• Title/Summary/Keyword: Delegation

Search Result 264, Processing Time 0.024 seconds

Autonomous flight Algorithm Design (자율형 운항 알고리즘 설계 연구)

  • Lee, Dae-Yong;Kang, Ja-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.1
    • /
    • pp.122-130
    • /
    • 2012
  • Airborne separation assurance is a key requirement for Free Flight. This paper is to propose autonomous flight algorithm, such as extended authority of delegation, efficiency of airspace issue to deal with the empirical solution for free flight, and to measure flight efficiency and conflict detection and resolution (CD&R) by utilizing flight performance data under the two circumstances of scenario with the modeling of proposed algorithm and potential field algorithm. The results show that the autonomous flight algorithm is superior to the potential field algorithm under the circumstances of free flight airspace in terms of algorithm performance, CD&R, and flight efficiency.

Proxy Signatures for Partial Delegation with Warrant and Threshold Delegation (보증 부분 위임과 역치 위임에 의한 대리 서명방식)

  • Kim, Seung-Joo;Park, Sang-Joon;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.8 no.2
    • /
    • pp.81-92
    • /
    • 1998
  • Mambo, Usuda, Okamoto에 의하여 최초로 제안된 대리 서명은 원서명자가 지정한 서명자가 원서명자를 대신하여 서명하는 것을 허용한다. 본 논문에서는 이러한 대리 서명 중에서 보증서를 이용하여 부분 위임이 가능한 대리 서명과 역치 위임이 가능한 대리 서명을 제안하였다. 보증 부분 위임은 Mambo가 제안한 부분 위임과 Neuman의 보증 위임의 장점을 결합한 것으로 암호 요율성 또한 좋다. 역치 위임은 원서명자가 n명의 대리 서명자를 지정하고 n명의 대리 서명자중 t명 이상의 대리 서명자가 협조하여야 대리 서명을 할 수 있는 개념으로 본 논문에서 threshold위임에 의한 대리 서명 방식을 제시하였다.

Privacy Weakness Analysis of Delegation-Based Authentication Protocol (위임기반 인증 프로토콜의 프라이버시 취약성 분석)

  • Youn, Taek-Young;Kim, Chang-Han
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.53-57
    • /
    • 2010
  • Recently, Lee et al. proposed a delegation-based authentication protocol for secure and private roaming service in global mobility networks. In this paper, we show that the protocol cannot protect the privacy of an user even though the protocol provides the user anonymity. To prove the weakness, we show that the protocol cannot provide the unlinkability and also examine the weakness of the protocol caused by the lack of the unlinkability.

On Performance Evaluation of Binding Updates Based on Multicasting for Network Mobility (네트워크 이동성 환경에서 멀티캐스트 기반의 바인딩 갱신 기법에 대한 성능 분석)

  • Ahn, Soo-Been;Kim, Moon-Seong;Choo, Hyun-Seung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.991-994
    • /
    • 2008
  • 네트워크 이동성(Network Mobility: NEMO)은 하나 이상의 서브넷으로 이루어진 전체 네트워크가 인터넷 접속점을 동적으로 변화하여 네트워크 접근성도 변화하는 환경을 말한다. 이러한 환경에서 경로 최적화를 위한 여러 프로토콜들이 존재하지만 그중 Prefix Delegation 기법은 다른 기법들에 비해 다방면에서 우수하다. 그러나 본질적으로 바인딩 갱신 스톰(storm) 문제를 수반하기에 NEMO 환경에서의 바인딩 갱신 비용을 최소화 하기위한 연구가 대두하였다. 본 논문에서는 바인딩 갱신 비용의 최소화를 위하여 바인딩 갱신 시 멀티캐스트 기법을 적용하였으며, 경로 최적화 프로토콜은 Prefix Delegation 기법 중 바인딩 갱신 비용을 효율적으로 고려한 IPD[1]를 가정하였다. 성능평가를 위해서 수학적 모델링을 적용하였으며, 본 모델을 통하여 기존 방법들에 비하여 상당한 비용절감 효과를 얻을 수 있음을 보인다.

