• Title/Summary/Keyword: privilege

Search Result 200, Processing Time 0.024 seconds

A SURVEY ON AMERICAN OPTIONS: OLD APPROACHES AND NEW TRENDS

  • Ahn, Se-Ryoong;Bae, Hyeong-Ohk;Koo, Hyeng-Keun;Lee, Ki-Jung
    • Bulletin of the Korean Mathematical Society
    • /
    • v.48 no.4
    • /
    • pp.791-812
    • /
    • 2011
  • This is a survey on American options. An American option allows its owner the privilege of early exercise, whereas a European option can be exercised only at expiration. Because of this early exercise privilege American option pricing involves an optimal stopping problem; the price of an American option is given as a free boundary value problem associated with a Black-Scholes type partial differential equation. Up until now there is no simple closed-form solution to the problem, but there have been a variety of approaches which contribute to the understanding of the properties of the price and the early exercise boundary. These approaches typically provide numerical or approximate analytic methods to find the price and the boundary. Topics included in this survey are early approaches(trees, finite difference schemes, and quasi-analytic methods), an analytic method of lines and randomization, a homotopy method, analytic approximation of early exercise boundaries, Monte Carlo methods, and relatively recent topics such as model uncertainty, backward stochastic differential equations, and real options. We also provide open problems whose answers are expected to contribute to American option pricing.

Role Graph Security Management Model based on Lattice (격자기반 역할그래프 보안 관리 모델)

  • Choi, Eun-Bok;Park, Ju-Gi;Kim, Jae-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.7 no.5
    • /
    • pp.109-121
    • /
    • 2006
  • In this paper, we suggest lattice based role graph security management model which changes security level in mandatory access control model as well as constraint and role hierarchy systematically in role base access control model. In this model, we solved privilege abuse of senior role that is role graph model's problem, and when produce conflict between privileges, we can keep integrity of information by reseting grade of subject through constraint. Also, we offer strong security function by doing to be controlled by subject's security level as well as privilege inheritance by role hierarchy, Finally, we present the role graph algorithms with logic to disallow roles that contain conflicting privileges.

  • PDF

Major Legal Issues with Third Party Funding in International Investment Arbitration (국제투자중재에서 제3자 자금조달 제도의 주요 법적 쟁점)

  • Ahn, Keon-Hyung;Kim, Sung-Ryong;Joe, In-Ho
    • Journal of Arbitration Studies
    • /
    • v.23 no.2
    • /
    • pp.55-79
    • /
    • 2013
  • As arbitration becomes an increasingly popular mode of resolving disputes, neighboring industries begin to take notice. This interest is reflected in the increasing utilization of third party funding in international arbitration claims. In this regard, the third party funding industry appears particularly interested in investor-state arbitration claims because they typically involve considerable claim amounts and substantial legal fees. To examine this trend more closely, this paper, firstly, examines the investor-state arbitration more precisely in Chapter II. In Chapter III, this study continues to examine some legal issues which can arise as a result of a conflict of interest between the parties to the funding agreement including, inter alia, 1) a dispute in which the funder terminates the agreement during the arbitration proceedings, 2) a dispute in relation to a funder's intervention in arbitration proceedings, and 3) a dispute on the responsibility for adverse costs orders, if any. This paper further identifies major legal issues which can arise in relation to 1) disclosure of existence of the funding agreement, 2) attorney-client privilege. Lastly, in Chapter IV, this paper provides some lessons from an in-depth case study on third party funding agreements and solutions to avoid and to solve prospective disputes in the future.

  • PDF

Contested terrain - Conflicts between BOK(body of knowledge) of interior design and HSW(health, safety, welfare) ethos of profession - (갈등의 영역 - 실내디자인의 지식체계와 프로페션의 건강, 안전, 복지 에토스와의 갈등 -)

  • Kim, Duk-Su
    • Korean Institute of Interior Design Journal
    • /
    • v.21 no.6
    • /
    • pp.177-185
    • /
    • 2012
  • The endowed privilege to an established profession acts as an important motivation related to professionalization of occupations. The established profession enjoys cognitive, legal, and economic privilege. This study analyzes the professionalization process of interior design. Specifically, the study evaluates the suitability of the body of knowledge and professional ethos(i.e., protection of citizen's health, safety, and welfare), while analyzing the professionalization of interior design in the United States. The research aims at proposing a reference point for the professionalization of Korean interior design. Utilized data include research paper, court sentencing, and reports published by related professional organizations. The study concludes that 3E's are a means of professionalization of interior design, while separating interior design from interior decorating. In addition, there is no evidence to the protection of citizen's HSW. Rather, it increases service costs and restricts the job opportunities. When the public is not persuaded, the argument related to the necessity of license for the protecting citizen's HSW can be consumed as a mere rhetoric, concealing intentions for formulating a cartel. Thus, this study proposes that the professionalization of interior design may focus on the establishment of identity and body of knowledge, which are specific to interior design.

  • PDF

Secure Data Management based on Proxy Re-Encryption in Mobile Cloud Environment (모바일 클라우드 환경에서 안전한 프록시 재암호화 기반의 데이터 관리 방식)

  • Song, You-Jin;Do, Jeong-Min
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.4B
    • /
    • pp.288-299
    • /
    • 2012
  • To ensure data confidentiality and fine-grained access control in business environment, system model using KP-ABE(Key Policy-Attribute Based Encryption) and PRE(Proxy Re-Encryption) has been proposed recently. However, in previous study, data confidentiality has been effected by decryption right concentrated on cloud server. Also, Yu's work does not consider a access privilege management, so existing work become dangerous to collusion attack between malicious user and cloud server. To resolve this problem, we propose secure system model against collusion attack through dividing data file into header which is sent to privilege manager group and body which is sent to cloud server and prevent modification attack for proxy re-encryption key using d Secret Sharing, We construct protocol model in medical environment.

