• Title/Summary/Keyword: Efficient Identity Management

Search Result 62, Processing Time 0.024 seconds

A Case Study of a Acquisition & Appraisal Policy of Business Archives - With a focus on Meritz - (기업사료의 수집·평가방안 연구 - 메리츠화재의 사례를 중심으로 -)

  • Kim, Hwa Kyoung
    • The Korean Journal of Archival Studies
    • /
    • no.15
    • /
    • pp.219-262
    • /
    • 2007
  • Business organization have developed in close association with the society afterward. Moreover, under capitalism business archives, though they are created in private sector, have started to have public characteristics and be used in public domain beyond internal use in business organization. Records and Archives management at a corporate level increasingly become indispensible. Business organization can use archive management to improve job efficiency and customer service and to facilitate legal matters, marketing, advertising, property management, personnel management and publicity. Additionally, They can secure corporate identity and social reliability as well as transparency in management. This is turn helps secure corporate competitiveness to play as a medium for creating new profit, which will enhance corporate brands. The records and Archives management, which recently kicks off among business organization, are to collect scattered archives and seek systemic management through archives management systems. This study present ways to collect archives scattered before archives management systems were adopted according to archives management. As a prior investigation, the scope and characteristics of business archives are defined. Visit to business organization to collect data and interview with officials responsible were carried out as a preliminary investigation to conduce acquisition policy. Based on the results of the investigation, acquisition policy of Meritz was conducted. into internal and external collection activities, event collection activities. Value appraisal and display appraisal of archives were established as a appraisal policy for efficient management and utilization of collected business archives. This study takes the case of Metitz Fire & Marine Insurance Co, Ltd (Meritz) as a example to present ways to manage business archives specifically.

An Efficient and Provable Secure Certificateless Identification Scheme in the Standard Model

  • Chin, Ji-Jian;Heng, Swee-Huay;Phan, Raphael C.W.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.7
    • /
    • pp.2532-2553
    • /
    • 2014
  • In Asiacrypt 2003, Al-Riyami and Paterson proposed the notion of certificateless cryptography, a technique to remove key escrow from traditional identity-based cryptography as well as circumvent the certificate management problem of traditional public key cryptography. Subsequently much research has been done in the realm of certificateless encryption and signature schemes, but little to no work has been done for the identification primitive until 2013 when Chin et al. rigorously defined certificateless identification and proposed a concrete scheme. However Chin et al.'s scheme was proven in the random oracle model and Canetti et al. has shown that certain schemes provable secure in the random oracle model can be insecure when random oracles are replaced with actual hash functions. Therefore while having a proof in the random oracle model is better than having no proof at all, a scheme to be proven in the standard model would provide stronger security guarantees. In this paper, we propose the first certificateless identification scheme that is both efficient and show our proof of security in the standard model, that is without having to assume random oracles exist.

Certificate-Based Signcryption Scheme without Pairing: Directly Verifying Signcrypted Messages Using a Public Key

  • Le, Minh-Ha;Hwang, Seong Oun
    • ETRI Journal
    • /
    • v.38 no.4
    • /
    • pp.724-734
    • /
    • 2016
  • To achieve confidentiality, integrity, authentication, and non-repudiation simultaneously, the concept of signcryption was introduced by combining encryption and a signature in a single scheme. Certificate-based encryption schemes are designed to resolve the key escrow problem of identity-based encryption, as well as to simplify the certificate management problem in traditional public key cryptosystems. In this paper, we propose a new certificate-based signcryption scheme that has been proved to be secure against adaptive chosen ciphertext attacks and existentially unforgeable against chosen-message attacks in the random oracle model. Our scheme is not based on pairing and thus is efficient and practical. Furthermore, it allows a signcrypted message to be immediately verified by the public key of the sender. This means that verification and decryption of the signcrypted message are decoupled. To the best of our knowledge, this is the first signcryption scheme without pairing to have this feature.

