• Title/Summary/Keyword: Mutual Trust

Search Result 244, Processing Time 0.026 seconds

Hybrid Authentication Scheme for Mobile Multi-hop Relay in IEEE 802.16j (IEEE 802.16j기반의 모바일 멀티 홉 릴레이에서의 혼합형 인증 기법에 대한 연구)

  • Lee, Yong;Lee, Goo-Yeon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.10
    • /
    • pp.127-136
    • /
    • 2007
  • It is easy to install and maintain a mobile multi-hop wireless network due to its self-organizing characteristics. However it has security weakness of the authentication of mobile multi-hop relay stations. Specially, the mobile multi-hop relay network in the IEEE 802.16j has the additional security weakness caused by the requirement of backward compatibility for mobile stations of the conventional IEEE 802.16 system. In this paper, we propose a novel mutual authentication scheme applicable to IEEE 802.16j-based mobile multi-hop relay network architecture. The scheme is able to resolve the initial trust gain problem of a multi-hop node at its entry to the network, the problem of rogue mobile multi-hop node and the problem of hop-by-hop authentication between multi-hop nodes. Effectively, the scheme is a hybrid scheme of the distributed authentication method and the centralized authentication method which have been considered to be deployed in the wireless ad-hoc network and the wireless network connected to wired authentication servers, respectively. Also, we analyze the effectiveness of the proposed hybrid authentication method.

Counter-Terrorism Strategy of Terrorism and Developmental plan of Private Security in Korea (한국의 테러리즘의 대테러전략과 민간시큐리티의 역할증대방안)

  • Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.195-214
    • /
    • 2007
  • The purpose of this research is to suggest a construction device that can transform a public safety, security service, security system on counter-terrorism device system, from government leading type to private management type. There are purpose on this thesis to research for the bringing up counter-terrorism experts certification system and about all sorts of developed device among our country's counter-terrorism situation and through comparing developed country's private security's developing device. This summary of thesis is like below. First we need to establish total counter-terrorism center, like developed country on national corresponding strategy. Second, we need to make an organization as a country security department unified as an America's President directly belonging organization. Third, it is to legislate about an counter-terrorism. Fourth, we need to make a coorperate system according to counter-terrorism duty come under private management, so that can recover a trust among people. Fifth, a terror warning system is necessary. Private security's mutual relationship and developing devices is First, it is necessary to bring up counter-terrorism expert. Second, it is necessary to bring in counter-terrorism experts certification system. Third, counter-terrorism research center that come under private management is necessary. The university, private security related academy, should establish research center for the private security industry's specialization, subdivision. It is considered that various research need to be continued after by bringing up counter-terrorism experts, transforming a consciousness, counter-terrorism education, building an equipment and education center, not for a special group, that can minimize human infringement.

  • PDF

IR Activity and Stock Price Behavior (기업 IR활동과 정보효과)

  • Choi, Seung-Bin;Cho, Jun-Hee
    • Korean Business Review
    • /
    • v.16
    • /
    • pp.169-184
    • /
    • 2003
  • IR(Investor Relation) is an active management activity to provide well balanced information to investors which can reduce asymmetry of information between investors and management. This activity could contribute to the long-term development of corporation with increased mutual trust between investors and management. Consequently, in these days, ill is widely recognized as an effective measure of securing corporate transparency, maximization corporate value, and stock-holder oriented management. The purpose of this study is to examine the effect of corporate IR activity on investment behavior as well as stock price. It is assumed that if asymmetry of information between investors and management is cured by active ill activity from a corporation, with more transparent and reliable information of the firm at hand investors would more actively involved in trading. Statistically speaking, I assumed that the more information provided by ill activities, the higher value of a corporation at the stock trading.

