• Title/Summary/Keyword: Service Authority

Search Result 445, Processing Time 0.02 seconds

User-Oriented Multimedia Service in the Ubiquitous Home Environment (유비쿼터스 흠 환경에서의 사용자 중심 멀티미디어 서비스)

  • Park Jong-Hyuk;Lee Sang-Jin;Koh Byoung-Soo;Lee Sang-Won
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.11
    • /
    • pp.1531-1542
    • /
    • 2005
  • In multimedia service of Ubiquitous Home Environment(UHE), the requirements such as intelligent service that is executed automatically without direct order of user and fitted service compatible for each user and comfortable of user, interoperability of multimedia contents between incompatible devices will increase. Multimedia protection and management, authentication and authority administration methods that are suitable for above demands are also required. In this paper, we suggest authentication method suited for UHE and propose user oriented multimedia service(UHMS: Ubiquitous Home Multimedia Service) that provides the interoperability of multimedia between incompatible devices, conducts intelligently the context information (preference information, device information etc.) using sensor module and home server, provides and secure services.

  • PDF

A Study on the ITIL Management Model Based on the IT Governance for Public Sector (공공부분을 위한 IT 거버넌스 기반의 ITIL 관리 모델에 관한 연구)

  • Kim, Sang-Gil;Kim, Jin-Young;Park, Yeung-Gyu
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.4
    • /
    • pp.490-505
    • /
    • 2014
  • IT governance in order to achieve the strategic goals of the organization, leadership, organizational structure, and the process is defined. In order to achieve IT governance, organizational structure, leadership for spindle formation, maintenance, and standardized processes to specific and an effective ITIL (Information Technology Infrastructure Library) management model is needed. In this study, the K Authority Management Model of IT Governance ITIL - based research on service delivery and customer satisfaction through the effective information for ITSM (Information Technology Service Management, IT Service Management) building measures, information for business planning and performance management PMS (Project Management System, project Management System), survey on ICT service levels established through the process of planning and construction management models such as ITIL future research on the public portion of the proceeds from the ITIL management model can be utilized as a guideline when establishing a theoretical presents a base.

An Authority-Based Efficient Key Management Protocol for Cloud Environment (클라우드 환경을 위한 효율적인 권한 기반 키 설립 프로토콜)

  • Choi, Jeong-hee;Lee, Sang-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1035-1045
    • /
    • 2018
  • Recently, with the development of IT technology, authentication methods of users using cloud services have been diversified. However, research on providing authentication information of a user using a cloud service securely according to authority has not been make until now. In this paper, we propose a key establishment protocol which can perform split authentication using secret key and access control key according to the role authority of user in Intra cloud environment. The proposed protocol generates the access control key and secret key of the user by using the attributes of the user and the generated random number($t_1$, $t_2$), and classifies the roles according to the user's authority after generating the key. Unnecessary operation processes can be reduced. As a result of the performance evaluation, the proposed protocol guarantees the security against various type of attacks that may occur in the cloud environment because the user is authenticated by dividing the access control key and secret key. The size of the ciphertext used to establish the key could be reduced by ${\sum}+1$ more than the existing protocol.

A study on the Enhancement of Transshipment Competitiveness of Busan Port by Analyzing Factors Affecting Transshipment Competitiveness

  • Park, Ho-Chul
    • Journal of Navigation and Port Research
    • /
    • v.45 no.5
    • /
    • pp.238-251
    • /
    • 2021
  • It is understood that carriers evaluate several features of ports when fixing the T/S port. Those features can be enumerated as Geographic condition of port, Service network with overseas ports, Level of port productivity, Port infrastructure, Port services level, Port Authority's Policy direction mand Cost competitiveness. The objectives of this study are to: 1) determine if those factors could affect the T/S competitiveness of the port; and 2) to evaluate how Busan port conforms to those determinants factors in such extent. According to results of the analysis after surveying National global carrier, Intra-Asia carriers, Global overseas carriers, Terminal operators, and Busan Port Authority known to be highly influential samples, all factors were proven to be factors affecting the T/S competitiveness of the port. Meanwhile, in the analysis through AHP (Analytic Hierarchy Process) methodology about the order of weight among those factors, Cost competitiveness was answered as the most important factor. On the other hand, in the analysis to find the situation if Busan port conforms to those factors, Busan port was proven to satisfy those conditions to a moderate extent. In the analysis about the order of strength among those factors, Busan port was answered to have the highest strength in the geographic condition. However, it showed the bottom level of strength in the Cost competitiveness which was answered as the most important factor among samples for determining the T/S competitiveness of the port. This indicates that Government and Port Authority of Busan have to concentrate policy capabilities on the improvement of cost competitiveness of Busan port to enhance the T/S competitiveness. In this paper, four policy recommendations are given : Integration of Busan port operation into New port, Combining multiple operators into one or a few, Attracting Global mega carriers as the New port terminal operators, and Continuous Infrastructure expansion.

