• Title/Summary/Keyword: 신뢰 협상

Search Result 51, Processing Time 0.021 seconds

Design of QoS Manager related in Radio Resource Allocation within All-IP Network (All-IP 망에서 무선 자원 할당과 연계된 QoS 관리자의 설계)

  • Go, Hui-Chang;Wang, Chang-Jong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.8S
    • /
    • pp.2722-2728
    • /
    • 2000
  • 현재의 인터넷 망을 이용하여 음성, 화상 정보를 실시간으로 이용하고자 하는 다양한 응용이 시도되고 있다. 차세대 통신으로 주목 받고 있는 IMT-2000에서도 기존의 회선 교환망 대신 인터넷 망을 이용함으로써 경제성, 관리의 편의성, 새로운 서비스의 창출이 가능한 등의 이점이 있다. 인터넷 망이 최선의 노력(best effort)만을 제공하기 때문에 발생되는 신뢰성과 지연의 문제는 이미 많은 연구가 있어왔고 현재 어느 정도의 서비스 품질을 획득하여 VoIP(Voice Over Internet Protocol)와 같은 서비스가 실제로 이용되고 있다. 그러나 무선 통신의 경우는 이에 더하여 무선 구간에서의 자원 할당의 문제가 남아 있다. 본 연구에서는 코어 망으로 인터넷 프로토콜을 사용하는 차세대 All-IP 망에서, 무선 이동단말 간의 멀티미디어 서비스가 가능하도록 효율적인 주파수 할당을 지원하는 QoS 관리자를 설계하였다. 제안한 QoS(Quality Of Service)관리자는 요구 대역폭이 다른 멀티미디어 호 요청에 대해 융통성 있는 주파수 할당이 가능하도록 대국의 QoS 관리자와의 협상을 통해 제한된 범위 내에서 서비스 품질을 조절하여 보다 많은 호 연결 요청이 성공할 수 있도록 한다.

  • PDF

Identification of Core Competencies of Construction Managers (CM단장 핵심역량 발굴에 관한 연구)

  • Kim, Dong-Hee;Kim, Han-Soo
    • Korean Journal of Construction Engineering and Management
    • /
    • v.12 no.6
    • /
    • pp.93-100
    • /
    • 2011
  • As the construction management(CM) market has grown, so has the CM competition in the market place. Consequently, competent construction managers become a core part of CM firms' competitiveness. The objective of the study is to identify and discuss core competencies of construction mangers based on literature survey, Delphi Method and AHP. Among various competencies required for construction managers, skills for problem solving, trust and negotiation skills were identified as the crux of construction managers' competencies. A better understanding of construction managers' core competencies is very critical in terms of CM firms' training of construction managers and continuos self-improvement for construction managers.

A Design on Component Service Repository using Dynamic Resource Management and Algorithm on Configuration of Dependency (동적 자원관리를 활용한 컴포넌트 서비스 레포지토리 설계 및 의존성 형상 알고리즘)

  • Choi, Sang-Kyoon;Song, Young-Jae
    • The KIPS Transactions:PartD
    • /
    • v.11D no.3
    • /
    • pp.617-624
    • /
    • 2004
  • Recent developments in component technology enable the construction of complex software systems by assembling together off-the-shelf components However, It is still difficult to develop efficient, reliable, and dynamically configurable component-based systems. Unspecified dependencies and behavior on components often has cause the source of the trouble. Therefore, component-based software systems must maintain explicit presentations of inter-component dependence and component requirements. In this paper, I describe the design on repository of component service to deployment, status reporting, and control in component service. Through the existing researches to customize component technology, I present the algorithm that supports dynamic dependency interface in order to reuse context of application.

A Study on the Resolution of Trade Disputes by Mediation (조정에 의한 무역분쟁의 해결방안 고찰)

  • Jang, Eun-Hee;Hwang, Ji-Hyeon
    • Korea Trade Review
    • /
    • v.43 no.5
    • /
    • pp.139-158
    • /
    • 2018
  • As trade volume increases and the business environment becomes more complex and competitive, international trade disputes are also increasing and becoming more complex. Parties need to become more aware of alternatives to costly and time consuming arbitration and litigation. The ADR (Alternative Dispute Resolution) can encompass all dispute resolution processed and can act as a substitute for traditional litigation. Mediation, a type of ADR, offers an amicable dispute settlement mechanism between concerned parties through a natural mediator. There are several strong points of mediation compared with litigation or arbitration. First of all, mediation can take place without having to complete time-consuming and expensive discovery processes associated with litigation. In addition, since mediation is considered a private process, the dispute can remain out of the public eye. It can be embarrassing and disrupt business when customer or suppliers learn that a company is involved in litigation. Lastly, mediation is less adversarial than litigation or arbitration, so the parties often can salvage their relationships. Often the parties to mediation find themselves continuing to conduct business. In spite of such benefits of mediation, it is less used in Korea and therefore, this article aims to promote the mediation system in international trade disputes. However, this paper has limitation, for example, why ADR is not used well in Korea and need to suggest how ADR can work best in international trade disputes.

