• Title/Summary/Keyword: Delegation

Search Result 264, Processing Time 0.027 seconds

Design of a Protocol to Delegate Signing Right for Multi-level Proxy Signature (다단계 대리서명을 위한 권한위임 프로토콜 설계)

  • Kim Seong-yeol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.2
    • /
    • pp.361-365
    • /
    • 2005
  • Proxy signature schemes which allows original signer to delegate proxy signer to sign message on its behalf have a considerable amount of interest from researchers since Mambo[1] and have found many practical applications such as distributed network, Grid computing and electronic commerce. Araki[6] extended them to multi-level proxy signature. But it could not satisfy some security requirement. In this paper we propose a protocol to delegate signing right to another entity for multi-level proxy signature. Our protocol do not require secure channel and guarantee that nobody is able to repudiate delegation or acceptance of signing right, it is impossible for anyone to generate signature except designed and original signer can withdraw the delegation before expiration if it is necessary.

A Delegation Model based on Agent in Distributed Systems

  • Kim, Kyu-Il;Lee, Joo-Chang;Choi, Won-Gil;Lee, Eun-Ju;Kim, Ung-Mo
    • Journal of Information Processing Systems
    • /
    • v.3 no.2
    • /
    • pp.82-88
    • /
    • 2007
  • Web services are the new building block of today's Internet, and provides interoperability among heterogeneous distributed systems. Recently in web services environment, security has become one of the most critical issues. The hackers attack one of fragile point and can misuse legitimate user privilege because all of the connected devices provide services for the user control and monitoring in real time. Also, the users of web services must temporarily delegate some or all of their rights to agents in order to perform actions on their behalf. This fact risks the exposure of user privacy information. In this paper, we propose secure delegation model based on SAML that provides confidentiality and integrity about the user information in distributed systems. In order to support privacy protection, service confidentiality, and assertion integrity, encryption and a digital signature mechanism is deployed. We build web service management server based on XACML, in order to manage services and policies of web service providers.

A Study on Design and Implementatio of Script Management of Script Management Function (스크립트 관리 기능의 설계 및 구현에 관한 연구)

  • 한순희;이재오;조국현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.5
    • /
    • pp.746-756
    • /
    • 1993
  • Delegation model supports effective and highly reliable network management. It reduces traffic overhead caused by transmission of management informations. In this model, management scripts can be composed by the designers of managers, these are delegated to agents. Delegation models support effective distribution of management functions among managers and agents. Therefore, various functions are needed to create and delegate management scripts. In this paper, we design simple script language and implement script interpreter for efficient network management. And, we define script management functions and services. Moreover, we present manager/agent models and algorithms for script management. As an implementation environment, the ISODE services are ported. The methods employed for the implementation are also described.

  • PDF

Design of a Reusable Secret Sharing Scheme in a Hierarchical Group (비밀조각의 재사용이 가능한 권한 위임 비밀분산법의 설계)

  • 양성미;박소영;이상호
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.9
    • /
    • pp.487-493
    • /
    • 2003
  • A secret sharing scheme is a cryptographic Protocol that a dealer distributes shares about a secret to many participants and authorized subsets of the participants can reconstruct the secret. Secret sharing schemes that reflect various access structure were proposed. We propose a new reusable secret sharing scheme in a hierarchical group. Participants have priority about restoration of secret from high position level of tree. And when participants who belong in high position level are absent, they can delegate restoration competence of the secret transmitting delegation ticket to child nodes that it belongs in low rank level. By participants reuse own share and take part in different secret restoration, they who belong on hierarchical group can be possible different secret restoration by each participant's single share.

The Effects of Job Characteristics and Empowerment on Job satisfaction of ERP System Users of Small/Medium Businesses (중소기업의 ERP시스템 사용자의 직무특성과 임파워먼트가 직무만족에 미치는 영향)

  • Kim, Dae-Sik;Yi, Seon-Gyu
    • Journal of Digital Convergence
    • /
    • v.15 no.3
    • /
    • pp.119-128
    • /
    • 2017
  • This study analyzed the effects of job characteristics and empowerment on job satisfaction of ERP system users of small/medium manufacturing & service businesses. In the results of analysis, the detailed factors of job characteristics such as efficiency, authority delegation, and complexity were significant influence factors on ERP users' job satisfaction while the factors of empowerment such as task impact, self-determination, and task meaning had positive effects on users' job satisfaction. However, competence did not have positive effects on job satisfaction. The results of this study showed that most of the ERP system users of small/medium businesses were satisfied with their own jobs.

A Secure Location-Based Service Reservation Protocol in Pervasive Computing Environment

  • Konidala M. Divyan;Kim, Kwangjo
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.669-685
    • /
    • 2003
  • Nowadays mobile phones and PDAs are part and parcel of our lives. By carrying a portable mobile device with us all the time we are already living in partial Pervasive Computing Environment (PCE) that is waiting to be exploited very soon. One of the advantages of pervasive computing is that it strongly supports the deployment of Location-Based Service(s) (LBSs). In PCE, there would be many competitive service providers (SPs) trying to sell different or similar LBSs to users. In order to reserve a particular service, it becomes very difficult for a low-computing and resource-poor mobile device to handle many such SPs at a time, and to identify and securely communicate with only genuine ones. Our paper establishes a convincing trust model through which secure job delegation is accomplished. Secure Job delegation and cost effective cryptographic techniques largely help in reducing the burden on the mobile device to securely communicate with trusted SPs. Our protocol also provides users privacy protection, replay protection, entity authentication, and message authentication, integrity, and confidentiality. This paper explains our protocol by suggesting one of the LBSs namely“Secure Automated Taxi Calling Service”.

