• Title/Summary/Keyword: Efficient Identity Management

Search Result 62, Processing Time 0.019 seconds

A Study on City Image Management for City Marketing - Quantitative Analysis to Derive Management Programs of City Image - (도시마케팅을 위한 도시이미지 관리방안 연구 - 도시이미지 관리 프로그램 도출을 위한 정량적 분석 -)

  • Byeon, Jae-Sang;Cho, Ye-Jee;Choi, Hyung-Seok;Kim, Song-Yi;Im, Seung-Bin
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.35 no.4
    • /
    • pp.81-89
    • /
    • 2007
  • Urban landscape represents a city's internal identity as well as external form. Therefore, urban landscape and image planning has to involve marketing strategies to deliver the economic growth and regional revitalization through recreating the environmental and cultural value of the city. This study intends to develop practical city image management programs as city marketing tools which consider opinions of local authorities, related experts, and residents. To achieve this purpose conjoint analysis was applied on three components which symbolically reflects features of assets and resources in Anseong. This study can be summarized as follows: 1. The first consideration for Lake Geumgwang is to develop farm experience Programs on waterside fields. 2. The rot consideration for Bauduki Festival is to make efforts for public relations(PR) to be able to merchandise festival-related goods and develop unique products. 3. The first consideration for Anseong Grapes is to build leisure-oriented theme parks for local farm products. This study is meaningful to develop the efficient and quantitative management method of city image for marketing. The integrated approach to the management programs to reflect opinions of local policies, experts and citizens is expected to become a useful foundation in studying city images and marketing.

Application of Responsive Identity Design in Sejong City: Focusing on Minimalism (세종특별자치시 반응형 아이덴티티 디자인 적용: 미니멀리즘을 중심으로)

  • Cha, Hyun-Ji
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.11
    • /
    • pp.656-668
    • /
    • 2020
  • The Sejong City was launched in July 2012 and was initially focused on the relocation of central administrative agencies, but it has been changing from an administrative city to a fourth industrial city since 2019 to a smart city and the implementation of Korea's New Deal in 2020. Identity design needs to be reevaluated accordingly. In particular, the web environment is also calling for an optimized identity design due to rapid changes in information technology such as various wearables and the Internet of Things. As the number of responsive web sites where information and communication technologies can be developed and optimized screens can be viewed increased, identity was intuitively communicated to users and designs were applied to make them more distinct and empathetic to other cities. Prior to the study, we looked at prior studies on the changing times in the web environment and the reactive web, and analyzed the identity design of the reactive web and applied minimalism characteristics step by step. Based on this, we surveyed experts and non-experts on the proposed survey by applying minimalist characteristics (simple, repeatability, and spatiality) of reactive identity and found that it was easily and intuitively recognizable in a small web environment such as mobile. Therefore, we hope that Sejong City's identity will continue to be studied in various ways and efficient management so that identity can be established in accordance with the changes of the times.

Priority Analysis of Criteria for Evaluation of Public Hospital Using Analytic Hierarchy Process (AHP를 이용한 공공병원 평가지표의 우선순위 및 가중치 개발)

  • Shim, Jae-Sun;Kwon, Young-Dae;Lee, Kun-Sei;Yang, Min-Hee;Park, Eun-Young
    • The Korean Journal of Health Service Management
    • /
    • v.7 no.4
    • /
    • pp.289-303
    • /
    • 2013
  • This study looks at priorities in managing public hospitals by figuring out categories needed to examine the quality of each hospital. In order to analyze priorities and relative importance of valuation indicator in Seoul municipal hospitals, surveys were sent via e-mail to medical professionals who have participated in evaluation of municipal hospitals. The analytic hierarchy process (AHP) was conducted using the Expert Choice 11.5 program. The results show that 'providing public service' is considered to be the most important category for all kinds of public hospitals, followed by 'improving the quality of medical care', 'hospital management and governance', and 'efficient hospital management'. The importance of 'hospital management and governance' and 'efficient hospital management' is different depending on the types of hospitals, but the importance of 'providing public service' and 'improving the quality of care' remains the same regardless of the types of hospitals. Based on these results, the study comes to a conclusion that public hospitals should place high value on certain categories and their management purposes should differ depending on their specific fields and characteristics. This study will help furthering discussions on the identity and roles of public hospitals.

Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol

  • Wei, Guiyi;Yang, Xianbo;Shao, Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.12
    • /
    • pp.3352-3365
    • /
    • 2012
  • Group key agreement (GKA) is a cryptographic primitive allowing two or more users to negotiate a shared session key over public networks. Wu et al. recently introduced the concept of asymmetric GKA that allows a group of users to negotiate a common public key, while each user only needs to hold his/her respective private key. However, Wu et al.'s protocol can not resist active attacks, such as fabrication. To solve this problem, Zhang et al. proposed an authenticated asymmetric GKA protocol, where each user is authenticated during the negotiation process, so it can resist active attacks. Whereas, Zhang et al.'s protocol needs a partially trusted certificate authority to issue certificates, which brings a heavy certificate management burden. To eliminate such cost, Zhang et al. constructed another protocol in identity-based setting. Unfortunately, it suffers from the so-called key escrow problem. In this paper, we propose the certificateless authenticated asymmetric group key agreement protocol which does not have certificate management burden and key escrow problem. Besides, our protocol achieves known-key security, unknown key-share security, key-compromise impersonation security, and key control security. Our simulation based on the pairing-based cryptography (PBC) library shows that this protocol is efficient and practical.

The Effects of Talent Type and Body Consciousness on High level-Appearance Management Behavior

  • Koo, Insook
    • Journal of Fashion Business
    • /
    • v.16 no.6
    • /
    • pp.1-20
    • /
    • 2012
  • This study aims to define the influences of an individual's talent types and body consciousness factors on high((intense)-level appearance management behavior in 367 adults(female 172 and male 195). The present study is the first to consider both human talent type and the body consciousness on the high level-appearance management behavior correlates to appearance management behaviour. According to the result of the analysis, plastic surgery on body forms or faces are done by few people. However, straightening teeth, ear piercing, removal of spots or imperfections, and eyebrow tattoos are conducted by many consumers without much resistance. It is rather widely accepted, despite the fact that it can cause pain, discomfort, and side-effects. Furthermore, although excessive acts such as muscle training, dieting, weight managing, and oriental treatments can lead to side-effects, the standardized efficient beta value turned out to be high for these treatments. Thus, this study suggests that both the interpersonal talent among 8 talent factors and 2 body consciousness factors contributes to the reinforcement of the self-identity through high level-appearance management behaviors, but except risky plastic surgery. Therefore, this study supports the previous researches that body consciousness composed of self-source, which is desires and efforts to achieve the ideal body, and external-source, which is the internalization of other people's feedbacks.

Improving Security and Privacy-Preserving in Multi-Authorities Ciphertext-Policy Attribute-Based Encryption

  • Hu, Shengzhou;Li, Jiguo;Zhang, Yichen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.10
    • /
    • pp.5100-5119
    • /
    • 2018
  • Most of existing privacy-preserving multi-authorities attribute-based encryption schemes (PP-MA-ABE) only considers the privacy of the user identity (ID). However, in many occasions information leakage is caused by the disclosing of his/her some sensitive attributes. In this paper, we propose a collusion-resisting ciphertext-policy PP-MA-ABE (CRPP-MACP-ABE) scheme with hiding both user's ID and attributes in the cloud storage system. We present a method to depict anonymous users and introduce a managerial role denoted by IDM for the management of user's anonymous identity certificate ($AID_{Cred}$). The scheme uses $AID_{Cred}$ to realize privacy-preserving of the user, namely, by verifying which attribute authorities (AAs) obtain the blinded public attribute keys, pseudonyms involved in the $AID_{Cred}$ and then distributes corresponding private keys for the user. We use different pseudonyms of the user to resist the collusion attack launched by viciousAAs. In addition, we utilize IDM to cooperate with multiple authorities in producing consistent private key for the user to avoid the collusion attack launched by vicious users. The proposed CRPP-MACP-ABE scheme is proved secure. Some computation and communication costs in our scheme are finished in preparation phase (i.e. user registration). Compared with the existing schemes, our scheme is more efficient.

New Construction of Short Certificate-Based Signature against Existential Forgery Attacks

  • Lu, Yang;Wang, Gang;Li, Jiguo;Shen, Jian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.7
    • /
    • pp.3629-3647
    • /
    • 2017
  • Certificate-based cryptography is a useful public key cryptographic primitive that combines the merits of traditional public key cryptography and identity-based cryptography. It not only solves the key escrow problem inherent in identity-based cryptography, but also simplifies the cumbersome certificate management problem in traditional public key cryptography. So far, four short certificate-based signature schemes have been proposed. However, three of them fail in achieving the existential unforgeability under adaptive chosen-message attacks and the remaining one was not constructed in the normal framework of certificate-based signature. In this paper, we put forward a new short certificate-based signature scheme. The proposed scheme is devised in the normal framework of certificate-based signature and overcomes the security weaknesses in the previous short certificate-based signature schemes. In the random oracle model, we formally prove that it achieves the existential unforgeability against adaptive chosen-message attacks. Performance comparison shows that it is efficient and practical.