A DDMPF(Distributed Data Management Protocol using FAT) Design of Self-organized Storage for Negotiation among a Client and Servers based on Clouding (클라우딩 기반에서 클라이언트와 서버간 협상을 위한 자가 조직 저장매체의 DDMPF(Distributed Data Management Protocol using FAT) 설계)

  • Lee, Byung-Kwan;Jeong, Eun-Hee;Yang, Seung-Hae
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.8
    • /
    • pp.1048-1058
    • /
    • 2012
  • This paper proposes the DDMPF(Distributed Data Management Protocol using FAT) which prevents data loss and keeps the security of self-organized storages by comprising a client, a storage server, and a verification server in clouding environment. The DDMPF builds a self-organized storage server, solves data loss by decentralizing the partitioned data in it in contrast to the centralized problem and the data loss caused by the storage server problems of existing clouding storages, and improves the efficiency of distributed data management with FAT(File Allocation Table). And, the DDMPF improves the reliability of data by a verification server's verifying the data integrity of a storage server, and strengthens the security in double encryption with a client's private key and the system's master key using EC-DH algorithm. Additionally, the DDMPF limits the number of verification servers and detects the flooding attack by setting the TS(Time Stamp) for a verification request message and the replay attack by using the nonce value generated newly, whenever the verification is requested.

A New Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks (무선 센서 네트워크를 위한 새로운 키 사전 분배 구조)

  • Kim, Tae-Yeon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.183-188
    • /
    • 2009
  • Wireless sensor networks will be broadly deployed in the real world and widely utilized for various applications. A prerequisite for secure communication among the sensor nodes is that the nodes should share a session key to bootstrap their trust relationship. The open problems are how to verify the identity of communicating nodes and how to minimize any information about the keys disclosed to the other side during key agreement. At any rate, any one of the existing schemes cannot perfectly solve these problems due to some drawbacks. Accordingly, we propose a new pre-distribution scheme with the following merits. First, it supports authentication services. Second, each node can only find some indices of key spaces that are shared with the other side, without revealing unshared key information. Lastly, it substantially improves resilience of network against node capture. Performance and security analyses have proven that our scheme is suitable for sensor networks in terms of performance and security aspects.

Password-Based Authentication Protocol for Remote Access using Public Key Cryptography (공개키 암호 기법을 이용한 패스워드 기반의 원거리 사용자 인증 프로토콜)

  • 최은정;김찬오;송주석
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.75-81
    • /
    • 2003
  • User authentication, including confidentiality, integrity over untrusted networks, is an important part of security for systems that allow remote access. Using human-memorable Password for remote user authentication is not easy due to the low entropy of the password, which constrained by the memory of the user. This paper presents a new password authentication and key agreement protocol suitable for authenticating users and exchanging keys over an insecure channel. The new protocol resists the dictionary attack and offers perfect forward secrecy, which means that revealing the password to an attacher does not help him obtain the session keys of past sessions against future compromises. Additionally user passwords are stored in a form that is not plaintext-equivalent to the password itself, so an attacker who captures the password database cannot use it directly to compromise security and gain immediate access to the server. It does not have to resort to a PKI or trusted third party such as a key server or arbitrator So no keys and certificates stored on the users computer. Further desirable properties are to minimize setup time by keeping the number of flows and the computation time. This is very useful in application which secure password authentication is required such as home banking through web, SSL, SET, IPSEC, telnet, ftp, and user mobile situation.

