• Title/Summary/Keyword: security collaboration

Search Result 146, Processing Time 0.023 seconds

Foreign Affairs, the National Interest, and Secular-Religious Identities in Israel

  • Hamanaka, Shingo
    • Asian Journal for Public Opinion Research
    • /
    • v.3 no.4
    • /
    • pp.176-197
    • /
    • 2016
  • Despite being a key concept of International Relations theory, there is no consensus about what the national interest is. It is almost impossible for political leaders of democratic states to make a crucial decision in foreign policies when considering only the national interest without public support. Rather, we are unable to imagine the national interest without public opinion. In general, international crises galvanize people who held different opinions and unify social cleavages, such as secular-religious identities, into a nation that acts in its national interest. The author proposes a method to operationalize the key concept and describes a relationship between the national interest and religious identities in a democratic state. The selected case is the state of Israel. It is believed that Israel is a good example to think about the association between foreign affairs and political attitudes since it is characterized as a socio-religious divided society and has often waged war against Arab military forces.

Map Reduce-based P2P DBaaS Hub system

  • Jung, Yean-Woo;Lee, Jong-Yong;Jung, Kye-Dong
    • International journal of advanced smart convergence
    • /
    • v.5 no.1
    • /
    • pp.16-22
    • /
    • 2016
  • The database integration is being emphasized to one way of the companies collaboration. To database integration, companies are use like one database what their own, it can be provided more efficient service to customer. However, there exist some difficulty to database integration. that is the database security and database heterogeneity problems. In this paper, we proposed the MapReduce based p2p DBaaS hub system to solve database heterogeneity problem. The proposed system provides an environment for companies in the P2P cloud to integrate a database of each other. The proposed system uses DBaaS Hub for a collection of data in the P2P cloud, and use MapReduce for integrating the collected data.

Synergy: An Overlay Internetworking Architecture and Implementation

  • Kwon, Min-Seok;Fahmy, Sonia
    • Journal of Communications and Networks
    • /
    • v.12 no.2
    • /
    • pp.181-190
    • /
    • 2010
  • A multitude of overlay network designs for resilient routing, multicasting, quality of service, content distribution, storage, and object location have been proposed. Overlay networks offer several attractive features, including ease of deployment, flexibility, adaptivity, and an infrastructure for collaboration among hosts. In this paper, we explore cooperation among co-existing, possibly heterogeneous, overlay networks. We discuss a spectrum of cooperative forwarding and information sharing services, and investigate the associated scalability, heterogeneity, and security problems. Motivated by these services, we design Synergy, a utility-based overlay internetworking architecture that fosters overlay cooperation. Our architecture promotes fair peering relationships to achieve synergism. Results from Internet experiments with cooperative forwarding overlays indicate that our Synergy prototype improves delay, throughput, and loss performance, while maintaining the autonomy and heterogeneity of individual overlay networks.

Fast Detection of Distributed Global Scale Network Attack Symptoms and Patterns in High-speed Backbone Networks

  • Kim, Sun-Ho;Roh, Byeong-Hee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.3
    • /
    • pp.135-149
    • /
    • 2008
  • Traditional attack detection schemes based on packets or flows have very high computational complexity. And, network based anomaly detection schemes can reduce the complexity, but they have a limitation to figure out the pattern of the distributed global scale network attack. In this paper, we propose an efficient and fast method for detecting distributed global-scale network attack symptoms in high-speed backbone networks. The proposed method is implemented at the aggregate traffic level. So, our proposed scheme has much lower computational complexity, and is implemented in very high-speed backbone networks. In addition, the proposed method can detect attack patterns, such as attacks in which the target is a certain host or the backbone infrastructure itself, via collaboration of edge routers on the backbone network. The effectiveness of the proposed method are demonstrated via simulation.

How Do South Korean People View the US and Chinese National Influence?: Is Soft Power Zero-Sum?

  • Zhao, Xiaoyu
    • Asian Journal for Public Opinion Research
    • /
    • v.5 no.1
    • /
    • pp.15-40
    • /
    • 2017
  • This paper addresses the zero-sum of soft power against the backdrop of the rise of China and the relative "decline" of America. It attempts to find out that whether the "decline" of America's soft power is caused by the rise of China's soft power, and whether China's rise could guarantee with certainty the growth of soft power. In light of the particularity of South Korea, that is, its economy relies on China and its security relies on the US, this paper chooses South Korea as the entry point for the study. Based on the Pew data from a South Korean opinion poll, this paper conducts bivariate correlation and binary logistic regression respectively, to explore the existence of zero-sum "competitions" between China's and America's soft power.

Slum Areas in Battambang and Climate Resilience

  • Samnang, Rem;Chanthol, Hay
    • Asian Journal for Public Opinion Research
    • /
    • v.5 no.2
    • /
    • pp.104-126
    • /
    • 2018
  • As the second most populous province in Cambodia, Battambang also exhibits an increasing number of urban poor areas. This research focuses on the economic situation of slum areas in Battambang and how people in slum areas are affected by climate change. This research report describes socioeconomics of people living in slum areas in 4 villages in Battambang City. An investigation will be made on motivation of moving to slum areas, access to water, access to sanitation, access to electricity, transport and delivery, access to health care, access to education, security of tenure, cost of living in slum, literacy, and access to finance. We also explore the policy of the public sector toward climate change in Cambodia.

Ubiquitous Car Maintenance Services Using Augmented Reality and Context Awareness (증강현실을 활용한 상황인지기반의 편재형 자동차 정비 서비스)

  • Rhee, Gue-Won;Seo, Dong-Woo;Lee, Jae-Yeol
    • Korean Journal of Computational Design and Engineering
    • /
    • v.12 no.3
    • /
    • pp.171-181
    • /
    • 2007
  • Ubiquitous computing is a vision of our future computing lifestyle in which computer systems seamlessly integrate into our everyday lives, providing services and information in anywhere and anytime fashion. Augmented reality (AR) can naturally complement ubiquitous computing by providing an intuitive and collaborative visualization and simulation interface to a three-dimensional information space embedded within physical reality. This paper presents a service framework and its applications for providing context-aware u-car maintenance services using augmented reality, which can support a rich set of ubiquitous services and collaboration. It realizes bi-augmentation between physical and virtual spaces using augmented reality. It also offers a context processing module to acquire, interpret and disseminate context information. In particular, the context processing module considers user's preferences and security profile for providing private and customer-oriented services. The prototype system has been implemented to support 3D animation, TTS (Text-to-Speech), augmented manual, annotation, and pre- and post-augmentation services in ubiquitous car service environments.

Document Security for Web-Based Collaboration System (웹 기반 협업 시스템의 문서 보안)

  • Kim, Yang-Suk;Kang, Ju-Mi;Won, Yong-Gwan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.885-888
    • /
    • 2002
  • 인터넷 이용의 확산과 컴퓨팅 환경이 급속히 변화되면서 특수 소수 그룹의 구성원들 간의 정보, 공유와 재사용을 지원하는 웹 기반 협업 시스템 개발이 고조되고 있다. 하지만 이러한 웹 기반 협업 시스템들은 시스템 사용자 인증만의 절차에 의한 특수 소수 그룹간에 정보를 공유하고 있어 인가된 사용자를 가장한 악의의 사용자에 의한 정보의 삭제, 수정, 파괴 등의 불법적인 행동을 막을 수 없을 뿐만 아니라 민감한 정보의 공유는 더욱더 어렵게 했다. 따라서 본 논문에서는 이러한 문제점을 해결하기 위해 웹 기반 협업 시스템의 성격을 고려한 유연성 있는 보안정책과 보안모델을 바탕으로 소 그룹단위로 을 제어할 수 있는 접근제어와 민감한 정보의 불법적인 접근을 제어 할 수 있는 접근제어 시스템을 제안한다.

  • PDF

A Study on the Organizational Characteristics Affecting the Performance of CRM (고객관계관리의 성과에 영향을 미치는 조직적 특성에 관한 연구)

  • Ko, Chang-Bae;Yun, Jong-Su;Lee, Young-Sik;Cho, Jae-Wan;Cha, Dae-Kyu
    • Journal of Digital Convergence
    • /
    • v.2 no.1
    • /
    • pp.57-73
    • /
    • 2004
  • Due to the rapid development of Information Technology and the Internet, e-business has bloomed and prevailed recently. As the result of this phenomenon, enterprises introduce CRM as a new process accessible to customers. The purpose of this study is to examine the factors affecting the performance of CRM based on precedent theoretical studies. So, the empirical test is conducted to various hypotheses related to the research model. 206 questionnaires for this study are collected. The result of how the organizational characteristics influence on the performance of CRM shows that they have a positively significant effect on it in order of expert security, top management's support and customer information-centric culture, and department collaboration. Evaluation and compensation system don't influence on the performance of CRM directly.

  • PDF

An Efficient WWW Metering Scheme based on Hash Functions (해쉬함수 기반의 효율적인 WWW 사용량 측정 방안)

  • Shin, Weon;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.3 no.2
    • /
    • pp.133-139
    • /
    • 2000
  • In this paper we propose a secure and an efficient metering scheme for measuring the usage and the popularity of web pages. The proposed scheme is based on the cryptographic secure hash functions. Since the metering schemes based on cryptographic technology provides security, efficiency, accuracy and anonymity comparing to the existing metering schemes in WWW, they have the advantages that are secure against attempts by servers who inflate the number of clients and against attempt of collaboration of severs and clients.

  • PDF