• Title/Summary/Keyword: information provider

Search Result 1,246, Processing Time 0.027 seconds

An MPLS VPN with Mobility Support (이동성을 지원하는 MPLS 방식 가상사설망)

  • Lee, Young-Seok;Choi, Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.12C
    • /
    • pp.225-232
    • /
    • 2001
  • In this paper, we describe a mechanism that supports the mobility service for VPN(Virtual Private Network) users on MPLS(Multiprotocol Label Switching) network. The MPLS VPN considered in this study is controlled by CE(Customer Edge) routers. In such a VPN, CE routers have additional functions to support mobile VPN users, i.e., Home Agent function, foreign Agent function, Correspondent Agent function. This mechanism is applied when a VPN node moves to other site of the saute VPN, or when it moves to other site of a different VPN, or to a non-VPN site. We perform a simulation study to compare the performance of CE based MPLS VPN with that of PE(Provider Edge) based MPLS VPN with mobility support.

  • PDF

Per-transaction Shared Key Scheme to Improve Security on Smart Payment System

  • Ahmad, Fawad;Jung, Younchan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.1
    • /
    • pp.7-18
    • /
    • 2016
  • Several authentication methods have been developed to make use of tokens in the mobile networks and smart payment systems. Token used in smart payment system is genearated in place of Primary Account Number. The use of token in each payment transaction is advantageous because the token authentication prevents enemy from intercepting credit card number over the network. Existing token authentication methods work together with the cryptogram, which is computed using the shared key that is provisioned by the token service provider. Long lifetime and repeated use of shared key cause potential brawback related to its vulnerability against the brute-force attack. This paper proposes a per-transaction shared key mechanism, where the per-transaction key is agreed between the mobile device and token service provider for each smart payment transaction. From server viewpoint, per-transaction key list is easy to handle because the per-transaction key has short lifetime below a couple of seconds and the server does not need to maintain the state for the mobile device. We analyze the optimum size of the per-transaction shared key which satisfy the requirements for transaction latency and security strength for secure payment transactions.

The Study of User Resistance to Fintech Payment Service: In the Perspective of Innovation Diffusion And Status Quo Bias Theory (핀테크 지급결제 서비스 수용 저항요인 연구 : 혁신저항이론과 현상유지편향이론을 중심으로)

  • Hwang, Sin-Hae;Kim, Jeoung-Kun
    • The Journal of Information Systems
    • /
    • v.27 no.1
    • /
    • pp.133-151
    • /
    • 2018
  • Purpose Global fintech industry is proliferating. Although domestic investment in fintech service is also increasing fast, user acceptance of fintech payment service seems slower than expected. Previous fintech literature mainly focuses on overall characteristics and technical aspects of fintech including security issues and explores factors affecting the service adoption. This study aims to examine crucial factors affecting user's resistance intention to fintech payment service adoption. The research model was formulated based on innovation diffusion theory and status quo bias theory and validated empirically. Design/methodology/approach The proposed research model was empirically validated with 149 responses from college students who have used fintech payment service. The component-based SEM was employed for data analysis. Findings The significant findings are as follow. First, compatibility has significant negative effect and complexity, and perceived risk has a positive effect on user resistance. Second, institutional trust does not show a significant effect on user resistance but has an indirect effect through the mediation of trust in service provider. Finally, trust in service provider shows the significant negative effect on user resistance.

The Impacts of Perceived Usefulness, Ease of Use, Reputation, and Usage Fee of the Internet Entertainment Service on the Use of the Service (인터넷 오락 서비스의 유용성, 용이성, 명성, 그리고 유료화가 그 서비스 사용에 미치는 영향)

  • Kim, Chy-Heon;Kim, Joon-S.
    • Asia pacific journal of information systems
    • /
    • v.13 no.3
    • /
    • pp.85-106
    • /
    • 2003
  • Recently, firms which have offered a "free Internet service" to their customers, are considering a "charged Internet service" for increasing a company's profit. But they have doubts about the results, because consumers may fly away from their web-site easily and may discontinue using their services. The purpose of this study is to investigate which factors make consumers use the charged Internet services. To do this, the factors, which are ease of using the service, usefulness of the service, the reputation of the service provider, service cost, and the intention to use the service as a mediator, are analyzed. To achieve this research objective, a structural equation model was constructed and a field study method was used. The findings are summarized as follows: First, ease of using the service, usefulness of the service, and service cost have significant impacts on the charged Internet service usage through the intention to use. Especially, although service cost influences on the service usage largely, the usefulness of the service has a bigger impact on the charged Internet service usage than service cost. Second, the reputation of the service provider does not have any impact on the service usage. Third, consumers using only the free Internet service tend to hesitate about using the "charged Internet service" because they doubt its ease of use and usefulness in spite of the service cost.

Developing the Performance Program for fast analyzing PCS Cell (PCS 기지국의 빠른 성능분석을 위한 분석 프로그램 개발)

  • 김창덕;장종욱
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.182-186
    • /
    • 2002
  • According to the increasing of mobile phone users, its service also has been increasing to satisfy their needs. Now wireless service providers have been investing a lot of man-power and efforts on the quality of service. So I developed 'worst cells program' which help to maintain the systems effectively by analyzing and administrating them. It has made for performance analyzing which can predict system damages and handle it in advance by measuring and administrating 'establishment rate' and 'dropped call rate'of cells. It'll help system providers(vendors) and service providers to enhance their impression and reliability to their customers.

