• 제목/요약/키워드: Efficient Identity Management

검색결과 62건 처리시간 0.023초

도시마케팅을 위한 도시이미지 관리방안 연구 - 도시이미지 관리 프로그램 도출을 위한 정량적 분석 - (A Study on City Image Management for City Marketing - Quantitative Analysis to Derive Management Programs of City Image -)

  • 변재상;조예지;최형석;김송이;임승빈
    • 한국조경학회지
    • /
    • 제35권4호
    • /
    • pp.81-89
    • /
    • 2007
  • Urban landscape represents a city's internal identity as well as external form. Therefore, urban landscape and image planning has to involve marketing strategies to deliver the economic growth and regional revitalization through recreating the environmental and cultural value of the city. This study intends to develop practical city image management programs as city marketing tools which consider opinions of local authorities, related experts, and residents. To achieve this purpose conjoint analysis was applied on three components which symbolically reflects features of assets and resources in Anseong. This study can be summarized as follows: 1. The first consideration for Lake Geumgwang is to develop farm experience Programs on waterside fields. 2. The rot consideration for Bauduki Festival is to make efforts for public relations(PR) to be able to merchandise festival-related goods and develop unique products. 3. The first consideration for Anseong Grapes is to build leisure-oriented theme parks for local farm products. This study is meaningful to develop the efficient and quantitative management method of city image for marketing. The integrated approach to the management programs to reflect opinions of local policies, experts and citizens is expected to become a useful foundation in studying city images and marketing.

세종특별자치시 반응형 아이덴티티 디자인 적용: 미니멀리즘을 중심으로 (Application of Responsive Identity Design in Sejong City: Focusing on Minimalism)

  • 차현지
    • 한국콘텐츠학회논문지
    • /
    • 제20권11호
    • /
    • pp.656-668
    • /
    • 2020
  • 세종특별자치시는 2012년 7월 출범하였으며, 형성되던 초기에는 중앙행정기관 이전에 초점을 두었으나 지난 2019년부터 스마트도시 및 2020년 한국 뉴딜정책 추진으로 행정도시에서 4차 산업 도시로 변화하고 있다. 이에 맞게 아이덴티티 디자인을 재평가할 필요가 있다. 특히 다양한 웨어러블, 사물인터넷(IoT) 등 정보기술의 급격한 변화로 웹(web) 환경 역시 최적화된 아이덴티티 디자인을 요구하고 있다. 이처럼 정보통신기술의 발달과 최적화된 화면을 볼 수 있는 반응형 웹이 늘어나면서 사용자들에게 아이덴티티를 직관적으로 전달하고, 다른 도시와 차별적이고 공감할 수 있도록 디자인을 적용하여 연구하였다. 연구에 앞서 웹 환경의 시대적 변화와 반응형 웹에 관하여 선행연구를 살펴보았으며, 반응형 웹의 아이덴티티 디자인 분석과 미니멀리즘 특성을 단계적 적용하여 살펴보았다. 이를 토대로 반응형 아이덴티티의 미니멀리즘 특성(단순성, 반복성, 공간성)을 적용하여 제안한 설문조사를 전문가 및 비전문가를 대상으로 조사한 결과 모바일 같은 작은 웹(web) 환경에서 쉽고 직관적으로 인식할 수 있었다. 따라서 세종시 아이덴티티가 시대의 변화에 맞는 정체성이 구축되도록 다각적인 연구와 효율적인 관리 방안에 관한 연구도 계속되길 기대해 본다.

AHP를 이용한 공공병원 평가지표의 우선순위 및 가중치 개발 (Priority Analysis of Criteria for Evaluation of Public Hospital Using Analytic Hierarchy Process)

  • 심재선;권영대;이건세;양민희;박은영
    • 보건의료산업학회지
    • /
    • 제7권4호
    • /
    • pp.289-303
    • /
    • 2013
  • This study looks at priorities in managing public hospitals by figuring out categories needed to examine the quality of each hospital. In order to analyze priorities and relative importance of valuation indicator in Seoul municipal hospitals, surveys were sent via e-mail to medical professionals who have participated in evaluation of municipal hospitals. The analytic hierarchy process (AHP) was conducted using the Expert Choice 11.5 program. The results show that 'providing public service' is considered to be the most important category for all kinds of public hospitals, followed by 'improving the quality of medical care', 'hospital management and governance', and 'efficient hospital management'. The importance of 'hospital management and governance' and 'efficient hospital management' is different depending on the types of hospitals, but the importance of 'providing public service' and 'improving the quality of care' remains the same regardless of the types of hospitals. Based on these results, the study comes to a conclusion that public hospitals should place high value on certain categories and their management purposes should differ depending on their specific fields and characteristics. This study will help furthering discussions on the identity and roles of public hospitals.

Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol

  • Wei, Guiyi;Yang, Xianbo;Shao, Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권12호
    • /
    • pp.3352-3365
    • /
    • 2012
  • Group key agreement (GKA) is a cryptographic primitive allowing two or more users to negotiate a shared session key over public networks. Wu et al. recently introduced the concept of asymmetric GKA that allows a group of users to negotiate a common public key, while each user only needs to hold his/her respective private key. However, Wu et al.'s protocol can not resist active attacks, such as fabrication. To solve this problem, Zhang et al. proposed an authenticated asymmetric GKA protocol, where each user is authenticated during the negotiation process, so it can resist active attacks. Whereas, Zhang et al.'s protocol needs a partially trusted certificate authority to issue certificates, which brings a heavy certificate management burden. To eliminate such cost, Zhang et al. constructed another protocol in identity-based setting. Unfortunately, it suffers from the so-called key escrow problem. In this paper, we propose the certificateless authenticated asymmetric group key agreement protocol which does not have certificate management burden and key escrow problem. Besides, our protocol achieves known-key security, unknown key-share security, key-compromise impersonation security, and key control security. Our simulation based on the pairing-based cryptography (PBC) library shows that this protocol is efficient and practical.

The Effects of Talent Type and Body Consciousness on High level-Appearance Management Behavior

  • Koo, Insook
    • 패션비즈니스
    • /
    • 제16권6호
    • /
    • pp.1-20
    • /
    • 2012
  • This study aims to define the influences of an individual's talent types and body consciousness factors on high((intense)-level appearance management behavior in 367 adults(female 172 and male 195). The present study is the first to consider both human talent type and the body consciousness on the high level-appearance management behavior correlates to appearance management behaviour. According to the result of the analysis, plastic surgery on body forms or faces are done by few people. However, straightening teeth, ear piercing, removal of spots or imperfections, and eyebrow tattoos are conducted by many consumers without much resistance. It is rather widely accepted, despite the fact that it can cause pain, discomfort, and side-effects. Furthermore, although excessive acts such as muscle training, dieting, weight managing, and oriental treatments can lead to side-effects, the standardized efficient beta value turned out to be high for these treatments. Thus, this study suggests that both the interpersonal talent among 8 talent factors and 2 body consciousness factors contributes to the reinforcement of the self-identity through high level-appearance management behaviors, but except risky plastic surgery. Therefore, this study supports the previous researches that body consciousness composed of self-source, which is desires and efforts to achieve the ideal body, and external-source, which is the internalization of other people's feedbacks.

Improving Security and Privacy-Preserving in Multi-Authorities Ciphertext-Policy Attribute-Based Encryption

  • Hu, Shengzhou;Li, Jiguo;Zhang, Yichen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권10호
    • /
    • pp.5100-5119
    • /
    • 2018
  • Most of existing privacy-preserving multi-authorities attribute-based encryption schemes (PP-MA-ABE) only considers the privacy of the user identity (ID). However, in many occasions information leakage is caused by the disclosing of his/her some sensitive attributes. In this paper, we propose a collusion-resisting ciphertext-policy PP-MA-ABE (CRPP-MACP-ABE) scheme with hiding both user's ID and attributes in the cloud storage system. We present a method to depict anonymous users and introduce a managerial role denoted by IDM for the management of user's anonymous identity certificate ($AID_{Cred}$). The scheme uses $AID_{Cred}$ to realize privacy-preserving of the user, namely, by verifying which attribute authorities (AAs) obtain the blinded public attribute keys, pseudonyms involved in the $AID_{Cred}$ and then distributes corresponding private keys for the user. We use different pseudonyms of the user to resist the collusion attack launched by viciousAAs. In addition, we utilize IDM to cooperate with multiple authorities in producing consistent private key for the user to avoid the collusion attack launched by vicious users. The proposed CRPP-MACP-ABE scheme is proved secure. Some computation and communication costs in our scheme are finished in preparation phase (i.e. user registration). Compared with the existing schemes, our scheme is more efficient.

New Construction of Short Certificate-Based Signature against Existential Forgery Attacks

  • Lu, Yang;Wang, Gang;Li, Jiguo;Shen, Jian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권7호
    • /
    • pp.3629-3647
    • /
    • 2017
  • Certificate-based cryptography is a useful public key cryptographic primitive that combines the merits of traditional public key cryptography and identity-based cryptography. It not only solves the key escrow problem inherent in identity-based cryptography, but also simplifies the cumbersome certificate management problem in traditional public key cryptography. So far, four short certificate-based signature schemes have been proposed. However, three of them fail in achieving the existential unforgeability under adaptive chosen-message attacks and the remaining one was not constructed in the normal framework of certificate-based signature. In this paper, we put forward a new short certificate-based signature scheme. The proposed scheme is devised in the normal framework of certificate-based signature and overcomes the security weaknesses in the previous short certificate-based signature schemes. In the random oracle model, we formally prove that it achieves the existential unforgeability against adaptive chosen-message attacks. Performance comparison shows that it is efficient and practical.

