• Title/Summary/Keyword: Multi-Authority

Search Result 89, Processing Time 0.026 seconds

The Role of a Local Authority of Multi-Family Housing Management upon the Revision of Housing Act (주택법개정에 따른 공동주택관리영역에서의 지방자치단체의 역할)

  • 곽인숙
    • Journal of Families and Better Life
    • /
    • v.21 no.5
    • /
    • pp.145-153
    • /
    • 2003
  • The Ministry of Construction & Transportation revised the full text of 'The Act for Promoting Housing Construction' that concentrated to the quantitative supply of houses into 'Housing Act' in order to improve the quantity as well as quality of housing construction and management, such as housing welfare, management or improvement of previous houses, in October 2002. Accordingly, local authority need to play more critical roles in the area of multi-family housing management and remodeling. The desirable roles of local authority called for the need are like followings: 1. Local authority should provide professional knowledge for education, direction and consultation of multi-family housing management rather keeping the previous role to control, manage and regulate it. 2. The multi-family housing management should be changed from administration and punishment to incentive-centered institutions. 3. It is necessary to consider neglected people, such as occupants of rental apartment or of a small-sized multi-family housing, who have been excepted from the subject of obligatory management under the current law. 4. For harmonious and professional housing management, local authority need to support the establishment or special companies for housing management and to strengthen the audit on trust management companies. 5. It calls for the studies on management guideline of multi-family housing, standardization of management specifics, reasonable standard for special mending appropriation amount, etc. 6. They should lead the composition of a community by residents harmoniously and support the encouragement of community consciousness to live together.

IU_AMDroid : An Integrated User Authority Manager Model for the Android Platform (안드로이드 플랫폼을 위한 통합적인 사용자 인증 관리 모델)

  • Nam, Choon-Sung;Jang, Kyung-Soo;Shin, Dong-Ryeol
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.11
    • /
    • pp.533-540
    • /
    • 2013
  • Currently, as the Android platform only supports single-user protection, it needs security solution for multi-users. Specially, it has to protect specific applications which have personal and financial information, and be available to support authority management for contents access. Thus, this paper proposes an integrated user authority manger model for the Android platform. It helps application authority which is capable to divide into three statuses: installation, execution, deletion with the help of information technology.

ON MULTI-AUTHORITY CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION

  • Muller, Sascha;Katzenbeisser, Stefan;Eckert, Claudia
    • Bulletin of the Korean Mathematical Society
    • /
    • v.46 no.4
    • /
    • pp.803-819
    • /
    • 2009
  • In classical encryption schemes, data is encrypted under a single key that is associated with a user or group. In Ciphertext-Policy Attribute-Based Encryption(CP-ABE) keys are associated with attributes of users, given to them by a central trusted authority, and data is encrypted under a logical formula over these attributes. We extend this idea to the case where an arbitrary number of independent parties can be present to maintain attributes and their corresponding secret keys. We present a scheme for multi-authority CP-ABE, propose the first two constructions that fully implement the scheme, and prove their security against chosen plaintext attacks.

A Survey of State-of-the-Art Multi-Authority Attribute Based Encryption Schemes in Cloud Environment

  • Reetu, Gupta;Priyesh, Kanungo;Nirmal, Dagdee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.1
    • /
    • pp.145-164
    • /
    • 2023
  • Cloud computing offers a platform that is both adaptable and scalable, making it ideal for outsourcing data for sharing. Various organizations outsource their data on cloud storage servers for availing management and sharing services. When the organizations outsource the data, they lose direct control on the data. This raises the privacy and security concerns. Cryptographic encryption methods can secure the data from the intruders as well as cloud service providers. Data owners may also specify access control policies such that only the users, who satisfy the policies, can access the data. Attribute based access control techniques are more suitable for the cloud environment as they cover large number of users coming from various domains. Multi-authority attribute-based encryption (MA-ABE) technique is one of the propitious attribute based access control technique, which allows data owner to enforce access policies on encrypted data. The main aim of this paper is to comprehensively survey various state-of-the-art MA-ABE schemes to explore different features such as attribute and key management techniques, access policy structure and its expressiveness, revocation of access rights, policy updating techniques, privacy preservation techniques, fast decryption and computation outsourcing, proxy re-encryption etc. Moreover, the paper presents feature-wise comparison of all the pertinent schemes in the field. Finally, some research challenges and directions are summarized that need to be addressed in near future.

A Design of Interdependent Multi Session Authentication Scheme for Secure Cloud Service (안전한 클라우드 서비스를 위한 상호의존적 다중세션 인증 기법 설계)

  • Song, Jun Ho;Choi, Do Hyun;Park, Jung Oh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.181-196
    • /
    • 2014
  • Cloud computer technology currently provides diverse services based on a comprehensive environment ranging from hardware to solution, network and service. While the target of services has been extended from institutions and corporations to personal infrastructure and issues were made about security problems involved with protection of private information, measures on additional security demands for such service characteristics are insufficient. This paper proposes a multi-session authentication technique based on the characteristics of SaaS (Software as a Service) among cloud services. With no reliable authentication authority, the proposed technique reinforced communication sessions by performing key agreement protocol safe against key exposure and multi-channel session authentication, providing high efficiency of performance through key renewal using optimzied key table. Each formed sessions have resistance against deprivation of individual confirmation and service authority. Suggested confirmation technique that uses these features is expected to provide safe computing service in clouding environment.

