• Title/Summary/Keyword: Outsourced

Search Result 134, Processing Time 0.023 seconds

Activation plans for e-logistics of information era (정보화시대의 e-물류 효율화방안)

  • Lee, Shin-Kyuo
    • The Journal of Information Technology
    • /
    • v.7 no.1
    • /
    • pp.87-104
    • /
    • 2004
  • This study is to understand basic knowledge on e-logistics through the analysis of third party logistics(3PL) as well as fourth party logistics(4PL) and to suggest some activation plans of e-logistics of information era to get competition in the field of international logistics. Compared with advanced countries, Korean companies has not activated 3PL logistics as Korean companies are not inclined to open their business information to others and they didn't recognize the importance of logistics. As the business environments are worsening little by little, there has been greater concerns for e-logistics as a way of focusing on the core-business. Most of Korean companies has outsourced simple and limited scope of 3PL and 4PL services with 1st level of logistics outsourcing. To activate e-logistics, Korean government and private enterprises have to pursue the following strategies. First, Korean government should change the present laws preventing the enterprises specialized in 3PL from doing business and should pursue logistics information and standardization. Also the government needs to support 3PL companies. Second, private companies do their best to retain and develope factors of logistics resources professional and to develope the latest technology. 3PL providers have pursue effective logistics strategies and to invest capitals for the information technology.

  • PDF

A Spatial Transformation Scheme Supporting Data Privacy and Query Integrity for Outsourced Databases (아웃소싱 데이터베이스에서 데이터 프라이버시 및 질의 무결성을 지원하는 공간 변환 기법)

  • Kim, Hyeong-Il;Song, Young-Ho;Chang, Jaewoo
    • Journal of KIISE
    • /
    • v.42 no.5
    • /
    • pp.652-663
    • /
    • 2015
  • Due to the popularity of location-based services, the amount of generated spatial data in daily life has been dramatically increasing. Therefore, spatial database outsourcing has become popular for data owners to reduce the spatial database management cost. The most important consideration in database outsourcing is meeting the privacy requirements and guarantying the integrity of the query result. However, most of existing database transformation techniques do not support both of the data privacy and integrity of the query result. To solve this problem, we propose a spatial data transformation scheme that utilizes the shearing transformation with rotation shifting. In addition, we described the attack models to measure the data privacy of database transformation schemes. Finally, we demonstrated through the experimental evaluations that our scheme provides high level of data protection against different kinds of attack models, compared to the existing schemes, while guaranteeing the integrity of the query result sets.

A Study on the Costume of Ball Jointed Dolls as Cultural Product with Application of Ladies' Costume Culture from Late Goryeo to Early Joseon (고려말 조선초의 상류층 여성 복식문화를 응용한 구체관절인형의상 문화상품 연구)

  • Choi, Jeong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.9
    • /
    • pp.3815-3826
    • /
    • 2011
  • TThis study was undertaken to make trial costumes of ball jointed dolls for promoting the beauty of Korean cultural product with historical research of upper class ladie's costume from late Goryeo to early Joseon, the very unknown period in the Korean costume history. The ladies' costume from late Goryeo to early Joseon are characterized by their full silhouette, fusion with clothings of Yuan and Ming, revival of early Goryeo styles, well-developed weaving skill of ramie, a showy costume from Buddhist civilization. After investigation of researcher with literature, painting, and relics in 13-14C, 8 clothing items were outsourced totally. Items were formed as a set concept, but consumer can choose each costume as an single item and can make varied mix also. Dart, small ties, and thick fabrics were used in doll costumes partly because ball jointed doll's body has different characteristics from that of human beings. Developing research of manufacturing company's system for ready-made product remains to be considered in the future.