Direction of Arms Control to Establish Foundation for Peaceful Reunification in Korean Peninsula (한반도 평화통일 기반구축을 위한 군비통제 추진방향)

  • Kim, Jae Chul
    • Convergence Security Journal
    • /
    • v.15 no.6_1
    • /
    • pp.79-92
    • /
    • 2015
  • It is required to expand area of inter-Korean economic cooperation, being limited to non-military field, to military field and then, to positively promote arms control in order to establish foundation for peaceful reunification in Korean peninsula. Reasons why arms control has not been promoted between South and North Korea in the meantime were such original factors as follows; (1) limit of confidence building between the South and the North, (2) functional limit of arms control itself, (3) institutional structural limit between the South and the North, (4) environmental limit at home and abroad. It is necessary to get out from existing frame and to seek a new paradigm in order to overcome above factors and to realize arms control between the South and the North. First, it is required to have prior political dialog at the South-North high-level talks in order to promote arms control and to exercise 'strategic flexibility' during negotiation and promotion process. For this, 'flexible reciprocity' has to be adopted in compliance with situation and conditions. Second, it is necessary to get out from existing principle of 'confidence building in advance and arms reduction later' but to seek the 'simultaneous driving principle of confidence building and arms reduction' as an eclectic approach. Namely, based on reasonable sufficiency, it is required to promote military confidence building and limited arms reduction in parallel, which is a lower level of arms control. Third, as an advisory body of Prime Minister's Office, it is necessary to install an organization exclusively responsible for arms control and to positively handle arms control issue from the standpoint of national policy strategy. If the South-North high-level talks take place, it is necessary to organize and operate 'South-North Joint Arms Control Promotion Board (tentative name)'. Fourth, it is required to exercise more active diplomatic competence in order to create national consensus on necessity of arms control for peaceful reunification and to form more favorable international environment. Especially, it is necessary to think about how to solve nuclear issue of North Korea together in collaboration with international society and how to maintain balance between ROK-US alliance and Sino-Korean cooperation relations.

China's Global Investment Policy and Precondition for China Money FDI in Korea (중국의 해외투자 정책과 중국자본 유치의 전제조건)

  • Park, Moon-Suh;Kim, Mea-Jung
    • International Commerce and Information Review
    • /
    • v.14 no.1
    • /
    • pp.171-195
    • /
    • 2012
  • This paper is aimed to prepare some policy-measures which is helpful for China Money FDI in Korea by analysing FDI-related data and political strength and weakness between the two countries and studying fundamental preconditions required for Korea's China Money FDI strategies. As the result of research, key preconditions found out can be summarized as follows; First, because China-Korea economic relationship is largely insufficient in a complementary view as well as in a cooperative state level, Korea should remove the threats in advance that could lead two countries to unlimited competition, and then expand to a relationship of trust between China and Korea. Second, Korea, at least from the perspective of China, may not be an attractive investment destination. Therefore, it is necessary to take advantage of Korea's FTA-expansion-strategy opportunities such as Korea-US FTA which has entered into force recently. Third, because China always has a lot of alternative investment opportunities among world instead of Korea, so Korea should not overlook the fact that China has the bargaining power in large part related on the investment conditions in Korea, such as investment field, investment size, how to invest China Money to Korea, etc. Fourth, if Korea's FDI policy is trapped in the existing rules of the political frame, and moreover Korea can not have the role of rule breaker, it will be difficult to expect Korea's China Money FDI results compared to those efforts. Fifth, if Korea will execute China Money FDI strategies in the context of overestimating the China Power or China Money, it should be noted that Korea may have unexpected losses lead to a national by reason of outward and quantitative investment or bad investment.

  • PDF

Implementation of A Multiple-agent System for Conference Calling (회의 소집을 위한 다중 에이전트 시스템의 구현)

  • 유재홍;노승진;성미영
    • Journal of Intelligence and Information Systems
    • /
    • v.8 no.2
    • /
    • pp.205-227
    • /
    • 2002
  • Our study is focused on a multiple-agent system to provide efficient collaborative work by automating the conference calling process with the help of intelligent agents. Automating the meeting scheduling requires a careful consideration of the individual official schedule as well as the privacy and personal preferences. Therefore, the automation of conference calling needs the distributed processing task where a separate calendar management process is associated for increasing the reliability and inherent parallelism. This paper describes in detail the design and implementation issues of a multiple-agent system for conference calling that allows the convener and participants to minimize their efforts in creating a meeting. Our system is based on the client-sewer model. In the sewer side, a scheduling agent, a negotiating agent, a personal information managing agent, a group information managing agent, a session managing agent, and a coordinating agent are operating. In the client side, an interface agent, a media agent, and a collaborating agent are operating. Agents use a standardized knowledge manipulation language to communicate amongst themselves. Communicating through a standardized knowledge manipulation language allows the system to overcome heterogeneity which is one of the most important problems in communication among agents for distributed collaborative computing. The agents of our system propose the dates on which as many participants as possible are available to attend the conference using the forward chaining algorithm and the back propagation network algorithm.

  • PDF