Identification and delegation of indirect care interventions (간접간호중재의 수행 및 위임에 관한 분석)

  • Yom, Young-Hee;Kim, So-In;Cha, Boo-Kyung
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.5 no.2
    • /
    • pp.197-207
    • /
    • 1999
  • The purpose of this research was fourfold: (a) to identify the use rate of the indirect care interventions performed by nurses, (b) to estimate the time to perform each intervention, (c) to identify the indirect care interventions to be delegated to others, and (d) to determine the level of provider preparation needed to delegate indirect care interventions. The sample consisted of 199 nurses working in three hospitals. The Indirect Care Survey developed by the Iowa Intervention Project team was used for data collection. The instrument was translated to Korean and validated by nurse experts. Each of the 26 indirect care interventions were used several times a day. Four interventions (i.e.. Documentation, Shift Report, Specimen Management, and Transport) were performed several times a day by 50% or more of the nurses. The most frequently used intervention was Documentation, followed by the interventions Shift report. Environmental Management, Transport, and Examination Assistance. The least used intervention was Quality Monitoring, followed by the interventions Order Transcription, Referral, Health Care Information Exchange, Multidisciplinary Care Conference, and Product Evaluation. The intervention taking the most time to per-form was Technology Management (155.3 minutes), followed by the interventions Documentation, (122.2 minutes), Delegation (84.4 minutes), Supply management (83.4 minutes), and Preceptor: Student (79.9 minutes), Overall, the nurses reported that they would not delegate to others the majority of the interventions. More than 50% of the nurses would not delegate 21 interventions. Shift Report would not be delegated by 95% of the nurses and Documentation would not be delegated by 92% of the nurses. Caregiver Support would be delegated by 68% of the nurses to family. Three interventions (i.e.. Environmental Management, Examination Assistance, and Transport) would be delegated by more than 50% of the nurses to Nursing Assistant. This study will contributes to determining costs of nursing services and enhancing quality of nursing care. Replication study will be needed with large sample.

  • PDF

Design and Implementation of eduroam Authentication-Delegation System (eduroam 사용자 대리인증 시스템의 설계 및 구현)

  • Lee, KyoungMin;Jo, Jinyong;Kong, JongUk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.9
    • /
    • pp.1730-1740
    • /
    • 2016
  • This paper introduces a guest identity provider system for eduroam which is a global Wi-Fi service targeting users enrolled in higher education and research institutions. Developed eduroam AND (AutheNtication Delegation) system enables users to create their eduroam user accounts and to access eduroam regardless of their locations. Users with no organizational eduroam account therefore can freely access eduroam using the system. A federated authentication model is implemented in the system, and thus the system has merits of having high accessibility, indirectly verifying users and organizations possible, saving management overhead. Status monitoring is essential because authentication request and response messages are routed by eduroam network. eduroam AND performs active monitoring to check service availability and visualizes the results, which increases operational and management efficiency. We leveraged open-source libraries to implement eduroam AND and run the system on KREONET (Korea REsearch Open NETwork). Lastly, we present implementation details and qualitively evaluate the system.

Design of a Secret Sharing Scheme in a Tree-structured Hierarchy (트리 형태의 계층 구조에 적용 가능한 비밀분산법의 설계)

  • Song, Yeong-Won;Park, So-Young;Lee, Sang-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.3
    • /
    • pp.161-168
    • /
    • 2002
  • A secret sharing scheme is a cryptographic protocol to share a secret among a set of participants P in the way that only qualified subsets of P can reconstruct the secret whereas any other subset of P, non-qualified to know the secret, cannot determine anything about the secret. In this paper, we propose a new secret sharing scheme in hierarchical groups, whose hierarchy can be represented as a tree structure. In the tree structure, participants of higher levels have priorities to reconstruct the secret over participants of lower levels. In the absence of the participant of a higher level, it is possible for this participant to delegate the ability to reconstruct the secret to the child nodes of the next lower level through the transfer of his delegation ticket. This scheme has a dynamic access structure through the recursive delegation process from the root to lower levels where participants aren't absent.

