• Title/Summary/Keyword: Third party

Search Result 872, Processing Time 0.027 seconds

Fair Private Matching with Semi-Trusted Third Party (STTP를 활용한 공평한 Private Matching)

  • Kim, E-Yong;Hong, Jeong-Dae;Cheo, Jung-Hee;Park, Kun-Soo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.06a
    • /
    • pp.290-291
    • /
    • 2007
  • Private Matching은 각기 다른 두 참여자가 가진 데이터의 교집합을 구하는 문제이다. 이때 각 참여자는 교집합은 공유하되 그 이상의 정보는 감춰지기를 원한다. 우리는 Kissner와 Song의 다항식 덧셈에 의한 교집합 계산 방법에 상당히 신뢰할 수 있는 제3자(Semi-Trusted Third Party)를 도입하여, 보다 효율적으로 Private Matching을 구할 수 있는 방법을 제안한다. 또한, STTP의 저장능력을 활용할 경우 프로토콜을 다시 시작하지 않고도 Private Matching을 갱신할 수 있는 방법을 제공한다.

  • PDF

Vehicle Routing Problem with Time Windows considering Outsourcing Vehicles (외주차량을 고려한 시간제약이 있는 차량경로문제에 대한 연구)

  • Seong, June;Moon, Il-Kyeong
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.32 no.2
    • /
    • pp.91-97
    • /
    • 2006
  • The vehicle routing problem with time windows (VRPTW) is an important problem in third party logistics and supply chain management. We extend the VRPTW to the VRPTW with overtime and outsourcing vehicles (VRPTWOV) which allows the overtime of drivers and the possibility of using outsourcing vehicles. This problem can be applied to third party logistics companies for managing central distributor-local distributors, local distributor-retailers (or customers), and a manufacturer. We develop a mixed integer programming model and a genetic algorithm. Computational results demonstrate the efficiency of the developed genetic algorithm. We also develop a decision support system based on this genetic algorithm.

Determinants of Online Price Sensitivity Using Web Log Data (웹 로그 데이터를 이용한 온라인 소비자의 가격민감도 영향 요인에 관한 연구)

  • Jun Jong-Kun;Park Cheol
    • Journal of Information Technology Applications and Management
    • /
    • v.13 no.1
    • /
    • pp.1-16
    • /
    • 2006
  • This paper empirically analyzed consumer price search behavior using Web log data of a Korean web site for price comparison. Consumer click-stream data of the site was used to test the effects of price level, product category, third party certification, reputation of retailers on click behavior. According to the descriptive statistics, 67.4% of shopbot users clicked the offer which was the lowest price returned in a search. We found that third party certification and reputation of retailers were significant determinants of clicking the lowest priced offer from legit analysis. We also applied Tobit regression analysis to estimate the price premium of the two determinants, but only reputation of retailers was found to have price premium of 4.9%.

  • PDF

A Study on 3D Third Party Program for Quick Development of New Product (신속한 신제품개발을 위한 3D Third Parth Program 개발에 관한 연구)

  • 한찬희;이창호
    • Journal of the Korea Safety Management & Science
    • /
    • v.5 no.4
    • /
    • pp.257-266
    • /
    • 2003
  • 3D Modeling Solution can reduce projecting error and also make possible to design visually, so that it can minimize human resources. On the other hand, it has defects of operating difficulties caused by too much complex function, thus it consequently prevent user from prompt handling. According to this paper, the developed party S/W will help that user can construct the parts easily, can let everybody use 3D modeling solution readily, and make fast development of new product. This software will carry out prompt development of new product and derive satisfaction of customers from high quality. Also, saving time and expense naturally raise competitive power in consequence.

Anonymized Network Monitoring for Intrusion Detection Systems

  • Srinivas, DB;Mohan, Sagar
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.191-198
    • /
    • 2022
  • With the ever-increasing frequency of public sector and smalls-cale industries going live on the internet in developing countries, their security of which, while crucial, is often overlooked in most cases. This is especially true in Government services, whilst essential, are poorly monitored if at all. This is due to lack of funds and personnel. Most available software which can help these organizations monitor their services are either expensive or very outdated. Thus, there is a need for any developing country to develop a networking monitoring system. However, developing a network monitoring system is still a challenge and expensive and out sourcing network monitoring system to third party is a security threat. Therefore, in this article we propose a method to anonymize network logs and outsource networking monitoring system to third-party without breach in integrity of their network logs.