A Study of the Way How Korean Fashion Brand Company Makes their Order Arrangement - Focused on fashion brand companies in Seoul - (국내 의류 브랜드 업체의 오더 의뢰방식에 관한 실태조사 - 서울시 의류 브랜드 업체를 중심으로 -)

  • Heo, Hyun-seo;Lim, Ho-sun
    • Fashion & Textile Research Journal
    • /
    • v.21 no.2
    • /
    • pp.179-188
    • /
    • 2019
  • Domestic apparel products labeled as 'Made in Korea' in the Chinese market are recognized as a high quality products due to the influence of the Korean Wave (Intergen Consulting Group, 2007). This study analyzes the patterns and order arrangement types of a fashion brand company commissioned to produce apparel in Seoul, Korea in order to rebuild a network of small sewing factories scattered in Korea, reorganize operations, and to find the possibility of regenerating the Korean sewing industry by establishing contact points with domestic sewing factories. We surveyed 100 apparel brand companies in Seoul listed in the 2014/2015 Korea Fashion Brand Annual (Apparel News, 2014) and conducted a questionnaire survey on the company's general management status, type of fabric materials dealt with, and major contact points and methods of production handling. The frequency analysis indicated that the main production material with cloth type was woven fabric with ladies' clothes. The Planning MD team has the highest rate of ordering production with delivery method to the production factory after purchasing fabric and trims. Most respondents answered that they would select a production factory based on recommendations from acquaintances. This was due to a lack of no objective indicator provided by the sewing factory at present and the absence of objectively proceeded communication with brand companies. In this study, we analyze various conditions and measurements for production arrangements from a fashion brand company to revitalize sewing factories in Korea.

Privacy-Preserving k-means Clustering of Encrypted Data (암호화된 데이터에 대한 프라이버시를 보존하는 k-means 클러스터링 기법)

  • Jeong, Yunsong;Kim, Joon Sik;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1401-1414
    • /
    • 2018
  • The k-means clustering algorithm groups input data with the number of groups represented by variable k. In fact, this algorithm is particularly useful in market segmentation and medical research, suggesting its wide applicability. In this paper, we propose a privacy-preserving clustering algorithm that is appropriate for outsourced encrypted data, while exposing no information about the input data itself. Notably, our proposed model facilitates encryption of all data, which is a large advantage over existing privacy-preserving clustering algorithms which rely on multi-party computation over plaintext data stored on several servers. Our approach compares homomorphically encrypted ciphertexts to measure the distance between input data. Finally, we theoretically prove that our scheme guarantees the security of input data during computation, and also evaluate our communication and computation complexity in detail.

Fine-Grained and Traceable Key Delegation for Ciphertext-Policy Attribute-Based Encryption

  • Du, Jiajie;HelIl, Nurmamat
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3274-3297
    • /
    • 2021
  • Permission delegation is an important research issue in access control. It allows a user to delegate some of his permissions to others to reduce his workload, or enables others to complete some tasks on his behalf when he is unavailable to do so. As an ideal solution for controlling read access on outsourced data objects on the cloud, Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has attracted much attention. Some existing CP-ABE schemes handle the read permission delegation through the delegation of the user's private key to others. Still, these schemes lack the further consideration of granularity and traceability of the permission delegation. To this end, this article proposes a flexible and fine-grained CP-ABE key delegation approach that supports white-box traceability. In this approach, the key delegator first examines the relations between the data objects, read permission thereof that he intends to delegate, and the attributes associated with the access policies of these data objects. Then he chooses a minimal attribute set from his attributes according to the principle of least privilege. He constructs the delegation key with the minimal attribute set. Thus, we can achieve the shortest delegation key and minimize the time of key delegation under the premise of guaranteeing the delegator's access control requirement. The Key Generation Center (KGC) then embeds the delegatee's identity into the key to trace the route of the delegation key. Our approach prevents the delegatee from combining his existing key with the new delegation key to access unauthorized data objects. Theoretical analysis and test results show that our approach helps the KGC transfer some of its burdensome key generation tasks to regular users (delegators) to accommodate more users.

Factors influencing the organizational commitment and work performance of outsourced workers (아웃소싱 근로자의 조직몰입과 업무성과에 미치는 영향요인)

  • Choi, Rak-Gu;You, Yen-Yoo
    • Journal of Digital Convergence
    • /
    • v.20 no.5
    • /
    • pp.453-461
    • /
    • 2022
  • This study designed a research model to analyze the relationship between organizational commitment and work performance for outsourcing workers. The path relationship was analyzed using the PLS-SEM of the sample collected through the survey. As a result of the study, organizational support perception had a direct effect on the work performance of outsourcing workers, and the company commitment and customer company commitment had a mediating effect. In addition, it was confirmed that the workers showed dual commitment to the company and the customer company, and the organizational commitment to both companies was complementary. It was also suggested that the outsourcing company's organizational support activities are more important for improving the work performance of workers.