A comparison study of the characteristics of private and public security service of Koryo dynasty and modern security service (고려시대 공적·사적경호의 특성과 현대경호와의 비교연구)

  • Lee, Sung-Jin
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.417-442
    • /
    • 2013
  • This study considers the characteristics of the separation of public and private security service during Koryo dynasty, and compares it with the modern security service. Modern day security service's definition of private and public security service was used to distinguish them. Given the different historical settings, it's difficult to argue that the distinction between public and private service during Koryo dynasty was clear, but it can be said that public security service was centered around palace guard and concerns the activities of protest, and military made for the relationship, and private security service was centered around power of DoBang and includes the activities of malingering, and Byolchogun. During the early days of Koryo, protest, district military and soldiers who stay in the palace were all parts of a palace revolt and this institutional improvement of soldiers who stay in the palace was accomplished during King Seongjong's rule. The tradition of a palace revolt can find its roots in the middle military, and after the unification, a palace revolt was reformed into the king's palace revolt of second and the 6th along the course of establishing the nation's system. All of the changes stem from the reformation for consolidating the royal authority. Gyung Dae Seoung wanted to protect himself and he slept with his army night and days and because of that, group of soldiers was created and it was called DOBANG. Some members were from dobang gyeonryong, The forced were powerful because it was gathered with a warriors with extraordinaire martial arts and competent management. Most of the soldiers followed gyeong dae seung because they believed that he has a strong leadership and loves his people, and had a strong faith in him. However, the general gyeong jang had a belief that politics must be reverted to the previous so the relationships between jungbang wasn't smooth. Because of the economic operational problems, due to fraud committed by the mens under his command failed to maintain integrity and was criticised.The misconception also fed up with the emperor and the deepening relationships between the soldiers, his dobang was dismantled. After he took over the dobang, for his personal safety and to strengthen his position he compensated gyeon dae seong's dobang and developed the organization. In the process of extending the dobang Choi chung heon recruited many talented people to strengthen the military base, and also accepted the advice and expanded the power of Dobang. Choi Chung Heon thus consolidated his political gains by weakening the power of the king's army and adjusting the myth, which could've threatened his regime, and this was called Dobang number 6th. Dobang number six got even more powerful by his son named Choi woo, and after ruling, he expanded into a room, and a substantial reorganization of Dobang was developed. And then the creation of yabyeolcho also showed the effect to prevent the crisis. Although the palace guards who were public security service of Koryo Dynasty was still maintained during the military rule era when the royal authority was incapacitated, it was only maintained to have a symbolic meaning as the actual authority including military power was with Choi, the master of Dobang, private security service group. Likewise, during the rule of Choi, private securty service could reign over public security service, and the noteworthy characteristic of Dobang is that it assisted the private soldier groups to seize the military power by reorganizing and modifying military system. Although both differences and similarities can be found when comparing the guards of Koryo Dynasty with those of contemporary society, they have a similarity in terms of the essence of guards that they guarantee the safety of their clients. As for differences, the royalty of Koryo Dynasty and the pursuit of profit of contemporary society are in contrast, and contemporary guards can be seen as the fulfillment of responsibility and duty by free will, whereas guards of Koryo Dynasty were ruled with military coercion.

  • PDF

Design and Implementation of Application Service Component for Reuse in Local Government's GIS (지방자치단체 지리정보시스템에서 재사용을 위한 응용 서비스 컴포넌트의 설계 및 구현)

  • Kim, Kwang-Soo;Cho, Dae-Soo;Kim, Do-Hyun;Choi, Hae-Ock
    • Journal of Korea Spatial Information System Society
    • /
    • v.3 no.1 s.5
    • /
    • pp.75-87
    • /
    • 2001
  • The advantages of using components result from their reusability between applications. Applications can be easily implemented by adding components. In this paper, we described the design and implementation process of ASC(Application Service Component) for component-based GIS applications. In our project, there are 5 applications : Road Facility Management, Urban Planning, Cadastral Map Management, Water Supply Management, and Sewerage Management. All of them use MapBase component which supports common GIS functionality. Although they are different applications, some parts of them are same. We analyzed the developed results in 1st and 2nd year, and the achievement of UIS(Urban Information System) project in Busan Metro City in Korea. The UIS of Busan was consisted of 5 applications to equal with our project. Then, we extracted 11 common used components between 5 applications, and implemented 5 common components of them and 2 additional components. They were Authority, GISReport, IndexMap, Measurement, Search, Symbol Manager, and Attribute Display. As we offered them to companies developing application components, they were able to reduce the development time.