  • PDF

A Message Monitoring Framework for Tracing Messages on JBI-based Enterprise Service Bus (JBI 기반 ESB 환경에서 효과적인 메시지 추적을 위한 메시지모니터링 프레임워크)

  • Choi, Jae-Hyun;Park, Jae-Won;Lee, Nam-Yong
    • Journal of Information Technology Services
    • /
    • v.9 no.2
    • /
    • pp.179-192
    • /
    • 2010
  • In order to resolve the problems of traditional Enterprise Application Integration (EAI) for system integration and to establish flexible enterprise IT environments, Enterprise Service Bus(ESB) which have distributed architecture and support Service Oriented Architecture(SOA) has introduced. Particularly, JBI which developed by the Java Community Process is most widely used to implement ESB for advantages of Java technology. In ESB based on JBI, reliable message delivery is very important to ensure stability of services and systems because it is a message driven architecture. But, it is difficult to verify messages and trace messages when system fault or service error occurred because JBI specification is not enough to address them. In this paper we has proposed the Message Monitoring Framework for JBI-based ESBs which for using in monitoring messages efficiently. It provides foundations for gathering and tracing message-related information about component installation, message exchange, service deploy by using proxy-based change tracking and delegation mechanism for data processing. The proxy which used in our solutions collects data about message automatically when it changed, and the delegation mechanism provides users flexibility for data processing. Also, we describe the performance evaluation results of our solution which is acceptable. We expect to it enables users to ensure reliability and stability of the JBI-based ESB by systematic monitoring and managing messages being used to interact among components.

Competition between Mobile Pay and Credit Card Systems (모바일페이사와 신용카드사의 경쟁)

  • Lee, Ying-Ai;Park, Chong-Kook
    • Asia-Pacific Journal of Business
    • /
    • v.9 no.4
    • /
    • pp.49-65
    • /
    • 2018
  • This paper illustrates the competition between the mobile pay and credit card systems by utilizing the theory of two-sided markets. Two firms, as platforms, maximize the profit collecting fees from consumers on one side and from retailers on the other side. Consumers pay to buy goods and services with mobile pay, credit card, or cash. The basic model is one that each platform maximizes its profit. We show that the fees for credit card holders and retailers are higher than the respective costs. The fee for retailers of the mobile payment is higher than its cost, while the buyer's fee may be higher or lower than its cost. Applied model is the one that employs the delegation game model. The total profit of the mobile pay system is composed of its profit and the weighted demand for the mobile pay. It is shown that buyers' fee under the applied model is lower than that under the basic model, resulting in an increase of the demand for the mobile pay. The fee for the retailers rises, albeit the sum of fees for the buyers and retailers falls. The profit for the mobile pay system is increased, while that for the credit card company stays the same.

A Study on the Improvement for Problems of ICT-related laws system in Korea

  • Lee, Hie-Houn
    • International Journal of Advanced Culture Technology
    • /
    • v.7 no.2
    • /
    • pp.7-12
    • /
    • 2019
  • Korea's laws regarding ICT must follow the Void for vagueness doctrine, the Principle of forbidden general delegation, the Principle of justification of system and the Principle of balancing test in the Constitution. The Act for the Promotion and Convergence and so on of Information and Communication in the Future should be improved as follows. It is desirable to improve the part where the principle of system justification of the Constitution is problematic in relation to existing laws. It is desirable to improve the ICT's policies on industry and convergence technologies so that they are well balanced between promotion and regulation of ICT's industries. It is desirable to improve the information service policy and legislative makeup relationship between various government agencies related to ICT. It is therefore desirable to improve the institutional complement to the post-regulatory framework for the protection of users of ICT in the future. It is desirable to create a device to replace the functions of the Information Service Budget Council in the special law of ICT.

A Design of Hadoop Security Protocol using One Time Key based on Hash-chain (해시 체인 기반 일회용 키를 이용한 하둡 보안 프로토콜 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.4
    • /
    • pp.340-349
    • /
    • 2017
  • This paper is proposed Hadoop security protocol to protect a reply attack and impersonation attack. The proposed hadoop security protocol is consists of user authentication module, public key based data node authentication module, name node authentication module, and data node authentication module. The user authentication module is issued the temporary access ID from TGS after verifing user's identification on Authentication Server. The public key based data node authentication module generates secret key between name node and data node, and generates OTKL(One-Time Key List) using Hash-chain. The name node authentication module verifies user's identification using user's temporary access ID, and issues DT(Delegation Token) and BAT(Block Access Token) to user. The data node authentication module sends the encrypted data block to user after verifing user's identification using OwerID of BAT. Therefore the proposed hadoop security protocol dose not only prepare the exposure of data node's secret key by using OTKL, timestamp, owerID but also detect the reply attack and impersonation attack. Also, it enhances the data access of data node, and enforces data security by sending the encrypted data.