• Title/Summary/Keyword: identity play

Search Result 234, Processing Time 0.029 seconds

Trustworthy Mutual Attestation Protocol for Local True Single Sign-On System: Proof of Concept and Performance Evaluation

  • Khattak, Zubair Ahmad;Manan, Jamalul-Lail Ab;Sulaiman, Suziah
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2405-2423
    • /
    • 2012
  • In a traditional Single Sign-On (SSO) scheme, the user and the Service Providers (SPs) have given their trust to the Identity Provider (IdP) or Authentication Service Provider (ASP) for the authentication and correct assertion. However, we still need a better solution for the local/native true SSO to gain user confidence, whereby the trusted entity must play the role of the ASP between distinct SPs. This technical gap has been filled by Trusted Computing (TC), where the remote attestation approach introduced by the Trusted Computing Group (TCG) is to attest whether the remote platform integrity is indeed trusted or not. In this paper, we demonstrate a Trustworthy Mutual Attestation (TMutualA) protocol as a proof of concept implementation for a local true SSO using the Integrity Measurement Architecture (IMA) with the Trusted Platform Module (TPM). In our proposed protocol, firstly, the user and SP platform integrity are checked (i.e., hardware and software integrity state verification) before allowing access to a protected resource sited at the SP and releasing a user authentication token to the SP. We evaluated the performance of the proposed TMutualA protocol, in particular, the client and server attestation time and the round trip of the mutual attestation time.

A Study of Cyberfeminism in fashion in the digital era (Part II) - Focused on aesthetic values - (디지털시대 패션에 나타난 사이버페미니즘 연구 (제2보) -미적가치를 중심으로-)

  • 김현수;양숙희
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.28 no.2
    • /
    • pp.200-211
    • /
    • 2004
  • The Purpose of this study was to review the effects of the cyberspace mentality on fashion as a visible symbol of feminity and to analyze terms of its aesthetic values. As for the research methodology, relevant theories across cultures and disciplines are reviewed and an experimental study is conducted to explore spiritual objectives in cyberspace. Then, major issues facing the digital society. symbolized in the computer networks, are reviewed in terms of feminine identity and physical beauty from a feminist's viewpoint. Lastly, the aesthetic values found in the spatial meditation of a new dimension (reality versus virtuality) is comparatively analyzed. The virual reality technology and bio-medical technology are combined to be represented in fashion to create a more realistic virtual world than the real one. Such a world may well be characterized by virtuality, artificiality, masquerade, and fantasy. The intrinsic values which are revealed as psychiatrical or psychological implicated values featuring virtual or artificial implications may well be characterized by distopia, hyper, hybridity and Sur Reality.

A Study on the Qualitative Evaluation for the Program of Clinical Social Welfare Setting : Focused on Utilizing of Phenomenological Self-Evaluation Method (사회복지조직에서의 프로그램 질적 평가 연구 : 현상학적 자기평가의 활용을 중심으로)

  • Choi, Jong-Hyug
    • Korean Journal of Social Welfare
    • /
    • v.47
    • /
    • pp.334-368
    • /
    • 2001
  • The purpose of this study is to apply to the phenomenological self-evaluation method in the social welfare agency. It means that the phenomenological self-evaluation method accepts "the reality" which occurs in the social welfare setting, and functions for the social worker to play dual role of practitioner-evaluator. This paper examines two dimensions of social work evaluation theory and practice. Firstly, this study is to investigate a trend of evaluation in social work setting, and seeks theoretical aspect of phenomenological self-evaluation method, with emphasis on the strength and limit of the positivism evaluation methods. Although qualitative evaluation was suggested to make an alternative to the positivism by qualitative researchers, they did not suggest the specific methods and roles of the practitioner-evaluator. In this study, two directions of the phenomenological self-evaluation method are suggested to overcome the limitations. which are "environment-relation self-evaluation" and "program-oriented self-evaluation". Secondly, the result of phenomenological self-evaluation studies for the social welfare community center program and organization in kangnam district from June, 1994 (Program-oriented self-evaluation) to march, 2000 (Environment-relation self-evaluation) are presented. the phenomenological self-evaluation study showed the expected outcome such as; reflective self-training, making a practice knowledge, enhancing service quality, and reinforcing the identity of social welfare profession.

