• Title/Summary/Keyword: USER MANAGEMENT

Search Result 6,203, Processing Time 0.033 seconds

Data Firewall: A TPM-based Security Framework for Protecting Data in Thick Client Mobile Environment

  • Park, Woo-Ram;Park, Chan-Ik
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.4
    • /
    • pp.331-337
    • /
    • 2011
  • Recently, Virtual Desktop Infrastructure (VDI) has been widely adopted to ensure secure protection of enterprise data and provide users with a centrally managed execution environment. However, user experiences may be restricted due to the limited functionalities of thin clients in VDI. If thick client devices like laptops are used, then data leakage may be possible due to malicious software installed in thick client mobile devices. In this paper, we present Data Firewall, a security framework to manage and protect security-sensitive data in thick client mobile devices. Data Firewall consists of three components: Virtual Machine (VM) image management, client VM integrity attestation, and key management for Protected Storage. There are two types of execution VMs managed by Data Firewall: Normal VM and Secure VM. In Normal VM, a user can execute any applications installed in the laptop in the same manner as before. A user can access security-sensitive data only in the Secure VM, for which the integrity should be checked prior to access being granted. All the security-sensitive data are stored in the space called Protected Storage for which the access keys are managed by Data Firewall. Key management and exchange between client and server are handled via Trusted Platform Module (TPM) in the framework. We have analyzed the security characteristics and built a prototype to show the performance overhead of the proposed framework.

Requirement-Oriented Entity Relationship Modeling

  • Lee, Sang-Won;Shin, Kyung-Shik
    • Journal of Information Technology Applications and Management
    • /
    • v.17 no.3
    • /
    • pp.1-24
    • /
    • 2010
  • Most of enterprises depend on a data modeler during developing their management information systems. In formulating business requirements for information systems, they widely and naturally use the interview method between a data modeler and a field worker. But, the discrepancy between both parties would certainly cause information loss and distortion that lead to let the systems not faithful to real business works. To improve or avoid modeler-dependant data modeling process, many automated data design CASE tools have been introduced. However, since most of traditional CASE tools just support drawing works for conceptual data design, a data modeler could not generate an ERD faithful to real business works and a user could not use them without any knowledge on database. Although some CASE tools supported conceptual data design, they still required too much preliminary database knowledge for a user. Against these traditional CASE tools, we proposed a Requirement-Oriented Entity Relationship Model for automated data design tool, called ROERM. Based on Non-Stop Methodology, ROERM adopts inner systematic modules for complete and sound ERD that is faithful to real field works, where modules are composed of interaction modules with a user, rules of schema operations and sentence translations. In addition to structure design of ROERM, we also devise detailed algorithms and perform an experiment for a case study.

  • PDF

Software-based Quality Measurement of Mobile VoIP Services (소프트웨어 기반 모바일 VoIP 서비스 품질 측정)

  • Kim, Beom-Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.1
    • /
    • pp.55-60
    • /
    • 2011
  • The mobile internet telephony service rapidly grows according to the extending deployment of smartphones. Unlike telephony service over a conventional public switched telephone network (PSTN) or mobile network, internet telephony service cannot guarantee its service quality, which can be severer in a wireless environment. Therefore, a more strict and systematic quality management is required for successful settlement and popularization of mobile internet telephony service. Existing quality management scheme using a specific measurement equipment cannot measure all the time so that it performs late management. In order to overcome the problem, this paper develops a software that can be equipped on a user terminal and measures the service quality all the time. By using the developed software, all-time and user-activating service quality monitoring can be supported.

Handover Management Based on Loca-tion Based Services in F-HMIPv6 Net-works

  • Nashaat, Heba;Rizk, Rawya
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.5028-5057
    • /
    • 2015
  • In this paper, a new mathematical scheme of Macro Handover Management (MHM) in F-HMIPv6 networks based on Location Based Services (LBS) is proposed. Previous schemes based on F-HMIPv6 protocol usually suffer from three major drawbacks: First, They don't exploit the information about the user mobility behavior in order to reduce handover effects. Second, they only focus on the micro mobility level. Third, they don't consider the quality of service (QoS) of the traffic. The proposed MHM scheme avoids these drawbacks using the available information about Mobile Node (MN) such as user mobility patterns and MN's velocity to predict handover and improve network's QoS. It also takes the traffic type in consideration since it presents a major factor in locating QoS for the user. MHM is analyzed and compared with the F-HMIPv6. The results show that MHM improves the performance in terms of packet delivery cost, location update cost, and handover latency. The design of MHM comprises software package in the MN in addition to a hardware part in the network side. It has implications for communication, design, and pricing of mobile services.

A Mobile App Strategy: An Empirical Study on the Effect of the Mobile Shopping App Usage (모바일 애플리케이션 전략: 모바일 쇼핑 앱 사용 효과 실증 연구)

  • Choe, Jin Seon;Kim, Seung Hyun
    • Knowledge Management Research
    • /
    • v.20 no.4
    • /
    • pp.169-183
    • /
    • 2019
  • The growth of mobile commerce (m-commerce) has been accelerated around the world. Why do e-retailers have to put a great deal of effort for the distribution of their mobile apps? The literature has paid little attention to the influence of the introduction of an e-commerce app on shopping behaviors of consumers. By analyzing the dataset of 2,342 users in Korea, this study aims to broaden our understanding of mobile shopping app usage across competing e-retailers and different channels. We found that a user's prior usage of a specific e-commerce mobile app increases her subsequent usage of its website through a mobile web browser. Thus, mobile apps do not cannibalize the mobile web channel, and there could be a complementary relationship. We also found that a user's usage of competitors' apps is positively associated with her subsequent usage of a specific e-commerce app. Because many consumers search products and compare prices across multiple e-retailers, having a mobile app helps an e-retailer be exposed to more potential consumers. This study is among the first to study the role of mobile apps in e-commerce by showing the dynamics of cross-channel and cross-vendor usage by a user.

