• Title/Summary/Keyword: Service Authority

Search Result 445, Processing Time 0.023 seconds

A Study on Consensus Algorithm based on Blockchain (블록체인 기반 합의 알고리즘 연구)

  • Yoo, Soonduck
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.3
    • /
    • pp.25-32
    • /
    • 2019
  • The core of the block chain technology is solving the problem of agreement on double payment, and the PoW, PoS and DPoS algorithms used for this have been studied. PoW in-process proofs are consensus systems that require feasible efforts to prevent minor or malicious use of computing capabilities, such as sending spam e-mail or initiating denial of service (DoS) attacks. The proof of the PoS is made to solve the Nothing at stake problem as well as the energy waste of the proof of work (PoW) algorithm, and the decision of the sum of each node is decided according to the amount of money, not the calculation ability. DPoS is that a small number of authorized users maintain a trade consensus through a distributed network, whereas DPS provides consent authority to a small number of representatives, whereas PoS has consent authority to all users. If PoS is direct democracy, DPoS is indirect democracy. This study aims to contribute to the continuous development of the related field through the study of the algorithm of the block chain agreement.

Study on the Development for Traffic Safety Curriculum of Automated Vehicles on Public Roads (실 도로 기반 자율주행자동차 교통안전 교육과정 개발 연구)

  • Jin ho Choi;Jung rae Kim
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.6
    • /
    • pp.266-283
    • /
    • 2022
  • With the rapid development of autonomous vehicle technology, unexpected accidents are occurring. Therefore, it is necessary to minimize user accident damage through the development of autonomous traffic safety education. Since edge cases, accident type, and risk factor analysis are important for realistic education, overseas case studies and demonstrations were carried out, and based on this, two curriculum for service providers and general users were developed. The service provider curriculum consisted of OEDR, sudden stop, cut-in, take-over, defensive driving, system malfunction, policy and information security education, and the general user curriculum consisted of attention duty, take-over, operating design domain, accidents type, laws, functions, information security education.

Context-based Authentication Service for The Mobile Office

  • Yang, Jiyoung;Lee, Hyundong;Rhyoo, Shi-Kook;Chung, Mokdong
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.12
    • /
    • pp.1475-1484
    • /
    • 2012
  • Today many companies introduce new mobile office environments evolved from the recent rapid development in mobile device technologies. Most of the recent mobile office systems use a simple authentication scheme such as ID/Password. This method is easy to use, but it does not consider the user's context. Thus it cannot provide appropriate security service required by the user's proper contexts. Therefore, this paper proposes a context based authentication system which applies security level verification and uses fuzzy algorithm based on the importance of access authority control.

Implementation of EDMS(Electric Document Management System) with Validity Verification (전자문서 유효기간 검증 기능을 탑재한 전자문서관리시스템 구현)

  • Park, Jung-Oh;Lee, Seung-Min;Kim, Sang-Geun;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.7B
    • /
    • pp.1043-1049
    • /
    • 2010
  • E-document deposit and issue service among other services is critical service in CEDA(Certified E-Document Deposit Authority) that assure reliability and stability of E-document. After owner's E-document is registered in CEDA, issuing partial information(a part of page) is to prevent exposure of superfluous information when owner issue E-document to 3rd party. Also we suggested that is able to verify validation of E-document as validation check module is inserted suggested system.

The Relationship between Internal Marketing and Service Quality in Telecommunication Sector (정보통신 분야 종사자의 내부마케팅노력이 서비스품질에 미치는 효과)

  • An, Gwan-Yeong
    • Proceedings of the Korean Society for Quality Management Conference
    • /
    • 2007.04a
    • /
    • pp.439-443
    • /
    • 2007
  • This paper is to investigate the relationship between international marketing and service quality, and the moderating effect of gender in that relationship. The data to make an empirical analysis were gathered from 269 workers in telecommunication sector. Multiple regression analysis revealed that (1) education was positively related with tangibility, reliability, responsiveness, empathy, assurance, and (2) internal communication was positively related with tangibility, reliability, responsiveness, assurance, and (3) delegation of authority was positively related with assurance. Hierarchical multiple regression analysis revealed that (4) compensation was more positively related with reliability in woman, and (5) employment security was more positively related with assurance in man.

  • PDF

A Study on the Hierarchical Structure of QOS (Quality of Service) and its evaluation model (통신망 운용보전 성과관리의 체계화를 위한 서비스품질지수 설정 및 평가모델에 관한 연구)

  • Park, Sun-Dal;Jo, Hyeon-Bo;Yang, Byeong-Hak;Sim, Hyeon-Taek;Jo, Yeong-Hyeon;Kim, Tae-Ho
    • IE interfaces
    • /
    • v.2 no.1
    • /
    • pp.69-78
    • /
    • 1989
  • The objective of this study is to establish a hierarchical structure for Quality of Service Management (QOSM) from subsriber's viewpoint. First, We construct the hierarchy of the QOSM items. These items are derived from the CCITT concepts and the present Korean Telecommunication Authority(KTA) system. Then QOS performance indicators which consists of the lower levels of the hierarchy and the weight value is constructed. Finally, an evaluation method of the QOS is presented. It is expected that this study offers an evaluation method of network performance and efficiency of operation and maintenance for telecommunication facilities.