Efficient and Secure Certificateless Proxy Re-Encryption

  • Liu, Ya;Wang, Hongbing;Wang, Chunlu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2254-2275
    • /
    • 2017
  • In this paper, we present an IND-CCA2 secure certificateless proxy re-encryption scheme in the random oracle model. A certificateless public key cryptography simplifies the certificate management in a traditional public key infrastructure and the built-in key escrow feature in an identity-based public key cryptography. Our scheme shares the merits of certificateless public key encryption cryptosystems and proxy re-encryption cryptosystems. Our certificateless proxy re-encryption scheme has several practical and useful properties - namely, multi-use, unidirectionality, non-interactivity, non-transitivity and so on. The security of our scheme bases on the standard bilinear Diffie-Hellman and the decisional Bilinear Diffie-Hellman assumptions.

CLB-ECC: Certificateless Blind Signature Using ECC

  • Nayak, Sanjeet Kumar;Mohanty, Sujata;Majhi, Banshidhar
    • Journal of Information Processing Systems
    • /
    • v.13 no.4
    • /
    • pp.970-986
    • /
    • 2017
  • Certificateless public key cryptography (CL-PKC) is a new benchmark in modern cryptography. It not only simplifies the certificate management problem of PKC, but also avoids the key escrow problem of the identity based cryptosystem (ID-PKC). In this article, we propose a certificateless blind signature protocol which is based on elliptic curve cryptography (CLB-ECC). The scheme is suitable for the wireless communication environment because of smaller parameter size. The proposed scheme is proven to be secure against attacks by two different kinds of adversaries. CLB-ECC is efficient in terms of computation compared to the other existing conventional schemes. CLB-ECC can withstand forgery attack, key only attack, and known message attack. An e-cash framework, which is based on CLB-ECC, has also been proposed. As a result, the proposed CLB-ECC scheme seems to be more effective for applying to real life applications like e-shopping, e-voting, etc., in handheld devices.

Load Distribution using IMSI Prefix to select Gateway in LTE (Gateway 선택 시, 특정 가입자 번호 대역에 대해 부하 분산 방법)

  • Cho, Ray Sehyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.759-762
    • /
    • 2012
  • This paper is for EPC(Evolved Packet Core) network to share the load balance by IMSI(International Mobile Subscriber Identity) prefix in MME(Mobility Management Entity). For the telecommunication, it needs to choose the anchoring gateway to use the specific gateway to avoid the traffic load to support the efficient telecommunication service. We propose the way to choose the effective gateway to avoid the traffic load in order for good qualify service. We compare the load between the gateways which are the general gateway and the specific gateway used by proposed concept.

The Impact of Information Technology on Academic Library Management (정보기술이 대학도서관의 경영관리에 미치는 영향)

  • 윤희윤
    • Journal of the Korean Society for information Management
    • /
    • v.19 no.1
    • /
    • pp.89-114
    • /
    • 2002
  • Information technology. computers, networks, and the World Wide Web are ubiquitous. Academic libraries have applied information technology over the last ten years. The traditional role of the library as the scholarly information heart of the university is being questioned as information technology makes Information ever more easily accessible. And the recent technological development may alter the fundamental concept or identity of the academic library in the twenty-first century. This paper examines the ways in which information technology have chanced the academic library over the last decades and deals with the logical interrelation of 'information technology' and 'management' in the context of academic libraries in Korea. The purpose of this paper is to analyse the impacts of information technology on academic library management (organizational structure. librarian's job and role. budget allocation and expenditures, space planning and functionality, collection paradigm, user service, academic entity, etc) and suggests a desirable acceptance attitudes and efficient management acceptance attitude and management.

A SM2 Elliptic Curve Threshold Signature Scheme without a Trusted Center

  • Jie, Yan;Yu, Lu;Li-yun, Chen;Wei, Nie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.897-913
    • /
    • 2016
  • Threshold signature is very important in identity authentication and some other applications. In December 2010, Chinese Encryption Administration released the SM2 elliptic curve digital signature algorithm as the first standard of the digital signature algorithm in China. At present, the papers on the threshold signature scheme based on this algorithm are few. A SM2 elliptic curve threshold signature scheme without a trusted center is proposed according to the Joint-Shamir-RSS algorithm, the Joint-Shamir-ZSS algorithm, the sum or diff-SS algorithm, the Mul-SS algorithm, the Inv-SS algorithm and the PM-SS algorithm. The proposed scheme is analyzed from correctness, security and efficiency. The correctness analysis shows that the proposed scheme can realize the effective threshold signature. The security analysis shows that the proposed scheme can resist some kinds of common attacks. The efficiency analysis shows that if the same secret sharing algorithms are used to design the threshold signature schemes, the SM2 elliptic curve threshold signature scheme will be more efficient than the threshold signature scheme based on ECDSA.

