• Title/Summary/Keyword: Private and Public Key

Search Result 354, Processing Time 0.029 seconds

Comparative Study on Autonomous Vehicle Operation Status in South Korea and China - Focusing on Xiong'an New District in China and Sejong City in South Korea -

  • Sen Zhan;Choong-Sik Chung
    • