• Title/Summary/Keyword: Delegation System

Search Result 78, Processing Time 0.028 seconds

A Message Monitoring Framework for Tracing Messages on JBI-based Enterprise Service Bus (JBI 기반 ESB 환경에서 효과적인 메시지 추적을 위한 메시지모니터링 프레임워크)

  • Choi, Jae-Hyun;Park, Jae-Won;Lee, Nam-Yong
    • Journal of Information Technology Services
    • /
    • v.9 no.2
    • /
    • pp.179-192
    • /
    • 2010
  • In order to resolve the problems of traditional Enterprise Application Integration (EAI) for system integration and to establish flexible enterprise IT environments, Enterprise Service Bus(ESB) which have distributed architecture and support Service Oriented Architecture(SOA) has introduced. Particularly, JBI which developed by the Java Community Process is most widely used to implement ESB for advantages of Java technology. In ESB based on JBI, reliable message delivery is very important to ensure stability of services and systems because it is a message driven architecture. But, it is difficult to verify messages and trace messages when system fault or service error occurred because JBI specification is not enough to address them. In this paper we has proposed the Message Monitoring Framework for JBI-based ESBs which for using in monitoring messages efficiently. It provides foundations for gathering and tracing message-related information about component installation, message exchange, service deploy by using proxy-based change tracking and delegation mechanism for data processing. The proxy which used in our solutions collects data about message automatically when it changed, and the delegation mechanism provides users flexibility for data processing. Also, we describe the performance evaluation results of our solution which is acceptable. We expect to it enables users to ensure reliability and stability of the JBI-based ESB by systematic monitoring and managing messages being used to interact among components.

Competition between Mobile Pay and Credit Card Systems (모바일페이사와 신용카드사의 경쟁)

  • Lee, Ying-Ai;Park, Chong-Kook
    • Asia-Pacific Journal of Business
    • /
    • v.9 no.4
    • /
    • pp.49-65
    • /
    • 2018
  • This paper illustrates the competition between the mobile pay and credit card systems by utilizing the theory of two-sided markets. Two firms, as platforms, maximize the profit collecting fees from consumers on one side and from retailers on the other side. Consumers pay to buy goods and services with mobile pay, credit card, or cash. The basic model is one that each platform maximizes its profit. We show that the fees for credit card holders and retailers are higher than the respective costs. The fee for retailers of the mobile payment is higher than its cost, while the buyer's fee may be higher or lower than its cost. Applied model is the one that employs the delegation game model. The total profit of the mobile pay system is composed of its profit and the weighted demand for the mobile pay. It is shown that buyers' fee under the applied model is lower than that under the basic model, resulting in an increase of the demand for the mobile pay. The fee for the retailers rises, albeit the sum of fees for the buyers and retailers falls. The profit for the mobile pay system is increased, while that for the credit card company stays the same.

Design of a effective Authorization Mechanism based on Kerberos (커버로스 기반의 효율적인 허가 메커니즘 설계)

  • Kim, Eun-Hwan;Jun, Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.10C no.3
    • /
    • pp.287-294
    • /
    • 2003
  • Authentication and authorization are essential functions for the security of distributed network environment. Authorization is determining and to decide whether a user or process is permitted to perform a particular operation. In this paper, we design an authorization mechanism to make a system more effective with Kerberos for authentication mechanism. In the authorization mechanism, Kerberos server operates proxy privilege server. Proxy privilege server manages and permits right of users, servers and services with using proposed algorithm. Also, privilege attribute certificate issued by proxy privilege server is used in delegation. We designed secure kerberos with proposed functions for effective authorization at the same time authentication of Kerberos mechanism.

Assessment of China's Policies Regarding Grain Import and Export

  • Junghwan Choi;Sangseop Lim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.12
    • /
    • pp.267-279
    • /
    • 2023
  • The objective of this paper is to examine the legal framework governing the import and export of grain in China, a pivotal factor in shaping policies aimed at stabilizing South Korea's foreign trade and grain imports. Through this analysis, it is observed that China's foreign trade system, governed by the Foreign Trade Act, exhibits a notable absence of clear delineation regarding the scope and responsibility for the delegation of authority to foreign trade management agencies. In contrast, Korea's Foreign Trade Law, along with its enforcement decree and management regulations, explicitly outlines the scope and responsibilities pertaining to the delegation of authority to foreign trade management. However, in the case of China's revised Foreign Trade Law, there exists a lack of precision in specifying the delegation of authority to foreign trade management. This creates a potential for discretionary intervention by local governments or other administrative bodies. While China's legal system concerning grain imports and exports aligns with WTO regulations in its institutional framework, attention is warranted due to the vagueness in laws or regulations, as well as the presence of irrational and non-transparent procedures during system operation. As conclusion remarks, while China's legal structure related to grain imports and exports conforms to WTO guidelines overall, the identified issues such as legal ambiguity and non-transparent procedures underscore the need for caution. To safeguard against potential challenges in future trade interactions with China, proactive measures are crucial to address these concerns.

A Study of a Secure Smart Car System using Attribute-based Delegation Method (속성 기반 권한위임 관리 기법을 사용한 스마트 자동차 안전성 검토에 관한 연구)

  • Kim, Jin-Mook;Moon, Jeong-Kyung;Hwang, Deuk-Young
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.71-79
    • /
    • 2019
  • The demand of smart cars is increasing rapidly. International stand organize such as 3GPP and 5GAA are proposing standard communication protocvols for connected-car, and automotive network infrastructure. But Smart car network have many security threats and more dangerous against the existed wire communication network. Typically, peripheral devices of a smart car may disguise their identity and steal location information and personal information about the vehicle. In addition, the infrastructure elements around smart cars can conspire and put driving cars in danger, threatening lives. This is a very serious security threat. Therefore, in order to solve these problems, we proposed a system that is secure from collusion and tampering attacks using attribute-based authorize delegation method and threshold encryption algorithms. We have demonstrated using a semantic safety model that the proposed system can be safe from collusion attack.