Resource Evaluation Skill to Set a Development Direction Rural Village (농촌마을 개발방향 설정을 위한 자원 평가기법 연구)

  • Park, Chang-Won;Kwon, Hueck-Jung;Joo, Kyung-Ro
    • Journal of Korean Society of Rural Planning
    • /
    • v.10 no.1 s.22
    • /
    • pp.9-17
    • /
    • 2004
  • For the problems in executing rural development, recent recognitions are that discovery, preservation, and utilization of area-unique resource are unsatisfactory, that participation of local residents was neglected, and that approach to gradual refurbishment of houses and common space of town in consideration of existing spatial pattern of the town was not adequate. Especially, neglect for exact investigation, analysis and evaluation on rural local resources is bringing about social problems such as mass production of uniform rural area and loss of local identity. In this study, rural resources were listed and resource evaluation items was designed in order to establish development direction of rural village. According to these results, for the efficient and reasonable drive of the resource evaluation system, following items are required; A premise of local development by participation of local people, Development of diversely appliable resource evaluation clauses, Establishment of development type in connection with resource evaluation clauses, Systematic management of local resource through spreading DB resource. This research was loused on unearthing direction development of rural village and theme. However, what should be reconsidered through continuous study is that resource evaluation clauses are somewhat general and not concretely illustrated. Therefore establishment of characterized development is expected through clarifying local identity and presenting direction of local development, with the importance of resource and systematic analysis in planning on rural village in the future.

A Study on Efficient Data De-Identification Method for Blockchain DID

  • Min, Youn-A
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.60-66
    • /
    • 2021
  • Blockchain is a technology that enables trust-based consensus and verification based on a decentralized network. Distributed ID (DID) is based on a decentralized structure, and users have the right to manage their own ID. Recently, interest in self-sovereign identity authentication is increasing. In this paper, as a method for transparent and safe sovereignty management of data, among data pseudonymization techniques for blockchain use, various methods for data encryption processing are examined. The public key technique (homomorphic encryption) has high flexibility and security because different algorithms are applied to the entire sentence for encryption and decryption. As a result, the computational efficiency decreases. The hash function method (MD5) can maintain flexibility and is higher than the security-related two-way encryption method, but there is a threat of collision. Zero-knowledge proof is based on public key encryption based on a mutual proof method, and complex formulas are applied to processes such as personal identification, key distribution, and digital signature. It requires consensus and verification process, so the operation efficiency is lowered to the level of O (logeN) ~ O(N2). In this paper, data encryption processing for blockchain DID, based on zero-knowledge proof, was proposed and a one-way encryption method considering data use range and frequency of use was proposed. Based on the content presented in the thesis, it is possible to process corrected zero-knowledge proof and to process data efficiently.

Analysis of profitability and its affecting factors in restaurant franchise firms (외식 프랜차이즈 기업의 수익성과 영향 요인 분석)

  • Park, Hyun-Jeong;Shin, Seo-Young;Yang, Il-Sun;Choi, Kyu-Wan
    • Korean journal of food and cookery science
    • /
    • v.23 no.2 s.98
    • /
    • pp.270-279
    • /
    • 2007
  • The purposes of this study were to analyze the profitability of audited restaurant franchise firms and to investigate the financial variables affecting profitability. This study decomposed profit variation into the three main factors comprising the Du Pont Identity (operating efficiency, asset use efficiency and financial leverage). The operating efficiency of restaurant franchise firms was on the rise until 2004, but dropped dramatically in 2005. Especially, the profit margin dropped from 13.46% in 2004 to 6.54% in 2005. The asset use efficiency has been decreasing since 2003. The total asset turnover ratio, which can be indicative of over-investment, dropped from 1.55 in 2003 to 1.50 in 2005. The financial leverage remained stable after 2002. There were major differences in debt accumulation among the firms, and the current level of debt was thought to be higher in the restaurant industry than in other industries. Based on the results of a multiple regression analysis, we concluded that the factors affecting ROE were the debt-equity ratio, total asset turnover and the size of the firm. The debt-equity ratio and total asset turnover had a significantly positive effect on ROE, while the firm size had a significantly negative effect on ROE. However, the current ratio and sales growth rate were not significant. The finding that firm size and profitability were negatively related implied that restaurant franchise firms should pursue qualitative growth rather than quantitative growth. There was no major difference in profitability between domestic brands and foreign brands. However, the domestic brand was more efficient in terms of asset usage than the foreign brand.