Study on Developing Program for Efficient Landscape Woody Plants Management - Mainly Focused on the Development of a Tree Inventory System - (조경수목의 효율적 관리를 위한 프로그램 개발에 관한 연구 - 관리대장(Tree Inventory) 개발을 중심으로 -)

  • 조영환;곽행구
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.24 no.4
    • /
    • pp.1-22
    • /
    • 1997
  • This paper was focused on the efficient management of landscape woody plants, and concerned itself with their important role in the urban environment. Based on the philosophy that there is nothing that can be done without an inventory, the purpose of this study was to develop an inventory system and iris proper application to a site for establishing a management plan Two different approaches were used, The first was to make a newly structured inventory system through collecting, analyzing, and evaluating various types of inventories used in Korea, the U. S. A., and Japan. The second approach was to apply a newly designed inventory system to the case study area. using GIS 'as a tool of spacial analysis and statistics for making decisions. The results could be summarized as follows; 1. In Korea, most of the Landscape Woozy Plants Inventories had datas which represented possession of trees, and only the work which they had done according to their traditional ways, There was no data related to the conditions, management needs, and site conditions of individual trees, This is essential information for organizing an inventory system . 2. There needs to be data which is balanced, containing tree characteristics and site characteristics. Through such information the management needs could be adjusted properly. The inventory list described in this paper was determined by botanical identity, placement condition, condition of tree, and types of work for maintaining as well as improving the condition of each tree One of the most important things was to determine the location data of each tree so as to compare data with other trees. The data gained from the field survey still had some problems because of lack of scientific method for supporting objective views, and because of actual situations, especially in the field of evaluating site conditions and management needs. All data should be revised to fit a computer data management system , if possible 3. The GIS(Geographic Information System) application showed good performance in handling inventory data for decision making. All the data used for the GIS application was divided into location and non-spatial data. Using the location data, it was easy to find the exact location of each tree on the monitor and on the maps generated by the computer even in the actual managed trite, along with various attribute data. Therefore it could be said that the entire management plan should start from data of individual trees with their exact locations, for making concrete management goals through actual budget planning.

  • PDF

Ecological Restoration and Environmental Impact Assessment for the Realization of the Central Theme, Preservation, Suggested in the National Anthem of Korea (생태복원과 환경영향평가: "애국가"에 나타난 '보전'의 이념 구현을 중심으로)

  • Kim, Eun-Shik;Hong, Sun-Kee
    • Journal of Environmental Impact Assessment
    • /
    • v.17 no.1
    • /
    • pp.25-45
    • /
    • 2008
  • This review was made to discuss the issues of ecological restoration and environmental impact assessment (EIA) related to the preservation of natural environment, the central theme expressed in the National Anthem of Korea. The authors notice that the key word or the central philosophy contained in the verses of the National Anthem of Korea is the preservation of national land and eternal identity for future generations, which is thought to be pursued through the attainment of ecological sustainability. A conceptual model for the sustainable management of natural ecosystems was suggested for the efficient utilization and the preservation of them, whose activities should be promoted by those of conservation and restoration instead of destructive development and negligence, respectively. Here, the preservation of natural environment can be directly pursued through the restoration of degraded ecosystems and landscapes and the utilization of natural environment can be directly pursued through the conservation of natural resources and wise management of natural ecosystems and landscapes. After reviewing the major characteristics and activities of the restoration of degraded ecosystems and landscapes, discussion was further extended to points for the promotion of the EIA activities. To point out some of them, it is needed for the public to better understand the nature of sustainable management of natural environment, for the society to put extensive energy and resources in the restoration of degraded ecosystems and landscapes, and for the government to install higher levels of ministries than that of the Ministry of Environment in dealing with the issues related to the 'preservation' of national land, people, culture and the security of the sustainability for future generations, where EIA and strategic environment assessment (SEA) can directly contribute to the sustainability of the country and future generations.