• Title/Summary/Keyword: Key Member

Search Result 360, Processing Time 0.026 seconds

An Empirical Study on the Turnover Awareness of Key Member In Research Institute of High Technology Company (대기업 첨단기술 연구소의 핵심인재 이직인식에 관한 실증연구)

  • Lee, Jae-Ha
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.28 no.4
    • /
    • pp.1-6
    • /
    • 2005
  • This study is to investigate empirically the turnover awareness of key member working in Research & Development Division in high technology electronic R&D institute. Through the analysis of 106 questionnaires and individual depth interview with key member who is evaluated as core researcher and developer in their working project or has good results in the last 2-3 years, this study obtains the practical informations on the understandings of their professional consciousness and extend of turnover awareness etc. The findings are as follows. Two-thirds of the researcher has the mind of turnover to improve job stability and develop their career. They have an self-awareness that they are key member as a core competent person in working project and their organization, but are dissatisfied with the underestimation of their performances that are not recognized by the organization as they expected level. And the result indicates that many of them haven't find their visions in their organization.

The Study of Efficient Rekey Interval Allotment for Minimum Cost on Secure Multicast (보안 멀티캐스트 환경에서 최소비용을 위한 효과적인 Rekey Interval 할당에 관한 연구)

  • Baag, Jin-Young;Lee, Goo-Yeon;Lee, Yong
    • Journal of Industrial Technology
    • /
    • v.21 no.A
    • /
    • pp.123-127
    • /
    • 2001
  • This paper proposed for allotment of group key's rekey interval required from secure multicast environment. New group key distribution occurs in two cases: one is periodical update and the other is permitted or unpermitted withdrawal of group member. In later case, the group controller distributes new group key to member except withdrawal member because it can't predict precisely. In former case, the group member who cheated the group can adjust the rekey interval. Using relation between security level, overhead and cost from rekey interval, this paper suggests effective rekey interval allotment through probable performance analysis in large dynamic group.

  • PDF

Re-Ordering of Users in the Group Key Generation Tree Protocol (사용자 순서 재조정을 통한 그룹 키 생성 트리 프로토콜)

  • Hong, Sung-Hyuck
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.247-251
    • /
    • 2012
  • Tree-based Group Diffie-Hellman (TGDH) is one of the efficient group key agreement protocols to generate the GK. TGDH assumes all members have an equal computing power. As one of the characteristics of distributed computing is heterogeneity, the member can be at a workstation, a laptop or even a mobile computer. Therefore, the group member sequence should be reordered in terms of the member's computing power to improve performance. This research proposes a reordering of members in the group key generation tree to enhance the efficiency of the group key generation.

Efficient and Secure Group Key Generation Protocol for Small and Medium Business

  • Jung, Hyun Soo
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.4
    • /
    • pp.19-23
    • /
    • 2014
  • Group communication is becoming increasingly popular in Internet applications such as videoconferences, online chatting programs, games, and gambling. For secure communications, the integrity of messages, member authentication, and confidentiality must be provided among group members. To maintain message integrity, all group members use the Group Key (GK) for encrypting and decrypting messages while providing enough security to protect against passive attacks. Tree-based Group Diffie-Hellman (TGDH) is an efficient group key agreement protocol to generate the GK. TGDH assumes all members have an equal computing power. One of the characteristics of distributed computing and grid environments is heterogeneity; the member can be at a workstation, a laptop or even a mobile computer. Member reordering in the TDGH protocol could potentially lead to an improved protocol; such reordering should capture the heterogeneity of the network as well as latency. This research investigates dynamic reordering mechanisms to consider not only the overhead involved but also the scalability of the proposed protocol.

  • PDF

Sensitivity Analysis Related to Redundancy of Regular and Irregular Framed Structures after Member Disappearance

  • Ito, Takumi;Takemura, Toshinobu
    • International Journal of High-Rise Buildings
    • /
    • v.3 no.4
    • /
    • pp.297-304
    • /
    • 2014
  • Recently, there have been some reported examples of structural collapse due to gravity, subsequent to damage from accident or an excitation that was not prepared for in the design process. A close view of new concepts, such as a redundancy and key elements, has been taken with the aim of ensuring the robustness of a structure, even in the event of an unexpected disturbance. The author previously proposed a sensitivity index of the vertical load carrying capacity to member disappearance for framed structures. The index is defined as the ratio of the load carrying capacity after a member or a set of an adjacent member disappears, to the original load carrying capacity. The member with the highest index may be regarded as a key element. The concept of bio-mimicry is being applied to various fields of engineering, and tree-shaped structures are sometimes used for the design of building structures. In this study a sensitivity analysis is applied to the irregular-framed structures such as tree-shaped structures.