A Genetic Algorithm for Trip Distribution and Traffic Assignment from Traffic Counts in a Stochastic User Equilibrium

  • Sung, Ki-Seok;Rakha, Hesham
    • Management Science and Financial Engineering
    • /
    • v.15 no.1
    • /
    • pp.51-69
    • /
    • 2009
  • A network model and a Genetic Algorithm (GA) is proposed to solve the simultaneous estimation of the trip distribution and traffic assignment from traffic counts in the congested networks in a logit-based Stochastic User Equilibrium (SUE). The model is formulated as a problem of minimizing a non-linear objective function with the linear constraints. In the model, the flow-conservation constraints are utilized to restrict the solution space and to force the link flows become consistent to the traffic counts. The objective of the model is to minimize the discrepancies between two sets of link flows. One is the set of link flows satisfying the constraints of flow-conservation, trip production from origin, trip attraction to destination and traffic counts at observed links. The other is the set of link flows those are estimated through the trip distribution and traffic assignment using the path flow estimator in the logit-based SUE. In the proposed GA, a chromosome is defined as a real vector representing a set of Origin-Destination Matrix (ODM), link flows and route-choice dispersion coefficient. Each chromosome is evaluated by the corresponding discrepancies. The population of the chromosome is evolved by the concurrent simplex crossover and random mutation. To maintain the feasibility of solutions, a bounded vector shipment technique is used during the crossover and mutation.

Fast Tap-N-Drag (FTND) : Enhancing Panning for Web Browsing on Small Screen Devices Considering Panning Ratio and Direction (작은 화면에서의 인터넷 작업을 위한 효율적인 화면이동방법 제안 및 사용성 평가)

  • Choi, Eun-Jung;Kwon, Sung-Hyuk;Chung, Min-K.
    • IE interfaces
    • /
    • v.22 no.4
    • /
    • pp.347-358
    • /
    • 2009
  • Panning tasks caused by both a small screen and the lower resolution of handheld devices are known to decrease the usability of a mobile internet service. To solve this problem, we proposed FTND, an improved version of Tap-N-Drag widely used in various mobile web browsers. 30 participants performed the panning tasks with FTND embedded in combinations of 2 panning directions of Push Background user interface and Push Viewpoint user interface and 5 panning ratios of 100% (a panning ratio of Tap- N-Drag), 300%, 500%, 700%, and 900%. The usability of FTND was assessed by an objective performance and a subjective preference. The objective performance was measured by a task completion time, the number of clicks, and the number of pixels. The subjective preference was measured by satisfaction, accuracy and ease of use. Push Viewpoint user interface at the panning ratios of 300%, 500%, and 700% proved to be the most efficient way for panning tasks with small handheld devices when performing the task by using the right hand thumb.

The Integrated Identification Number Checking and Key Management Protocol with Certificates (인증서를 이용한 개인식별번호 확인 및 키분배 통합 프로토콜)

  • Kim Sung Duk;Jung Jae Dong;Won Dong Ho
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.317-322
    • /
    • 2005
  • The existing certificate based authentication or identification just verifies whether the owner of private key corresponding to public key of certificate is the DN user set in the user field in the certificate or not, then we cannot find out who is the actual private key owner in a real world. To make up for this weak points, the method to insert the identification number like the resident registration number into the certificate extension field is applied as a technical standard to current domestic PKI system. In this paper, we propose the ECC based integrated identification, identification number checking and key management protocol providing user validation during the login.

An Effect of SNS Performance and Arts Information Service Quality on Initial Trust and Prosumer Activity: Focusing on Dance Performance (SNS 공연예술 정보서비스품질이 초기신뢰와 프로슈머 활동에 미치는 영향: 무용공연을 중심으로)

  • Park, Sun-Woo;Cho, Chul-Ho
    • Journal of Korean Society for Quality Management
    • /
    • v.44 no.1
    • /
    • pp.199-214
    • /
    • 2016
  • Purpose: The present study was designed to examine the casual relationships among performance and arts information service quality, initial trust, user satisfaction, reuse intention and prosumer activity in social network service(SNS). Also, we intended to explore significant factors on use performance of SNS through causal model analysis in the viewpoint of total effect. Methods: As a survey tool, questionnaire has obtained validity and reliability through literature survey, exploratory survey and pretest and sample 403 was selected. For statistical treatment of pretest and main analysis, SPSS18.0 and AMOS18.0 were employed and structural equation model was employed as analysis method. Results: Result of this study shows as follows. Two factors (precision and reciprocal action) have an effect on user satisfaction, initial trust, reuse intention and prosumer activity. We found that with an importance of initial trust, prosumer activity can be a useful and significant factor in causal relationship of SNS. Conclusion: The present study shows that two factors(precision and reciprocal action) in via of initial trust, were important factors that related companies have to emphasize to raise performance, And also we confirmed new factor 'prosumer activity' through this study. However, the present study has some limitations to be studied in the future.

Timestamp Analysis of Windows File Systems by File Manipulation Operations (파일 조작에 따른 파일 시간 변화 분석)

  • Bang, Je-Wan;Yoo, Byeong-Yeong;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.3
    • /
    • pp.79-91
    • /
    • 2010
  • In digital forensics, the creation time, last modified time, and last accessed time of a file or folder are important factors that can indicate events that have affected a computer system. The form of the time information varies with the file system, depending on the user's actions such as copy, transfer, or network transport of files. Specific changes of the time information may be of considerable help in analyzing the user's actions in the computer system. This paper analyzes changes in the time information of files and folders for different operations of the NTFS and attempts to reconstruct the user's actions.