  • PDF

A Study on The Crime Prevention System Improvement of Seoul Metropolitan Police (서울 경찰(警察)의 방범체제(防犯體制) 개선(改善)에 관한 연구(硏究))

  • Lee, Sang-Won
    • Korean Security Journal
    • /
    • no.1
    • /
    • pp.175-208
    • /
    • 1997
  • I study the actual condition and the problem of the crime prevention system of two seoul police station. that is operated on the unit of police box, and present the new improvement. Stragic and active is the new crime prevention system that introduces a concept of community oriented policing, the tendency of a developed country police. I present a medium - sized police station where 250${\sim}$300 policemen work. It consist of a patrol division, a community division and a administration support division. The chief of police bears the responsibility only for crime prevention service by concentrating on pure Patrol - centered crime prevention activity and community relation activity. Next I present a police inspector system. The most important on this paper is the community policing officer system that a policeman bears responsibility on district apart from a patrol division and support a police service related community. To be operated these systems effectively, these need to be regulated according to a police distinct, a police purpose and it's demand. Also a scale, function, authority of a existing. Police station must be regulated and the police training must be carried out.

  • PDF

Tend and implications of the railway technology R & D in Japan (일본의 철도기술개발 동향과 시사점)

  • Han, Seok-Youn;Ahn, Tae-Gi;Sin, Jeong-Yeol;Chung, Jong-Duck
    • Proceedings of the KSR Conference
    • /
    • 2008.06a
    • /
    • pp.2332-2342
    • /
    • 2008
  • Railway in Japan has been changed every apr. 20 years as follows, since the war ended in 1945. Shinkansen which was the first high speed train in the world began to revenue service in 1964, and a national railway authority was privatized segmentally in 1987, and after 20 years later from then, the ticketing service using IC card was accomplished. In this research, we review these changes in Japan in the administrative aspects on railway technology, and R & D aspects of the Railway Technical Research Institute, JR East and JR West which are railway corporations. Also we introduce the present status and future of railway technologies in Japan which railway experts diagnosed. In the twenty-first century, the needs of the times for railway have been enormously changed due to a low birth-rate, an aging society, environmental pollution and energy problems and etc. Because we have very similar problems to them like Japan, we could get lessons from Japanese cases in setting the direction for the development of railway technologies.

  • PDF

A Study on Developing and Refining a Large Citation Service System

  • Kim, Kwang-Young;Kim, Hwan-Min
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.3 no.1
    • /
    • pp.65-80
    • /
    • 2013
  • Today, citation index information is used as an outcome scale of spreading technology and encouraging research. Article citation information is an important factor to determine the authority of the relevant author. Google Scholar uses the article citation information to organize academic article search results with a rank algorithm. For an accurate analysis of such important citation index information, large amounts of bibliographic data are required. Therefore, this study aims to build a fast and efficient system for large amounts of bibliographic data, and to design and develop a system for quickly analyzing cited information for that data. This study also aims to use and analyze citation data to be a basic element for providing various advanced services to the academic article search system.

A SAML-based SSO and B2B (SAML기반의 SSO 및 B2B)

  • Hyen, Jin-Seung;Choi, Dae-Seon;Han, Keun-Hee;Lee, Seung-Min;Jeong, Tae-Eui
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.961-964
    • /
    • 2002
  • 일반적으로 Web Service란 표준 인터넷 프로토콜을 이용하여 외부에 노출된 비즈니스 기능을 프로그램적으로 접근하는 방식으로 간단한 메소드 호출뿐만 아니라 복잡한 비즈니스 프로세스까지 수행이 가능하고, 한번 배포된 Web Service는 인터넷으로 접근할 수 있는 곳이면 어디서든지 접근 및 호출이 가능하다. 현재 Web Service 구현에 있어 최대의 당면 과제는 보안문제로서. 인터넷을 이용해서 이동하고 있는 많은 양의 데이터를 안전하게 지킬 수 있는 방법의 모색에 초점이 맞추어져 있다. 이러한 보안 문제를 해결하기 위해 SAML(Security Assertion Markup Language), XKMS(XML Key Management Specification), XAML(Transaction Authority Markup Language), BTP(Business Transaction Protocol), XLANG 등을 이용한 여러 가지 방법이 시도되고 있다. 본 논문에서는 SAML을 이용한 보안 솔루션을 분석하고, SAML을 이용하여 SSO, Back Office Transaction 등의 어플리케이션을 구축하여 시뮬레이션 결과를 보이고자 한다.

  • PDF