• Title/Summary/Keyword: Personal Environment Service

Search Result 451, Processing Time 0.032 seconds

Extended 3-Party Mutual Authentication Protocols for the Virtual Home Environment in Next Generation Mobile Networks (차세대 이동통신 네트워크의 Virtual Home Environment 구조에 적용 가능한 3자간 상호 인증 프로토콜)

  • Jeong, Jong-Min;Lee, Goo-Yeon;Lee, Yong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.4
    • /
    • pp.22-29
    • /
    • 2003
  • In the virtual home environment (VHE), which was proposed to offer global roaming and personal service environment portability, user's profiles and service logics are conveyed from home network to visited network to provide services at the visited network. Because user's profiles and service logics may contain confidential information, some procedures for mutual authentication among entities for offering confidence are needed. For these issues, we propose and analyze three 3-Party mutual authentication Protocols adaptable to the VHE in 3G ; password based mutual authentication protocol, mutual authentication protocol with CHAP and key exchange and mutual authentication protocol with trusted third party.

PosCFS+: A Self-Managed File Service in Personal Area Network

  • Lee, Woo-Joong;Kim, Shi-Ne;Park, Chan-Ik
    • ETRI Journal
    • /
    • v.29 no.3
    • /
    • pp.281-291
    • /
    • 2007
  • Wearable computers consisting of various small devices such as smart phones, digital cameras, MP3 players and specialized I/O devices in personal area networks will play an important role in future ubiquitous computing. In this environment, accessing user data is quite complex due to the dynamic and heterogeneous characteristics of the underlying networks. Moreover, since the amount of user data increases rapidly, automatic data backup management is also critical. To overcome these challenges, several studies have been conducted including our previously proposed file service system, PosCFS, which could be adapted to the requirements with a virtualization technique allowing per-user global namespace for managing and accessing data stored on physical storage spaces detected in PAN. In this paper, we present a smart file service framework, PosCFS+ which is an improved and extended version of our previous work. Performance improvement is made possible by redesigning the metadata management scheme based on database and keywords rather than ontology. In addition, the automatic data replication management is newly designed based on the OSD protocol.

  • PDF

A Study of Personal Characteristics Influencing Cloud Intention (클라우드 사용의도에 영향을 미치는 개인특성 연구)

  • Kim, Jin Bae;Cho, Myeonggil
    • Journal of Information Technology Applications and Management
    • /
    • v.26 no.3
    • /
    • pp.135-157
    • /
    • 2019
  • Information technology has economic, social and cultural impacts is closely linked to our lives. This information technology is becoming a key to the change of human civilization through connecting people and objects on the earth. In addition, future information technology is becoming more intelligent and personalized with the development of computing technology, and due to the rapid development of alcohol, environment without time and space constraint is realized, Is spreading. Since existing portable storage media are made of physical form, there is a limit to usage due to the risk of loss and limitation of capacity. Cloud services can overcome these limitations. Due to the problems of existing storage media, it is possible to overcome the limitations of storing, managing and reusing information through cloud services. Despite the large number of cloud service users, the existing research has focused mainly on the concept of cloud service and the effect of introduction on the companies. This study aims to conduct a study on individual characteristics that affect the degree of cloud use. We will conduct research on the causes of IT knowledge, personal perception of security, convenience, innovation, economical trust, and platform dependency affecting the intention to use the cloud. These results show that the variables affecting individual 's use of cloud service are influenced by individuals, and this study can be used as a basic data for individuals to use cloud service.

A Study on development of privacy indicators in the context of cloud service level agreement (클라우드 개인정보보호를 위한 SLA 지표 개발)

  • Kim, Jungduk;Park, Dae-Ha;Youm, Heung-Youl
    • Journal of Digital Convergence
    • /
    • v.13 no.2
    • /
    • pp.115-120
    • /
    • 2015
  • As the cloud services, the underlying technology of the digital convergence environment, have been widely adopted in the business, personal information protection has been recognized as one of the major issues to resolve. When cloud services are used to process the personal information, the personal information protection law speculates the establishment of a contract or service level agreement(SLA). This research presents 7 privacy indicators and 13 metrics which can be included in cloud SLA, based on the analysis of related regulation and standards and the SMART(Specific, Measurable, Action-oriented, Relevant and Timely) model. The proposed indicators are examined using the Focus Group Interview method in terms of materiality and feasibility. The results show that all the proposed indicators are meaningful and useful.

InfoDID: A robust user information management serivce based on Decentralized Identifiers

  • Kwon, Min-Ho;Lee, Myung-Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.4
    • /
    • pp.75-84
    • /
    • 2021
  • In this paper, we introduce InfoDID, a robust user information management service based on DID that manages user information reliably. Since blockchain technology provides an environment in which data can be handled transparently on a decentralized basis, various services using blockchain are currently being developed As the importance of user's personal information has recently emerged, the DID technology is receiving attention. The technology allows a user to control his or her information through decentralized identifiers, and various information management services are being tried based on the technology. Using blockchain-based DID technology, InfoDID reliably controls personal information requested frequently, helping users to provide their information to other services more conveniently. In addition, to support service continuity, InfoDID uses BR2K technique that provides robust execution of blockchain application services, so that even partial service failures can be systematically recovered. To facilitate this operation, we present a replication status monitoring tool that can continuously check the replication states of blockchain application services running in association with the BR2K technique such as InfoDID.

