-Based Access Control(RBAC). But in the multi-domain, initiators who request delegation may require to limit the access right of their delegates with restrictions that are called delegate restriction to protect the abuse of privilege. In this paper, we propose the delegation view as function of delegation restrictions. Proposed delegation view model not only prevent over-exposure of documents from granting multiple step delegation to document sharing in multi-domain with RBAC infrastructure but also reduce overload of security administrator and communication.

APDM : Adding Attributes to Permission-Based Delegation Model

  • Kim, Si-Myeong;Han, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.2
    • /
    • pp.107-114
    • /
    • 2022
  • Delegation is a powerful mechanism that allocates access rights to users to provide flexible and dynamic access control decisions. It is also particularly useful in a distributed environment. Among the representative delegation models, the RBDM0 and RDM2000 models are role delegation as the user to user delegation. However, In RBAC, the concept of inheritance of the role class is not well harmonized with the management rules of the actual corporate organization. In this paper, we propose an Adding Attributes on Permission-Based Delegation Model (ABDM) that guarantees the permanence of delegated permissions. It does not violate the separation of duty and security principle of least privilege. ABDM based on RBAC model, supports both the role to role and user to user delegation with an attribute. whenever the delegator wants the permission can be withdrawn, and A delegator can give permission to a delegatee.

A Time Constraints Permission Based Delegation Model in RBAC (RBAC을 기반으로 하는 시간제한 권한 위임 모델)

  • Kim, Tae-Shik;Chang, Tae-Mu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.11
    • /
    • pp.163-171
    • /
    • 2010
  • RBAC(Role-Based Access Control) has advantages in managing access controls, because it offers the role inheritance and separation of duty in role hierarchy structures. Delegation is a mechanism of assigning access rights to a user. RBDM0 and RDM2000 models deal with user-to-user delegation. The unit of delegation in them is a role. However, RBAC does not process delegation of Role or Permission effectively that occurs frequently in the real world. This paper proposes a Time Constraints Permission-Based Delegation Model(TCPBDM) that guarantees permanency of delegated permissions and does not violate security principle of least privilege and separation of duty. TCPBDM, based on the well-known RBAC96, supports both user-to-user and role-to-role delegation with time constraints. A delegator can give permission to a specific person, that is delegatee, and the permission can be withdrawn whenever the delegator wants. Our model is analyzed and shown to be effective in the present paper.

The Binding Update Method using Delegation of Rights in MIPv6 (MIPv6에서 권한위임을 이용한 위치수정 방안)

  • 이달원;이명훈;황일선;정회경;조인준
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.6
    • /
    • pp.1194-1203
    • /
    • 2004
  • The RR protocole, proposed in IETF mip6 WG and standardized by RFC 3775 at lune 2004, send a message 'Binding Update' that express MN's location information to CN safety and update location information. Standard RR protocole has some problems with initiating the protocol by the MN; it causes to increases in communication load in the home network, to increases communication delay between MN and CN. Also, is connoting vulnerability to against attacker who are on the path between CN and HA in security aspect. This paper proposes doing to delegate MN's location information update rights by HA new location information update method. That is, When update MN's location information to HA, Using MN's private key signed location information certificate use and this certificate using method that HA uses MN's location information at update to CN be. It decreases the route optimization overhead by reducing the number of messages as well as the using location information update time. Also, remove security weakness about against attacker who are on the path between CN and HA.

The Access Control Platform of the IoT Service Using the CapSG (CapSG를 이용한 IoT 서비스 접근제어 플랫폼)

  • Kim, Jin-Bo;Jang, Deresa;Kim, Mi-Sun;Seo, Jae-Hyun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.9
    • /
    • pp.337-346
    • /
    • 2015
  • There is great need for efficient user rights management method to provide a flexible service on variety protocols, domains, applications of IoT environments. In this paper, we propose a IoT service platform with CapSG to provide efficient access control for IoT various services of the environment. CapSG uses a token including authentication and access rights to perform authentication and access control service entity providing services. In addition, the generated token for service management, delegation, revocation, and provides a function such as denied. Also, it provides functions such as generation, delegation, disposal and rejection for service token management. In this paper, it provides the flexibility and efficiency of the access control for various services require of the IoT because of it is available to access control specific domain service by using the token group for each domain and is designed to access control using specific service token of tokens group.