  • PDF

A Study on Factors Affecting Formation of Social Capital for Volunteer Fire Brigade (의용소방대의 사회적 자본 영향요인 분석)

  • Woo, Seong-Cheon;Chae, Jin;Go, Gi-Bong
    • Fire Science and Engineering
    • /
    • v.28 no.1
    • /
    • pp.64-70
    • /
    • 2014
  • A Volunteer Fire Brigade is a voluntary social services organization that performs various assistance works in fire fighting activities such as fire fighting and rescue of human lives on a part-time basis. Recently, it has also assumed an important role in the creation of security culture of local society. Besides, it provides diverse service activities related to security of local society. However, as this kind of volunteer fire brigade organization is not in a vigorous state, research for an improvement is being carried out in earnest. As part of a vitalization plan of the volunteer fire brigade, an attempt was made in this research to present an activation plan of the volunteer fire brigade through formation of social capital. Accordingly, efforts were made in this research to investigate and analyze an awareness of social capital among the volunteers and to present on this basis a plan for formation of social capital for the volunteer fire brigade of local society. As a result of the research, it turned out that social norm has the major effect on the formation of social capital for volunteer fire brigade. Therefore, it is our belief that an independent statute should be established to nurture and develop volunteer fire brigades. And when strong mutual trust among the volunteers are formed and efforts for devotion to local society are made on this basis, the security level of local society will be enhanced further.

Subject and Prospect of Terror Confrontation National Institution (테러대응을 위한 국가기관의 과제와 전망)

  • Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.157-172
    • /
    • 2008
  • The purpose of this research is to suggest a construction device that can transform a public safety, security service, security system on counter- terrorism device system, from government leading type to private management type. There are purpose on this thesis to research for the bringing up counter-terrorism experts certification system and about all sorts of developed device among our country's counter-terrorism situation and through comparing developed country's private security's developing device. This summary of thesis is like below. First we need to establish total counter-terrorism center, like developed country on national corresponding strategy. Second, we need to make an organization as a country security department unified as an America's President directly belonging organization. Third, it is to legislate about an counter-terrorism. Fourth, we need to make a coorperate system according to counter-terrorism duty come under private management, so that can recover a trust among people. Fifth, a terror warning system is necessary. Private security's mutual relationship and developing devices is First, it is necessary to bring up counter-terrorism expert. Second, it is necessary to bring in counter-terrorism experts certification system. Third, counter-terrorism research center that come under private management is necessary. It is considered that various research need to be continued after by bringing up counter-terrorism experts, transforming a consciousness, counter- terrorism education, building an equipment and education center, not for a special group, that can minimize human infringement.

  • PDF

The Influence Analysis of Value Engineering for the Public Empoyer's Decision Marking - Focused on the Project Life Cycle - (공공발주자 의사결정에 미치는 가치공학(VE)의 영향력 분석 - 프로젝트 생애주기를 중심으로 -)

  • Park, Jongsoon;Chun, Jaeyoul
    • Korean Journal of Construction Engineering and Management
    • /
    • v.16 no.2
    • /
    • pp.12-20
    • /
    • 2015
  • The public employers are faced the mounting importance of decision process to settle the optimum VE delivery system of such public facilities buildings and etc. The elements of decision process of the public employer are formed in the various relationships of the concerned and when the projects are coming into effect, the decision process in the VE delivery method and the selection of contractor will be the name of the game. The decision process in the VE delivery method and the selection of contractor are created a case to be one and the same as well as initiates a consistency for the performance. However, the function and role of the public employer are projective accordingly to the organization of employer and the employer especially no system is equal to the capability of perfect evaluation and verification of the ability of the employer. Especially the lowest bidder policy that started with justification to increase the competitiveness and technical capability of the contractors through the completion in between contractors has been providing the hotbed for insolvency, irregularity and irrationality as a result. From this point of view it is declared that the buildup the edifice of supporting system in the process of decision to recover the mutual trust and respect of the concerned in the VE delivery system with the technostress and the systematization based on drawing the elements which affect the decision process of public employer.

Organizational Culture Difference of Social Enterprises and Commercial Enterprises, and Impact Relations on Social and Economic Outcomes (사회적기업과 영리기업간 조직문화차이와 조직성과에 미치는 영향)

  • Kim, Mi-Hwa;Lee, Yong-Jae
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.12
    • /
    • pp.667-676
    • /
    • 2016
  • The purpose of study was to determine the differences in organizational culture between social enterprises and commercial enterprises and assess the impact on organizational performance in Korea. Main results are as follows. First, Social enterprises employ a lot of low-imcome women and the elderly worker. Second, rational culture is high in profit businesses, but cultural group is high in social enterprises. In commercial enterprise, productivity and efficiency, planning and goal setting, assessing goals and looking for the evaluation of the performance are important. and in social enterprise, affinity and participation, employees individual development and group morale and cohesion, emphasis on mutual cooperation and trust are important. In addition, both social performance and economic performance, social enterprises are higher than in commercial enterprises. Social enterprises are operating transparently based on workers participation and understanding is expected that economic performance is also highly recognized. Third, social performance is higher development and group culture are higher in commercial enterprises, and development, group and hierarchy culture are higher in social enterprises. Economic performance is higher reasonal culture is lower in commercial enterprises, and group culture is higher in social enterprises. Therefore, the social enterprise workers are recognizing social and economic performance are higher than commercial enterprise workers. In short, social enterprises is making discriminatory organizational culture, and this is contributing to achieving organizational performance.