  • PDF

Private Blockchain and Smart Contract Based High Trustiness Crowdsensing Incentive Mechanism (프라이빗 블록체인 및 스마트 컨트랙트 기반 고신뢰도 크라우드센싱 보상 메커니즘)

  • Yun, Jun-hyeok;Kim, Mi-hui
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.999-1007
    • /
    • 2018
  • To implement crowdsensing system in reality, trustiness between service provider server and user is necessary. Service provider server could manipulate the evaluation of sensing data to reduce incentive. Moreover, user could send a fake sensing data to get unjust incentive. In this paper, we adopt private blockchain on crowdsensing system, and thus paid incentives and sent data are unmodifiablely recorded. It makes server and users act as watcher of each others. Through adopting smart contract, our system automates sensing data evaluation and opens to users how it works. Finally, we show the feasibility of proposing system with performance evaluation and comparison with other systems.

A Study on Methodology for Strategy Development of ASP Service: A Case Study of Small Company Informatization (ASP 서비스의 전략개발방법론에 관한 연구: 기업 네트워크화 사례)

  • Hong, Jong-Yi;Lee, Yun-Mi;Suh, Eui-Ho
    • Asia pacific journal of information systems
    • /
    • v.16 no.3
    • /
    • pp.177-192
    • /
    • 2006
  • Following the idea of "what you measure is what you get," this paper discusses the necessity to improve the plan and management of Application Service Provider (ASP) service based on performance evaluation. The Balanced Scorecard (BSC) has been used as a tool for suggesting the measures that can evaluate performance of a company by considering both financial and non-financial perspectives. The current BSC does not provide techniques to formally define, verify, implement and analyze the performance measures of ASP. Therefore, we developed a methodology for strategy development of ASP service by analyzing the BSC performance measures. This methodology provides a strategy for improving ASP service. The methodology proposed in this paper provide executives with core parts for achieving vision as well as the corresponding interpretation model for developing strategy. The methodology consists of the following two phases: BSC and Importance-Performance Analysis (IPA) phase. The methodology is illustrated through a case study in each phase. The case study shows practical deployment of our methodology.

Multi-homing in Heterogeneous Wireless Access Networks: A Stackelberg Game for Pricing

  • Lee, Joohyung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.5
    • /
    • pp.1973-1991
    • /
    • 2018
  • Multimedia applications over wireless networks have been evolving to augmented reality or virtual reality services. However, a rich data size compared to conventional multimedia services causes bandwidth bottlenecks over wireless networks, which is one of the main reasons why those applications are not used widely. To overcome this limitation, bandwidth aggregation techniques, which exploit a multi-path transmission, have been considered to maximize link utilization. Currently, most of the conventional researches have been focusing on the user end problems to improve the quality of service (QoS) through optimal load distribution. In this paper, we address the joint pricing and load distribution problem for multi-homing in heterogeneous wireless access networks (ANs), considering the interests of both the users and the service providers. Specifically, we consider profit from resource allocation and cost of power consumption expenditure for operation as an utility of each service provider. Here, users decide how much to request the resource and how to split the resource over heterogeneous wireless ANs to minimize their cost while supporting the required QoS. Then, service providers compete with each other by setting the price to maximize their utilities over user reactions. We study the behaviors of users and service providers by analyzing their hierarchical decision-making process as a multileader-, multifollower Stackelberg game. We show that both the user and service provider strategies are closed form solutions. Finally, we discuss how the proposed scheme is well converged to equilibrium points.

CLIAM: Cloud Infrastructure Abnormal Monitoring using Machine Learning

  • Choi, Sang-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.4
    • /
    • pp.105-112
    • /
    • 2020
  • In the fourth industrial revolution represented by hyper-connected and intelligence, cloud computing is drawing attention as a technology to realize big data and artificial intelligence technologies. The proliferation of cloud computing has also increased the number of threats. In this paper, we propose one way to effectively monitor to the resources assigned to clients by the IaaS service provider. The method we propose in this paper is to model the use of resources allocated to cloud systems using ARIMA algorithm, and it identifies abnormal situations through the use and trend analysis. Through experiments, we have verified that the client service provider can effectively monitor using the proposed method within the minimum amount of access to the client systems.

Measurement of Remediation for Compromised User Account of Web Single Sign-On (SSO) (침해된 웹 SSO 계정 보호를 위한 보안 조치 실험 연구)

  • Nam, Ji-Hyun;Choi, Hyoung-Kee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.941-950
    • /
    • 2021
  • Single Sign-On (SSO) service manages user's account passwords from multiple websites so that security in a high level is required. Users who use the SSO service are authenticated through the Identity Provider (IdP) when logging into the website. We present the security requirements that IdP can take in order to minimize the user's risk whose IdP account is compromised. We describe the security threats that arise when the security requirements are not satisfied. Through evaluation, we prove that the attacker's session cannot be canceled even if the user recognizes the attack if the IdP does not satisfy the security requirements.