A Delegation Model based on Agent in Distributed Systems

  • Kim, Kyu-Il;Lee, Joo-Chang;Choi, Won-Gil;Lee, Eun-Ju;Kim, Ung-Mo
    • Journal of Information Processing Systems
    • /
    • v.3 no.2
    • /
    • pp.82-88
    • /
    • 2007
  • Web services are the new building block of today's Internet, and provides interoperability among heterogeneous distributed systems. Recently in web services environment, security has become one of the most critical issues. The hackers attack one of fragile point and can misuse legitimate user privilege because all of the connected devices provide services for the user control and monitoring in real time. Also, the users of web services must temporarily delegate some or all of their rights to agents in order to perform actions on their behalf. This fact risks the exposure of user privacy information. In this paper, we propose secure delegation model based on SAML that provides confidentiality and integrity about the user information in distributed systems. In order to support privacy protection, service confidentiality, and assertion integrity, encryption and a digital signature mechanism is deployed. We build web service management server based on XACML, in order to manage services and policies of web service providers.

Influence of Democracy on Social Policy : The Case of Defective Democracy in Korea (민주주의가 사회복지정책에 미치는 영향 : 한국의 결함 있는 민주주의를 중심으로)

  • Lee, Shin-Yong
    • Korean Journal of Social Welfare
    • /
    • v.59 no.4
    • /
    • pp.137-162
    • /
    • 2007
  • In democracy basic rights such as political equality and participation through elections have been respected, opportunities of corporation and opposition have been guaranteed, and ability of self-learning and self-correction have been developed. These positive factors give preconditions for the welfare development in the democratic state. Because in this state adults get the suffrage and the open competition for official positions induces political parties use social policies as means to win the election. That is to say, political parties have an incentive to use various social policies to win the election. Democracy, therefore, has affinity with social policy. The affinity between democracy and social policy can be found also in Korea which was democratized in 1987. But, in Korea, the positive relationship between democracy and social policy is very weak due to the problem of constitutional structures. Korean Parliament usually enacts abstract social act and delegates the right to fill concrete contents of the social acts to the executive. Delegation itself has no problem, but excessive delegation is a problem since the executive can overuse its discretion as sacrificing the social rights of the citizen. In addition social consensus could not be achieved in this constitutional structures, which are a obstacle to establishing a political process in the Parliament to promote the welfare development through party competition. Excessive delegation should be reduced, and the Parliament should fill concrete contents of the social acts as exercising its legislative power more. Then a mechanism of welfare development can be launched in Korea.

  • PDF

A study of the librarians' morale in national and public libraries (${\cdot}$공립공공도서관 사서직의 사기에 관한 연구)

  • Park In-ung
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.5
    • /
    • pp.125-151
    • /
    • 1978
  • It can be expected for a public library to increase the service efficiency only when librarians can be satisfied with their job. Job satisfaction is the feeling a librarian has about his salary, his work, his promotion opportunities, his co- workers, his supervisors, etc. and affects directly librarians' morale. This paper is a study on these factors that affect the professional librarians' morale in national and public libraries in Korea. The methods employed to achieve the purpose of this study are (1) to establish some tentative factors affecting librarians' morale (2) to gather and analyze the answers against them from the professional librarians working in national and public libraries in Seoul, Korea. (3) to find out the factors abstructing the librarias' morale (4) to propose the improvement plans for them. The conclusions made are as follows: (1) Delegation of rights and responsibilities. (2) Adoption of the democratic leadership. (3) The harmonious communications between managers and librarians. (4) The level of wages and allowance. (5) Revision of the librarians' promotion regulation. (6) Necessity of continuing education of librarians. (7) Satisfaction of welfare facilities. (8) Improvement of social acknowledgement for the librarians' professionalism according to the advancement the level of educational course.

  • PDF