Development of a Methodology for Detecting Intentional Aggressive Driving Events Using Multi-agent Driving Simulations (Multi-agent 주행 시뮬레이션을 이용한 운전자 주행패턴을 반영한 공격운전 검지기법 개발)

  • KIM, Yunjong;OH, Cheol;CHOE, Byongho;CHOI, Saerona;KIM, Kiyong
    • Journal of Korean Society of Transportation
    • /
    • v.36 no.1
    • /
    • pp.51-65
    • /
    • 2018
  • Intentional aggressive driving (IAD) is defined as a hazardous driving event that the aggressive driver intentionally threatens neighbor drivers with abrupt longitudinal and lateral maneuvering. This study developed a methodology for detecting IAD events based on the analysis of interactions between aggressive driver and normal driver. Three major aggressive events including rear-close following, side-close driving, and sudden deceleration were analyzed to develop the algorithm. Then, driving simulation experiments were conducted using a multi-agent driving simulator to obtain data to be used for the development of the detection algorithm. In order to detect the driver's intention to attack, a relative evaluation index (Erratic Driving Index, EDI) reflecting the driving pattern was derived. The derived IAD event detection algorithm utilizes both the existing absolute detection method and the relative detection method. It is expected that the proposed methodology can be effectively used for detecting IAD events in support of in-vehicle data recorder technology in practice.

A Study on the Characteristics of FRP Composites and Structural Adhesives (FRP선체 복합재료와 구조용 접착제의 실험적 연구)

  • Choi, Han-Kyu
    • Journal of Korea Ship Safrty Technology Authority
    • /
    • s.26
    • /
    • pp.4-23
    • /
    • 2009
  • 선체용 복합재료 및 구조용 접착제와 신공법인 진공 성형법으로 건조한 레저선박에 강화플라스틱 구조기준을 그대로 적용하기에는 무리가 있으며, 따라서 복합재료, 수지, 접착제 및 진공 성형법 등 현장조사를 토대로 복합소재 및 접착제를 이용한 시험편을 제작하여 복합재료의 기계적 특성, 구조용 접착제에 대한 신뢰성 평가 및 국내외 기준 비교 검토를 통한 국내 실정에 적합한 검사기준을 제안하고자 한다.

  • PDF

Power and Aesthetic Images in Men's fashion (권력과 남성 패션에 표현된 미적 이미지)

  • 이민선
    • The Research Journal of the Costume Culture
    • /
    • v.11 no.2
    • /
    • pp.177-192
    • /
    • 2003
  • The purpose of this study is to define masculinity as a shilling concept, stemming from the process of power groups controlling the conscious and unconscious of human beings to diffuse their ideologies, and to examine how masculinity has been reflected in aesthetic images in men's bodies and fashion. As for the research methodology, literary research and demonstrative studies through the analysis of pictures and photos were undertaken. Emerging in the wake of the Industrial Revolution in the 19th century, the absolute powers such as the bourgeois elite, males and the Wet emphasized the importance of reason, and made aesthetic images such as authority, robustness and modernization in men's fashion. In the conversion to the Information Society, poweres horizintally spread out over society. By using non-reason, diverse power groups have broken down traditional masculinity and express diverse aesthetic images in men's fashion such as eroticism, multi-culturalism and liberation.

  • PDF

Determination of Additives Content in Aviation Turbine Fuel Using Multi-dimensional GC-MS (Multi-dimensional GC-MS를 이용한 항공터빈유의 첨가제 분석)

  • Youn, Ju Min;Jang, Yoon Mi;Yim, Eui Soon;Kim, Seong Lyong;Kang, Yong
    • Journal of the Korean Applied Science and Technology
    • /
    • v.35 no.4
    • /
    • pp.1260-1268
    • /
    • 2018
  • To improve fuel performance and specific characteristics of long storage and moving through fuel systems additives should be added in kerosene type aviation turbine fuel (AVTUR) such as antioxidant, fuel system icing inhibitor (FSII), electric conductivity improvers and so on. The dosage of additives has to be analyzed qualitatively and quantitatively due to inspect the quality of abnormal fuel and distinguish other petroleum products. Multi-dimensional GC-MS (MDGC-MS) with Deans switching technique are applied the determination of antioxidant and FSII, which are added with AVTUR containing complex mixture of hydrocarbons. Antioxidant and FSII in the range of 2.5-20 mg/L was quantitatively and qualitatively analyzed using MDGC-MS and the detection limit was about twice as low as that of the 1-dimensional GC-MS results. The method in this study has been higher peak resolution compared with GC-MS and could be simultaneously analyzed different two additives without sample pre-treatment.