A Data Sharing Scheme with Security and Flexibility (보안성과 유연성을 갖춘 데이터 공유 방안)

  • Lee, Goo-Yeon;Kim, Hwa-Jong;Jeong, Choong-Kyo
    • Journal of Industrial Technology
    • /
    • v.24 no.B
    • /
    • pp.193-198
    • /
    • 2004
  • We propose and analyse a flexible secure file sharing scheme which can be used for data sharing among members in P2P environment. When a member wants to share data, notification messages are sent to the members with whom the member wants to share data. Each notification message includes one-time password encrypted with the receiver's public key. A member who received the notification message can download the data by using the one-time password. The proposed scheme provides selective sharing, download confirmation and efficient memory management. In terms of security, the proposed scheme supports authentication, entity privacy, replay attack protection and disguise prevention.

  • PDF

Design and Implementation of Providing Conditional Access Broadcasting Service System (수신 제한된 방송 서비스 제공 시스템 설계 및 구현)

  • Kim, Dong-Ok;Shin, Ik-Ryong
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.8 no.2
    • /
    • pp.64-71
    • /
    • 2009
  • In this paper, This thesis is cell phone for make CAS service be for hand joining broadcasting Create a way CAS Chip. PerSam issue card inside use Seed Key and algorithm make CID Key and record CAS Chip. PerSam member Card inside use Seed Key and algorithm make Subscriber Key after include Subscriber. Key CAS Chip for record CID Key register EMM. make CAS CHIP in accordance with issue CAS Chip. broadcast service entry be for hand treatment so make low bandwidth for joining massage and make increase a member.

  • PDF

A Study on Efficient Group Member Authentication and Key Management Scheme for Multicast Security in MANET (MANET에서 멀티캐스트 보안을 위한 효율적인 그룹 멤버 인증 및 키 관리 기법 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.4
    • /
    • pp.115-123
    • /
    • 2017
  • The mutual cooperation among nodes is very important because mobile nodes participating in MANET communicate with limited resources and wireless environment. This characteristic is important especially in environment that supports group communication. In order to support the secure multicast environment, it is important enough to affect performance to provide accurate authentication method for multicast group members and increase the integrity of transmitted data. Therefore, we propose a technique to provide the multicast secure communication by providing efficient authentication and group key management for multicast member nodes in this paper. The cluster structure is used for authentication of nodes in the proposed technique. In order to efficient authentication of nodes, the reliability is measured using a combination of local trust information and global trust information measured by neighboring nodes. And issuing process of the group key has two steps. The issued security group key increases the integrity of the transmitted data. The superiority of the proposed technique was confirmed by comparative experiments.

ID-Based Group Key Management Protocols for Dynamic Peer Groups (피어 그룹을 위한 ID 기반의 그룹키 관리 프로토콜)

  • Park, Young-Ho;Lee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.7
    • /
    • pp.922-933
    • /
    • 2004
  • In recent years, peer-to-peer network have a greate deal of attention for distributed computing or collaborative application, and work of ID-based public key systems have been focusing on the area of cryptography. In this paper, we propose ID-based group key management protocols for secure communication in autonomous peer group. Each member obtains his public/private key pair derived from his identification string from Private Key Generator. No central server participates in group key management protocol instead, all group members share the burden of group key management by the collaboration of themselves, so that our scheme avoids the single point of failure problem. In addition, our scheme considers the nature of dynamic peer group such as frequent joining and leaving of a member.

  • PDF

A study on the member forces of segmental linings considering key segments (TBM 세그먼트 조립 특성에 따른 부재력 변화 연구)

  • Woo, Seungjoo;Yoo, Chungsik
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.17 no.3
    • /
    • pp.363-382
    • /
    • 2015
  • This paper presents a numerical study on the effect of segment assembly characteristics on the TBM segmental lining member section forces. Analyses have been carried out through the two-ring beam finite element model by Midas civil 2012+. TBM segment lining member forces are determined by various joint characteristics. In this study, the segmental member forces were investigated with various joint number and orientation at fixed values of joint stiffness, ground spring parameters. The numerical results were used to identify trends of the member forces in the tunnel lining with the segment assembly characteristics.