Improving Efficiency of Encrypted Data Deduplication with SGX (SGX를 활용한 암호화된 데이터 중복제거의 효율성 개선)

  • Koo, Dongyoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.8
    • /
    • pp.259-268
    • /
    • 2022
  • With prosperous usage of cloud services to improve management efficiency due to the explosive increase in data volume, various cryptographic techniques are being applied in order to preserve data privacy. In spite of the vast computing resources of cloud systems, decrease in storage efficiency caused by redundancy of data outsourced from multiple users acts as a factor that significantly reduces service efficiency. Among several approaches on privacy-preserving data deduplication over encrypted data, in this paper, the research results for improving efficiency of encrypted data deduplication using trusted execution environment (TEE) published in the recent USENIX ATC are analysed in terms of security and efficiency of the participating entities. We present a way to improve the stability of a key-managing server by integrating it with individual clients, resulting in secure deduplication without independent key servers. The experimental results show that the communication efficiency of the proposed approach can be improved by about 30% with the effect of a distributed key server while providing robust security guarantees as the same level of the previous research.

Reinforcement Learning for Minimizing Tardiness and Set-Up Change in Parallel Machine Scheduling Problems for Profile Shops in Shipyard (조선소 병렬 기계 공정에서의 납기 지연 및 셋업 변경 최소화를 위한 강화학습 기반의 생산라인 투입순서 결정)

  • So-Hyun Nam;Young-In Cho;Jong Hun Woo
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.60 no.3
    • /
    • pp.202-211
    • /
    • 2023
  • The profile shops in shipyards produce section steels required for block production of ships. Due to the limitations of shipyard's production capacity, a considerable amount of work is already outsourced. In addition, the need to improve the productivity of the profile shops is growing because the production volume is expected to increase due to the recent boom in the shipbuilding industry. In this study, a scheduling optimization was conducted for a parallel welding line of the profile process, with the aim of minimizing tardiness and the number of set-up changes as objective functions to achieve productivity improvements. In particular, this study applied a dynamic scheduling method to determine the job sequence considering variability of processing time. A Markov decision process model was proposed for the job sequence problem, considering the trade-off relationship between two objective functions. Deep reinforcement learning was also used to learn the optimal scheduling policy. The developed algorithm was evaluated by comparing its performance with priority rules (SSPT, ATCS, MDD, COVERT rule) in test scenarios constructed by the sampling data. As a result, the proposed scheduling algorithms outperformed than the priority rules in terms of set-up ratio, tardiness, and makespan.

Outsourcing decryption algorithm of Verifiable transformed ciphertext for data sharing

  • Guangwei Xu;Chen Wang;Shan Li;Xiujin Shi;Xin Luo;Yanglan Gan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.4
    • /
    • pp.998-1019
    • /
    • 2024
  • Mobile cloud computing is a very attractive service paradigm that outsources users' data computing and storage from mobile devices to cloud data centers. To protect data privacy, users often encrypt their data to ensure data sharing securely before data outsourcing. However, the bilinear and power operations involved in the encryption and decryption computation make it impossible for mobile devices with weak computational power and network transmission capability to correctly obtain decryption results. To this end, this paper proposes an outsourcing decryption algorithm of verifiable transformed ciphertext. First, the algorithm uses the key blinding technique to divide the user's private key into two parts, i.e., the authorization key and the decryption secret key. Then, the cloud data center performs the outsourcing decryption operation of the encrypted data to achieve partial decryption of the encrypted data after obtaining the authorization key and the user's outsourced decryption request. The verifiable random function is used to prevent the semi-trusted cloud data center from not performing the outsourcing decryption operation as required so that the verifiability of the outsourcing decryption is satisfied. Finally, the algorithm uses the authorization period to control the final decryption of the authorized user. Theoretical and experimental analyses show that the proposed algorithm reduces the computational overhead of ciphertext decryption while ensuring the verifiability of outsourcing decryption.