Blockchain and Cryptocurrency Distributed Testing Methods

  • Lee, Taegyu
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.1-9
    • /
    • 2022
  • Recently, a large number of cryptocurrencies and block chains have been continuously released. However, these cryptocurrencies and block chains are open to users without authorized verification and testing procedures, causing various reliability problems. Existing cryptocurrencies and blockchain test methods build a blockchain Testnet for a certain period of time by the developer without external verification by a third party, and after repeatedly self-testing and self-operating processes, commercialization is in progress by switching to the Mainnet. This self-verification method does not guarantee objectivity and publicness, and high reliability of customers cannot be realized. This study proposes a cryptocurrency and blockchain test interface and test control system as a third-party open test method.

A BGP based Distributed Mapping System for Id/Loc split (Id/Loc split 를 위한 BGP 기반 매핑 시스템)

  • Angel, Mukankunga Bisamaza;Hong, Choong Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1050-1052
    • /
    • 2010
  • Locator and Identifier Split is considered as the solution to the scalability problem Internet is facing today. The separation approach of Locator and Identifier requires a third party called mapping system. The mapping system enables the inter-domain routing between two different edge networks. The design of this third party has generated many proposals, among them one approach use Border Gateway Protocol (BGP) for effective mapping information updates distribution. In this paper, we take advantage of this approach by considering the scalability in term of mapping information storage. Our goal is to provide scalability in term of mapping information storage as well as effective mapping information updates distribution.

An Overview of Data Security Algorithms in Cloud Computing

  • D. I. George Amalarethinam;S. Edel Josephine Rajakumari
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.65-72
    • /
    • 2023
  • Cloud Computing is one of the current research areas in computer science. Recently, Cloud is the buzz word used everywhere in IT industries; It introduced the notion of 'pay as you use' and revolutionized developments in IT. The rapid growth of modernized cloud computing leads to 24×7 accessing of e-resources from anywhere at any time. It offers storage as a service where users' data can be stored on a cloud which is managed by a third party who is called Cloud Service Provider (CSP). Since users' data are managed by a third party, it must be encrypted ensuring confidentiality and privacy of the data. There are different types of cryptographic algorithms used for cloud security; in this article, the algorithms and their security measures are discussed.

Development of Loss Model Based on Quantitative Risk Analysis of Infrastructure Construction Project: Focusing on Bridge Construction Project (인프라건설 프로젝트 리스크 분석에 따른 손실 정량화 모델 개발 연구: 교량프로젝트를 중심으로)

  • Oh, Gyu-Ho;Ahn, Sungjin
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2022.04a
    • /
    • pp.208-209
    • /
    • 2022
  • This study aims to analyze the risk factors caused by object damage and third-party damage loss in actual bridge construction based on past insurance premium payment data from major domestic insurers for bridge construction projects, and develop a quantitative loss prediction model. For the development of quantitative bridge construction loss model, the dependent variable was selected as the loss ratio, and the independent variable adopted 1) Technical factors: superstructure type, foundation type, construction method, and bridge length 2) Natural hazards: flood anf Typhoon, 3) Project information: total construction duration, total cost and ranking. Among the selected independent variables, superstructure type, construction method, and project period were shown to affect the ratio of bridge construction losses, while superstructure, foundation, flood and ranking were shown to affect the ratio of the third-party losses.

  • PDF

Determining the Impact of Information Technology (IT) on Achieving competitive advantages in Third party logistics Companies (3PL): ISACO and SAIPALogistics

  • Javanmard, Habibollah;Ahmadi, Kourosh
    • The Journal of Economics, Marketing and Management
    • /
    • v.3 no.1
    • /
    • pp.1-22
    • /
    • 2015
  • High growth and increasing traffic and transport finished vehicles, a significant impact on how organize the flow of parts to auto makers an dagencies have As a result, the automakers to improve its position as a highly responsive, with minimal costs, the out sourcing of their logistics processes. This paperis the result of field research to determine the effectiveness of the logistics industry in Iran and focuses on information technology deals the transport vehicle and parts sales deals, indicators used in the model include: IT focuses, IT Valence, IT Competency, IT Managerial Commitment, IT Resource Commitment and competitive advantage identified. Data collected by questionnaires from managers and experts have been towing companies ISACO and SAIPA trailer hypotheses using structural equation methods and software has been analyzed Amos, Results show, focusing on information technology now has significant impacts on logistics and transport. As a result the impact of, IT valence, IT competency and IT Managerial Commitment analytics to gain competitive advantage was not approved, but the rest of the factors were confirmed.