Remote Healthcare Monitoring System Using Attribute based Encryption (속성기반 암호화를 이용한 원격 헬스케어 모니터링 시스템)

  • Song, You-Jin;Do, Jeong-Min
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.63-70
    • /
    • 2012
  • To ensure privacy of individual information in remote healthcare service, health data should be protected through a secure technology such as encryption scheme. Only user who delegated decryption right can access to sensitive health data and delegator needs capability for revocating access privilege. Recently, in ubiquitous environment, CP-ABTD(Ciphertext-Policy Attribute-Based Threshold Decryption with Flexible Delegation and Revocation of User Attributes) which extends CP-ABE(Ciphertext-Policy Attribute-Based Encryption) has been proposed for these requirements. In this paper, we construct remote healthcare monitoring system with delegation and revocation capability for attribute in CP-ABTD. Finally, we analyze collusion attack between users in our system.

Intelligent Intrusion Detection System based on Computer Immune System (컴퓨터 면역 시스템을 기반으로 한 지능형 침입탐지시스템)

  • Lee, Jong-Sung;Chae, Soo-Hoan
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.12
    • /
    • pp.3622-3633
    • /
    • 1999
  • Computer security is considered important due to tile side effect generated from the expansion of computer network and rapid increase of the use of computers. Intrusion Detection System(IDS) has been an active research area to reduce the risk from intruders. This paper discusses IDS of detecting anomaly behaviors and proposes a new intelligent IDS model, which consists of several computers with intelligent IDS, based on computer immune system. The intelligent IDSs are distributed and if any of distributed IDSs detect anomaly system call among system call sequences generated by a privilege process, the anomaly system call can be dynamically shared with other IDSs. This makes the intelligent IDSs improve the ability of immunity for new intruders.

  • PDF

Attribute Certificate Profile Research (속성인증서 프로화일 연구)

  • 윤이중;류재철
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.5
    • /
    • pp.75-84
    • /
    • 2001
  • Existent public key certificates provide authentication information through some information on user\`s public key. However, an attribute certificate which stores and manage user\`s attribute information, provides various privilege information such as position, privilege and role. In recent, international organizations establishes standards on attribute certificate, and the researches and developments on attribute certificate have been widely made. In addition it may be expected to be used many real application area requiring for authorization information as well as authentication information. Therefore, this paper considers background and standardization trends of attribute certificate and describes the profile and related techniques of attribute certificate currently established by IETF. In addition, it introduces and access control system using attribute certificate and specifies applications of attribute certificate.

SK Energy's Customer Satisfaction

  • Yeu Minsun;Lee, Doo-Hee;Kim, Jaehwan
    • Asia Marketing Journal
    • /
    • v.16 no.1
    • /
    • pp.195-214
    • /
    • 2014
  • Many oil refinery companies have been proactively carried out marketing activities to survive in highly intensified service station industry. In 2012, SK Energy ranked number one in three customer satisfaction surveys (NCSI, KCSI, and KS-SQI). SK Energy's success is in its differentiated customer satisfaction business strategy. SK Energy has been implementing various marketing activities. As a part of the activities, it issued an affinity credit card with on spot discount privilege for the first time in the oil refinery industry. SK Energy also issued EnClean bonus card for OK Cashbag points that can be used for discounts at the service stations. On top of all, SK Energy generated point value-up with '3K Exclusive Privilege' program. In addition, team 'CS 119' was formed to noticeably improve the service. 'CS 119' visited each service station, diagnosed its CS service level then provided customized field training for improvement. Long-termimplementation of 'ACE Program', a field-base CS monitoring system, regularly checked customer satisfaction level. 'ACE Program' has significantly contributed improving SK Service Station's service quality and customer satisfaction. This case reviews customer satisfaction marketing activities SK Energy carried out. The focus is on distinctive factors that distinguish SK Energy's customer satisfaction marketing activities from competitors.

  • PDF

Understanding the Watchdog Concept in South Korea: Focused on the Media as Watchdog (언론의 파수견 개념의 발전과 적용: 한국 판례분석을 중심으로)

  • Lee, Jae-Jin
    • Korean journal of communication and information
    • /
    • v.41
    • /
    • pp.108-144
    • /
    • 2008
  • This study examines how the watchdog concert in journalism field has been created and develope4 Related studies found that the watchdog is related not so muck with free press theory as with a privilege awarded to the press because the press serves for the public interests. It was found that in the U.S., the watchdog concept was derived from the a lot of libel cases in the late 1890s. At the time, the newspaper owners and editors continuously claimed the very protection over vulnerability of newspaper's collecting, reporting, and printing news. While, in Korea, the concept of watchdog emerged in the late 1990s after the establishment of the Constitution Court. Even though the watchdog concert was accepted very late by the Korean courts, it is believed to be a kind of special privilege to prevent the press from being recklessly regulated in libel cases. Rather, the Korean courts expand the extent of the role of the press as a watchdog by deciding that not only the public officials and politicians but also other socially influential public figures could be included in the criticism from the press. However, how these court decisions can be practically implemented depends upon how the court apply the probability of the press to believe the news true and intention of malice in writing and publishing the stories.

  • PDF