농촌마을 개발방향 설정을 위한 자원 평가기법 연구 (Resource Evaluation Skill to Set a Development Direction Rural Village)

  • 박창원;권혁정;주경로
    • 농촌계획
    • /
    • 제10권1호
    • /
    • pp.9-17
    • /
    • 2004
  • For the problems in executing rural development, recent recognitions are that discovery, preservation, and utilization of area-unique resource are unsatisfactory, that participation of local residents was neglected, and that approach to gradual refurbishment of houses and common space of town in consideration of existing spatial pattern of the town was not adequate. Especially, neglect for exact investigation, analysis and evaluation on rural local resources is bringing about social problems such as mass production of uniform rural area and loss of local identity. In this study, rural resources were listed and resource evaluation items was designed in order to establish development direction of rural village. According to these results, for the efficient and reasonable drive of the resource evaluation system, following items are required; A premise of local development by participation of local people, Development of diversely appliable resource evaluation clauses, Establishment of development type in connection with resource evaluation clauses, Systematic management of local resource through spreading DB resource. This research was loused on unearthing direction development of rural village and theme. However, what should be reconsidered through continuous study is that resource evaluation clauses are somewhat general and not concretely illustrated. Therefore establishment of characterized development is expected through clarifying local identity and presenting direction of local development, with the importance of resource and systematic analysis in planning on rural village in the future.

A Study on Efficient Data De-Identification Method for Blockchain DID

  • Min, Youn-A
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제13권2호
    • /
    • pp.60-66
    • /
    • 2021
  • Blockchain is a technology that enables trust-based consensus and verification based on a decentralized network. Distributed ID (DID) is based on a decentralized structure, and users have the right to manage their own ID. Recently, interest in self-sovereign identity authentication is increasing. In this paper, as a method for transparent and safe sovereignty management of data, among data pseudonymization techniques for blockchain use, various methods for data encryption processing are examined. The public key technique (homomorphic encryption) has high flexibility and security because different algorithms are applied to the entire sentence for encryption and decryption. As a result, the computational efficiency decreases. The hash function method (MD5) can maintain flexibility and is higher than the security-related two-way encryption method, but there is a threat of collision. Zero-knowledge proof is based on public key encryption based on a mutual proof method, and complex formulas are applied to processes such as personal identification, key distribution, and digital signature. It requires consensus and verification process, so the operation efficiency is lowered to the level of O (logeN) ~ O(N2). In this paper, data encryption processing for blockchain DID, based on zero-knowledge proof, was proposed and a one-way encryption method considering data use range and frequency of use was proposed. Based on the content presented in the thesis, it is possible to process corrected zero-knowledge proof and to process data efficiently.

외식 프랜차이즈 기업의 수익성과 영향 요인 분석 (Analysis of profitability and its affecting factors in restaurant franchise firms)

  • 박현정;신서영;양일선;최규완
    • 한국식품조리과학회지
    • /
    • 제23권2호통권98호
    • /
    • pp.270-279
    • /
    • 2007
  • The purposes of this study were to analyze the profitability of audited restaurant franchise firms and to investigate the financial variables affecting profitability. This study decomposed profit variation into the three main factors comprising the Du Pont Identity (operating efficiency, asset use efficiency and financial leverage). The operating efficiency of restaurant franchise firms was on the rise until 2004, but dropped dramatically in 2005. Especially, the profit margin dropped from 13.46% in 2004 to 6.54% in 2005. The asset use efficiency has been decreasing since 2003. The total asset turnover ratio, which can be indicative of over-investment, dropped from 1.55 in 2003 to 1.50 in 2005. The financial leverage remained stable after 2002. There were major differences in debt accumulation among the firms, and the current level of debt was thought to be higher in the restaurant industry than in other industries. Based on the results of a multiple regression analysis, we concluded that the factors affecting ROE were the debt-equity ratio, total asset turnover and the size of the firm. The debt-equity ratio and total asset turnover had a significantly positive effect on ROE, while the firm size had a significantly negative effect on ROE. However, the current ratio and sales growth rate were not significant. The finding that firm size and profitability were negatively related implied that restaurant franchise firms should pursue qualitative growth rather than quantitative growth. There was no major difference in profitability between domestic brands and foreign brands. However, the domestic brand was more efficient in terms of asset usage than the foreign brand.