A Study on Architecture of Event Driven Service System (EDS(Event Driven Service) 시스템 구조에 관한 연구)

  • Song, Kwang-Bin;Cho, Sok-Pal
    • The Journal of Information Technology
    • /
    • v.10 no.4
    • /
    • pp.11-26
    • /
    • 2007
  • EDS is a typical convergence service performing convergence between functions owned by multiple SPs. EDS provides users with the relevant information and the communication by the various personal conditional environment. An alternative terminology for events for net- work related applications is 'triggers'-these are assumed to be included in the present description. Events could be defined as any activities which occur within a service avail ability, signals. Events can be managed, for example, as part of a context-aware application. EDS carry out a procedure for processing user's requested information about mobil network-based entities, such as the combination with various applications, such as a LBS (Location Based Service) and area information. In AS (Application Service) network environments, the user has his customized EDS in the network, the EDS automatically connects the appropriate Terminals consistent with a user profile. EDS can also send the collected information to other requesting users by way of event information and using the procedures of combination with other services. The user can record/retrieve the user-related information to from the information base through EDS.

  • PDF

Ethical Review of Development and Service with Care Assistance Robot: Focusing on Transfer, Repositioning, Feeding, and Toileting Care Assistance Robot (돌봄보조 로봇의 개발과 서비스에 대한 윤리적 고찰: 이승, 자세변환, 식사, 배설 돌봄보조 로봇을 중심으로)

  • Bae, Young-Hyeon
    • The Journal of Korea Robotics Society
    • /
    • v.17 no.2
    • /
    • pp.103-109
    • /
    • 2022
  • The purpose of this study is to ethical review on the development and service with care assistance robot. An integrative review concept analysis method was used. We analyzed the classification and role of service robots, the concept of the robot ethic and the care ethic. And there were derived the development and service about care assistance robot in ethical viewpoint. For improving current care problem, government had support to developing four types care assistance robots. But there were provided carefully care service due to the limitations of robot technology and lack of overall social awareness with care robot. In addition, in order to be successfully application in the field, care assistance robots were developed to provide high-quality care service that can consider to personal culture and living environment with the development of artificial intelligence and robot technology, as well as ethical care service.

An Investigation into the Effects of the Work Environment / Occupation on Hiv Related Stigma: A Case of Service Staff in Grahamstown: Eastern Cape, South Africa

  • Mazorodze, Tasara
    • Journal of Distribution Science
    • /
    • v.12 no.5
    • /
    • pp.41-47
    • /
    • 2014
  • Purpose - This paper investigates whether one's occupation influences one's attitude toward people with HIV/AIDS and suggests ways to counter HIV-related stigma in different work settings. Two samples comprising workers in different environments and occupations with contrasting personalities were chosen. Thus, security guards (authoritarian types) and catering workers (social types) were included. Research design, data, and methodology - The sample comprised246 service staff from the Rhodes University Catering Division and the Hi-Tec Security company, both in Grahamstown, South Africa, a small Eastern Cape province town. All employees at these organizations during the survey were eligible to participate. Results -The security sample displays significantly higher personal stigma scores than the catering sample, according to the Visser personal stigma scale (mean scores of 4.01 and 1.37, respectively; t=10.30, df=244, p=0.00). Similar results were found using Visser subscales. Conclusions - This study shows that occupation is a strong predictor of HIV-related stigma in the workplace, suggesting that workplace settings, by attracting particular personalities and influencing workers, may shape attitudes towards those who are HIV positive.

MBTI-based Recommendation for Resource Collaboration System in IoT Environment

  • Park, Jong-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.3
    • /
    • pp.35-43
    • /
    • 2017
  • In IoT(Internet of Things) environment, users want to receive customized service by users' personal device such as smart watch and pendant. To fulfill this requirement, the mobile device should support a lot of functions. However, the miniaturization of mobile devices is another requirement and has limitation such as tiny display. limited I/O, and less powerful processors. To solve this limitation problem and provide customized service to users, this paper proposes a collaboration system for sharing various computing resources. The paper also proposes the method for reasoning and recommending suitable resources to compose the user-requested service in small device with limited power on expected time. For this goal, our system adopts MBTI(Myers-Briggs Type Indicator) to analyzes user's behavior pattern and recommends personalized resources based on the result of the analyzation. The evaluation in this paper shows that our approach not only reduces recommendation time but also increases user satisfaction with the result of recommendation.

An Efficient Signing and Certificate Status Management Scheme in Personal PKI (Personal PKI에서 효율적인 서명 및 인증서 상태 검증 기법)

  • Sur Chul;Shin Weon;Lee Kyung-Hyune
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.05a
    • /
    • pp.91-96
    • /
    • 2005
  • Recetly, the term Personal Public Key Infrastructure (PKI) was introduced to supprot reliable and authenticated service in a Personal Area Network (PAN). However, traditional public key signature schemes and certificate status management are not suitable for a PAN environment since mobile devices that constitute the PAN have limited computing capability. In this paper, we propose a new scheme that efficiently provides signature generation and certificate status management for mobile devices. Based on hash chain technique, we intend to reduce computational overhead on signature generation, and further, to minimize communication overhead for managing certificate status.

  • PDF