Analyzing the Negotiation Process for the Adoption of Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing Arising from their Utilization using the Conflict Management Process (갈등 관리 프로세스에 의한 ABS협상의 갈등 사례 분석)

  • Min, Seo-Jeong;Lee, Gwan-Gyu;Kim, Joon-Soon
    • Journal of Environmental Policy
    • /
    • v.10 no.2
    • /
    • pp.3-19
    • /
    • 2011
  • Nagoya Protocol designed to establish criteria about material trade of biological genetic resources(ABS) was adopted in the 10th conference of the Parties to the Convention on Biological Diversity. In the course of the negotiation for adoption of the protocol, there was conflict between developed and developing countries, resource-rich and poor countries, and multinational corporations and environmentalists. This study investigates conflict process, subjects, issues and major factors in the negotiation case, and analyzes the negotiation by using the Conflict Management Process. To develope conflict management strategies for various conflict cases, we examine previous studies and analyze the intersectional conflict factors of this case and general cases, such as Fundamental side, Resource-allocation side, and Communication/Information-sharing side. These analyses of conflict prevention/resolution of the ABS negotiation show the importance of building mutual trust among stakeholders, enhancing mediator training, and constructing appropriate legislative/policy systems for successful conflict management.

  • PDF

Secure and Efficient Protocol for Vehicular Communication with Privacy Preservation (프라이버시를 보호하며 안전하고 효율적인 차량간 통신 프로토콜)

  • Kim, In-Hwan;Choi, Hyoung-Kee;Kim, Jung-Yoon
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.6
    • /
    • pp.420-430
    • /
    • 2010
  • Due to increasing demand for improving road safety and optimizing road traffic, Vehicular Ad-Hoc Networks (VANET) have been subject to extensive attentions from all aspects of commercial industry and academic community. Security and user privacy are fundamental issues for all possible promising applications in VANET. Most of the existing security proposals for secure VANET concentrate authentication with privacy preservation in vehicle-to-vehicle (V2V) and vehicle-to-roadside infrastructure (V2I) communications and require huge storage and network capacity for management of revocation list. Motivated by the fact, we propose a new scheme with security and privacy preservation which combines V2V and V2I communication. With our proposed scheme, the communication and computational delay for authentication and overhead for management of revocation list can be significantly reduced due to mutual authentication between a vehicle and a Roadside Unit (RSU) requires only two messages, and the RSU issues the anonymous certificate for the vehicle on behalf of the Trust Authority (TA). We demonstrate that the proposed protocol cannot only guarantee the requirements of security and privacy but can also provide efficiency of authentication and management of revocation list.

A step-by-step service encryption model based on routing pattern in case of IP spoofing attacks on clustering environment (클러스터링 환경에 대한 IP 스푸핑 공격 발생시 라우팅 패턴에 기반한 단계별 서비스 암호화 모델)

  • Baek, Yong-Jin;Jeong, Won-Chang;Hong, Suk-Won;Park, Jae-Hung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.6
    • /
    • pp.580-586
    • /
    • 2017
  • The establishment of big data service environment requires both cloud-based network technology and clustering technology to improve the efficiency of information access. These cloud-based networks and clustering environments can provide variety of valuable information in real-time, which can be an intensive target of attackers attempting illegal access. In particular, attackers attempting IP spoofing can analyze information of mutual trust hosts constituting clustering, and attempt to attack directly to system existing in the cluster. Therefore, it is necessary to detect and respond to illegal attacks quickly, and it is demanded that the security policy is stronger than the security system that is constructed and operated in the existing single system. In this paper, we investigate routing pattern changes and use them as detection information to enable active correspondence and efficient information service in illegal attacks at this network environment. In addition, through the step-by -step encryption based on the routing information generated during the detection process, it is possible to manage the stable service information without frequent disconnection of the information service for resetting.