  • PDF

Empowerment of the Social Worker Effect on Job Satisfaction and Organizational Commitment (사회복지사의 임파워먼트가 직무만족과 조직몰입에 미치는 영향)

  • Bo-Kyung Kim;Seong-Wook Seo;Sang-Cheol Im;Kyoung Kim
    • Journal of The Korean Society of Integrative Medicine
    • /
    • v.11 no.4
    • /
    • pp.221-235
    • /
    • 2023
  • Purpose : Delegating authority to employees exerts a positive effect on the efficient operation and service of a company. In particular, investigating how the delegation of authority granted to social workers, who have a greater workload compared with those of other occupations, influences job satisfaction and commitment to the organization is meaningful. Therefore, this study aims to investigate the impact of the empowerment of social workers on job satisfaction and organizational commitment. Methods : Toward this end, surveys were distributed to social workers employed at social welfare facilities in Daegu metropolitan city. Prior to the study, the researcher visited the institutions in which the social workers were working, explained the content in person, and conducted the self-administered survey accompanied by two research assistants who received prior training. Out of the 233 collected responses, those with unreliable responses and missing data were excluded, which left a sample of 224 for analysis. Data were analyzed using SPSS 18.0. Results : First, social workers who were older, had higher positions, and with longer years of service exhibited higher levels of empowerment in terms of differences in empowerment according to general characteristics. Second, for job satisfaction and organizational commitment according to general characteristics, the longer the period of employment, the higher the level of job satisfaction. Third, empowerment exerted an effect on job satisfaction and organizational commitment, and a positive correlation was found. Conclusion : The empowerment of social workers exerted a positive effect on job satisfaction and organizational commitment. Therefore, to improve service quality and the efficient operation of social welfare organizations in this practice, improving the empowerment of social workers is necessary by providing appropriate treatments, improving working environments, and providing appropriate discretion and decision-making authorities that are considered necessary for work performance.

Insights from the Compulsory Licensing and the Approved Contractor Scheme of the UK Private Security (영국의 민간경비 의무적 자격증 및 인증계약자 제도에 관한 연구)

  • Lee, Seong-Ki;Kim, Hak-Kyong
    • Korean Security Journal
    • /
    • no.30
    • /
    • pp.85-115
    • /
    • 2012
  • The private security industry has expanded in proportion to economic developments throughout the world, largely because the existing security services provided by the government do not satisfy demands of various economic entities and people in the society for better security service. Therefore, it would not be unfair to say that security services by private sectors are decided by its quality, price, and customers' needs. A refined management system, however, is essential to assess qualification of security companies and their service quality, given the nature of public goods of security service. Despite the steady growth of private security industry in Korea, however, it has been continuously criticized that its security management system for better qualification of security guards, training, and private security companies have not been fully updated enough to guarantee good quality. This paper aims to gain insights to effective policy formation in the Korean private security industry, through reviewing the licensing system of private security guards and the Approved Contractor Scheme (hereinafter the ACS) in the UK- that has on one hand systematically regulated private security industry, but on other hand has enforced public-private cooperation by laying significant stress on autonomy of private security companies. The distinctive characteristic of the UK policy for the private security is that the Security Industry Authority (hereinafter the SIA), an independent authority, is leading development of the private security industry of the UK through specialized private security regulation and enhanced service quality. In addition, the UK is developing quality of security service with transparent financial management and recruitment of good quality security guards by adopting not only substantially specified regulations and standards, but the voluntary ACS system. Moreover, the SIA analyzes customers' demands for security service specializing the policy for private security through conducting a variety of surveys. With the analysis of the UK private security system, this paper suggests that the Korean government change from a non-specialized private security regulation system by the National Police Agency to an independently specialized private security authority like the SIA and adopt the compulsory licensing and the ACS system of the UK.

  • PDF

The Relationship between Internal Marketing and Service Quality in Telecommunication Sector (정보통신 분야 종사자의 내부마케팅노력이 서비스품질에 미치는 효과)

  • Ahn, Kwan-Young;Park, Rho-Gook
    • Journal of Korean Society for Quality Management
    • /
    • v.35 no.4
    • /
    • pp.78-88
    • /
    • 2007
  • This paper is to investigate the relationship between international marketing and service quality, and the moderating effect of gender in that relationship. The data to make an empirical analysis were gathered from 269 workers in telecommunication sector. Multiple regression analysis revealed that (1) education was positively related with tangibility, reliability, responsiveness, empathy, assurance, and (2) internal communication was positively related with tangibility, reliability, responsiveness, assurance, and (3) delegation of authority was positively related with assurance. Hierarchical multiple regression analysis revealed that (4) compensation was more positively related with reliability in woman, and (5) employment security was more positively related with assurance in man.

Protocol Design for Mutual Authentication of RS_RCCS (RS_RCCS의 상호인증을 위한 프로토콜 설계)

  • Doo, Chang-Ho
    • Journal of the Korea Computer Industry Society
    • /
    • v.7 no.4
    • /
    • pp.271-280
    • /
    • 2006
  • This study is to propose and design a protocol that offers independent authentication with no necessity of certification authority using password between participants in RS_RCCS(Relay Service-based Remote Computing Control System). In RS_RCCS without authentication center that remote service requesters have mutual authentication with many service managers, there needs for a protocol protected from password attacks. Hereupon, this study is to offer an efficient authentication setting and a protocol for RS_RCCS and helpful for the usefulness of resource management.

  • PDF