An Fingerprint Authentication Model of ERM System using Private Key Escrow Management Server (개인키 위탁관리 서버를 이용한 전자의무기록 지문인증 모델)

  • Lee, Yong-Joon;Jeon, Taeyeol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.6
    • /
    • pp.1-8
    • /
    • 2019
  • Medical information is an important personal information for patients, and it must be protected. In particular, when medical personnel approach electronic medical records, authentication for enhanced security is essential. However, the existing public certificate-based certification model did not reflect the security characteristics of the electronic medical record(EMR) due to problems such as personal key management and authority delegation. In this study, we propose a fingerprint recognition-based authentication model with enhanced security to solve problems in the approach of the existing electronic medical record system. The proposed authentication model is an EMR system based on fingerprint recognition using PEMS (Private-key Escrow Management Server), which is applied with the private key commission protocol and the private key withdrawal protocol, enabling the problem of personal key management and authority delegation to be resolved at source. The performance experiment of the proposed certification model confirmed that the performance time was improved compared to the existing public certificate-based authentication, and the user's convenience was increased by recognizing fingerprints by replacing the electronic signature password.

A Framework Development for Total Management of Various Embedded Devices (여러 임베디드 장치의 통합 관리를 위한 프레임워크 개발)

  • Bae, HyunChul;Kim, SangWook
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.1 no.2
    • /
    • pp.56-63
    • /
    • 2006
  • In this paper, we propose the integrated security management framework supporting the trust for the ubiquitous environments. The proposed framework provides the gathering and analysis of the security related information including the location of mobile device and then dynamically configures the security policy and adopts them. More specially, it supports the authentication and delegation service to support the trusted security management for the ubiquitous networks. This system also provides the visible management tools to give the convenient view for network administrator.

  • PDF

The Scheme for Delegation of Temporary Right to Watching Pay-TV in N-Screen Service (유료 콘텐츠의 N-스크린 서비스를 위한 일시적 시청권한 위임 기법)

  • Kim, Jung-Hoon;Lee, Hoon-Jung;Kim, Sang-Jin;Oh, Hee-Kuck
    • The KIPS Transactions:PartC
    • /
    • v.18C no.3
    • /
    • pp.135-142
    • /
    • 2011
  • Recently, the strategy for N-screen service is in the spotlight along with the consumer's need to use contents regardless of time and place due to the rapid development of communication technology, which is meshing with the desire of service providers seeking a new business model. N-screen, as a screen-extension-concept service which enables consumers to continuously share and use contents in various equipments such as TV, computer and portable terminals, is an advanced type of 3-screen service strategy initially proposed by AT&T, an American telecommunication company. In the N-screen service for pay-contents, in order to support continuous screen changes to and from various equipments, temporary watching right should be given to the equipment intended for screen change. However, it is impossible to give the temporary watching right in the present broadcasting environment, adopting an access-control system. In this paper, the access-control technology being used for pay-contents in the present broadcasting environment and the reason for not being able to give temporary watching right, will be examined. After the examination, the solution for delegation of watching right by using an additional key on the basis of currently used access-control technology, will be proposed.

The Influence of Pre-Chase's Internal Marketing on Job Satisfaction in the Beauty Industry (뷰티산업에서 프랜차이즈의 내부마케팅이 직무만족에 미치는 영향)

  • Kim, Hyun-Joo;Shin, Dong-Hwa
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.12
    • /
    • pp.271-278
    • /
    • 2019
  • Working in the beauty industry accompanies high emotional stress because of the need to provide face-to-face customer service. Therefore, beauty industry employees should be recognized as internal customers and job satisfaction should be enhanced through appropriate internal marketing (education and training, compensation system, delegation, management support). With this preceded, it could lead to employees providing various satisfactory services to external customers, ultimately resulting in maximized sales and lower turnover rate. Four hypotheses were established to support this proposition, and 320 copies of questionnaires were collected from Nov. 1 to Dec. 30, 2018 targeting the beauty industry franchise workers which were analyzed through frequency analysis, reliability analysis, confirmatory factor analysis, correlation analysis, route Analysis and the like, using programs AMOS 21.0 and SPSS 22.0. As a result, education and training did not affect employees' job satisfaction, but the compensation system, delegation, and management support had a positive(+) effect.

A Study on Enhancing Efficiency of the Safety Certification and Diagnosis System for Buildings (건축물의 안전성 관련 인증 및 진단 제도의 효율성 제고를 위한 연구)

  • Sang-Pil Han
    • Journal of the Korea Safety Management & Science
    • /
    • v.25 no.4
    • /
    • pp.73-78
    • /
    • 2023
  • It is very important to evaluate how the functions of products, facilities, and spaces affect human life. The evaluation of these actions has legal regulations such as certification, inspection, and diagnosis, and the degree of quality, safety, and excellence of the results is announced. This study sought to secure safety through efficient system operation by reviewing safety-related certification systems established and implemented by each government department in Korea and analyzing the characteristics of each system and similarities between systems. There was also an aspect of cross-checking safety through the certification and diagnosis system implemented by each ministry, but it was confirmed that the efficiency of the system should also be considered in terms of overlapping application. Therefore, when securing safety is confirmed based on each safety-related law, active alternatives such as exemption, substitution, delegation, etc. should be presented.