  • PDF

A Study on the Interior Design of Hotel Design through Brand Marketing Collaboration (브랜드 콜라보레이션 마케팅을 통한 디자인호텔의 실내디자인에 관한 연구)

  • Park, Si-Yoon;Kim, Jeong-Ah
    • Korean Institute of Interior Design Journal
    • /
    • v.23 no.4
    • /
    • pp.52-62
    • /
    • 2014
  • The rapid growth of economy improves not only the life quality of people in this modern society but also standards of value in connection with how those people would spend money as they engage in various leisure and cultural activities. That being the case, hotels are currently changing into places of new concepts depending on those new lifestyles of these people, and in those new places, people can entertain and experience as enjoying cultures. The marketing collaboration of the hotels with brands can be used as a more inclusive way to enhance brand images. In addition, as having infinite possibilities of the collaboration's being able to create a new-concept space with an identity of a brand included, this collaboration makes it possible for the design hotels to decorate their interior spaces differently from those of other hotels. In the light of that, the brand collaboration is basically divided into three groups which are the fashion collaboration, the technique collaboration and the designer collaboration, and the brand collaboration is also able to express the interior spaces of the design hotels as working on those six components, such as reproduction, events, alteration, messages, culture and image. After all, through the brand collaboration marketing, this thesis expects an interior design of a new-concept design hotel which would play a role as a complex cultural space.

Tmp21, a novel MHC-I interacting protein, preferentially binds to β2-microglobulin-free MHC-I heavy chains

  • Jun, Young-Soo;Ahn, Kwang-Seog
    • BMB Reports
    • /
    • v.44 no.6
    • /
    • pp.369-374
    • /
    • 2011
  • MHC-I molecules play a critical role in immune surveillance against viruses by presenting peptides to cytotoxic T lymphocytes. Although the mechanisms by which MHC-I molecules assemble and acquire peptides in the ER are well characterized, how MHC-I molecules traffic to the cell surface remains poorly understood. To identify novel proteins that regulate the intracellular transport of MHC-I molecules, MHC-I-interacting proteins were isolated by affinity purification, and their identity was determined by mass spectrometry. Among the identified MHC-I-associated proteins was Tmp21, the human ortholog of yeast Emp24p, which mediates the ER-Golgi trafficking of a subset of proteins. Here, we show that Tmp21 binds to human classical and non-classical MHC-I molecules. The Tmp21-MHC-I complex lacks ${\beta}_2$-microglobulin, and the number of the complexes is increased when free MHC-I heavy chains are more abundant. Taken together, these results suggest that Tmp21 is a novel protein that preferentially binds to ${\beta}_2$-microglobulin-free MHC-I heavy chains.

Hydrologic Response Estimation Using Mallows' $C_L$ Statistics (Mallows의 $C_L$ 통계량을 이용한 수문응답 추정)

  • Seong, Gi-Won;Sim, Myeong-Pil
    • Journal of Korea Water Resources Association
    • /
    • v.32 no.4
    • /
    • pp.437-445
    • /
    • 1999
  • The present paper describes the problem of hydrologic response estimation using non-parametric ridge regression method. The method adapted in this work is based on the minimization of the $C_L$ statistics, which is an estimate of the mean square prediction error. For this method, effects of using both the identity matrix and the Laplacian matrix were considered. In addition, we evaluated methods for estimating the error variance of the impulse response. As a result of analyzing synthetic and real data, a good estimation was made when the Laplacian matrix for the weighting matrix and the bias corrected estimate for the error variance were used. The method and procedure presented in present paper will play a robust and effective role on separating hydrologic response.