Determination the nursing student's clinical competency based on new nurses' job analysis (신규간호사의 직무분석을 통한 간호학생의 실무수행 능력수준 결정)

  • Kang, Ik-Wha;Lee, Eun-Ja;Lee, Kyu-Jung
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.7 no.3
    • /
    • pp.497-509
    • /
    • 2001
  • The purpose of this study was to examine frequency of job performance, level of urgency, index of importance experienced by 138 new nurses who were working at 6 hospitals that had over 400 bed in Incheon and Bucheon. The data were analyzed using a SPSS program for descriptive statistics [numbers of job performance, level of urgency, index of importance(job performance+1/4 level of urgency)]. Some of the most frequent job performance were application of aseptic technique, application of principle of infection control, and medication (IV, PO, IM, supply fluid and electrolyte). Some of the most uncommon job performance were activity as a lecturer in nursing department, activity of arrangement of community resources, and participation in multidisciplinary conference. Some of the highest level of urgency were use of aseptic technique, CPR, application of principle of infection control, defibrillation for dysrhythmia, blood transfusion, observation of patient's status in procedure (operation), v/s check, intervention for improvement of respiratory function and medication of antihypertensives. Some of the lowest level of urgency were activity as a lecturer in nursing department, preceptor's activity, supervisor and delegation of job to nurse aids, attendance at nursing conference, activity of arrangement of community resources, participation in clinical teaching practice, participation in multidisciplinary conference, and delegation of patient care. Those were indirect patient care. The order was physiologic integration(60.99%), safety and effective nursing environment, psychosocial care, and health maintenance and improvement. The most importance item in maintenance of physiologic integration was medication. Some of the highest index of importance were aseptic technique and application of principle of infection control, v/s check, observation of patient's status in operation and medication. Some of the lowest index of importance were activity as a lecturer in nursing department, preceptor's activity, activity of arrangement of community resources, participation in multidisciplinary conference, nursing conference, participation in clinical teaching, and delegation of job to nurse aids.

  • PDF

Design of Delegation Signature Protocols for Strong Non-Repudiation (강화된 부인방지를 위한 대리서명 프로토콜의 설계)

  • 이용준;이근왕;김희숙;오해석
    • Convergence Security Journal
    • /
    • v.4 no.2
    • /
    • pp.35-41
    • /
    • 2004
  • Proxy signature scheme based on delegation of warrant is studied in these days. Proxy signature Is a signature scheme that the original signer delegates his signing warrant to the proxy signer, and the proxy signer creates a signature on behalf of the original signer. For using this scheme, the security for protecting from the forgeability or misuse is necessary. There are several security requirements for using the proxy signature schemes. In this paper we suggest the proxy-register protocol scheme that original signer registers to the verifier about the proxy related information. In our scheme, verifier verifies the signature that original signer creates about the proxy information and sets the warrant of proxy signer, validity period for proxy signature and some limitation. Finally, we will show the advantages of our suggestion by comparing with the previous proxy signature schemes.

  • PDF

A Novel K-hop Cluster-based Ad hoc Routing Scheme with Delegation Functions (위임 기능을 이용한 새로운 K-hop 클러스터 기반 Ad hoc 라우팅 구조)

  • Kim Tae-yeon;Wang Ki-cheoul
    • Journal of Internet Computing and Services
    • /
    • v.5 no.5
    • /
    • pp.27-37
    • /
    • 2004
  • The existing ad hoc network protocols suffer the scalability problem due to the inherent characteristics of node mobility. Cluster-based routing protocols divide the member nodes into a set of clusters and perform a hierarchical routing between these clusters. This hierarchical feature help to improve the scalability of ad hoc network routing. However, previous k-hop cluster-based routing protocols face another problems, that is, control overhead of the cluster headers. This paper proposes a novel k-hop cluster-based routing scheme with delegation functions for mobile ad hoc networks. The scheme employs is based on tree topology to manage cluster members in effectively. The cluster headers do not manage the routing table for whole members, while the header keeps the routing table for its neighbor members and the member list for one hop over nodes within k-hop cluster. Then the in-between leveled nodes manage the nested nodes which is structured in the lower level. Therefore, the proposed mechanism can reduce some control overhead of the cluster leaders.

  • PDF