  • PDF

Analysis of Project Management Firms' Characteristics in BTL Projects (BTL사업 PM사의 특성 분석 연구)

  • Lee, Hyun-Ki;Kim, Han-Soo
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2007.11a
    • /
    • pp.230-233
    • /
    • 2007
  • As a new form of the public procurement method, that is BTL(Build-Transfer-Lease) was introduced in 2005, it has consequently created a new form of emerging business, so called BTL Project Management firms. As a key participant of BTL projects, PM firms play an important role in securing the projects. But due to the short history of BTL, the identity of BTL PM firms has not been widely understood. The objective of this paper is to investigate major characteristics of BLT PM firms for better understanding of the emerging business.

  • PDF

Tendency of Traditional Character in Korean Modern House Architecture as an Art Work (한국 근.현대 주택작품에서 나타나는 전통성 해석의 시대적 경향)

  • Jun, Nam-Il
    • Korean Institute of Interior Design Journal
    • /
    • v.19 no.1
    • /
    • pp.169-179
    • /
    • 2010
  • Since modernization period thru Japanese colonial era the modern architect began to play a important role for Korean housing architecture. So called 'House as an Art Work', detached houses by prominent architects, belong to a meaningful sector in Korean modern housing architecture. The harmony with tradition was always big issue for such works. This study aims to understand how paradigms for tradition were interpreted with the changes of the time. The analysis showed various tryout by architects, that concretize traditional characteristics in their work. For example, traditional lifestyle were clearly reflected in the floorplan during 30's and 40's. In the 70's building mass and formative roof design were emphasized to present traditional image. As well as it represented primitive esthetic and vernacular decoration. In addition, expressive tendency, that demonstrates korean sentiment through material and its texture, got a preference. Since latter half of 80's some traditional architectural elements were modernized and space characteristics were newly created from acculturation. Furthermore the philosophy of "Subdivision of building wings and Emptiness" follows this trend. This type made a courtyard and connected articulated building masses each other. "Sympathy with Nature" were most essential for a traditional houses in contrast with western architecture. Many architects today make various method to bring nature into interior space and to contemplate nature In the house. Such kinds of adaptation to tradition could be understood as a unique process to manifest identity of Korean modern houses.

A Study of Components in Form-Based Codes of Small to Mid Cities in US - Focused on Zoning Codes Including Architectural Design Elements - (미국 중소도시의 형태기반코드 구성요소에 관한 연구 - 건축계획요소를 포함한 조닝코드 사례를 중심으로 -)

  • Park, Sung-Yong;Ahn, Dong-Joon
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.34 no.4
    • /
    • pp.77-85
    • /
    • 2018
  • Rapid urbanization has fostered development of modern cities. Although Conventional zoning played its role to control urban development, it also segregated land uses and created homogeneous development pattern. Mega cities with satellite bed towns has not shown their unique identity and characters. In order to develop comprehensive approach which may bring social and physical enhancement can be difficult to achieve by considering city as a two dimensions. On contrary, extensive analysis and proposals require an approach which can perceive city with three dimensions. Form-Based Codes (FBCs) are appeared as an alternative to conventional zoning with different design process and principles. FBCs approach urban place with three dimension and giving priority to form rather than land use. The purpose of this study was to analyze the necessity of FBCs and its concept, components and how this would change urban characteristics in the aspects of architectural design through analysis on 4 case studies for zoning codes of US cities. Through comparison of components in Form-Based Codes of 4 different cases, this study can show the reasons for differences in application of Form-Based Codes and how detailed components would play a role to establish better urban environments.

A Study on the Design of Security Metrics for Source Code (소스코드의 보안성 메트릭 설계에 관한 연구)

  • Seo, Dong-Su
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.147-155
    • /
    • 2010
  • It has been widely addressed that static analysis techniques can play important role in identifying potential security vulnerability reside in source code. This paper proposes the design and application of security metrics that use both vulnerability information extracted from the static analysis, and significant factors of information that software handles. The security metrics are useful for both developers and evaluators in that the metrics help them identity source code vulnerability in early stage of development. By effectively utilizing the security metrics, evaluators can check the level of source code security, and confirm the final code depending on the characteristics of the source code and the security level of information required.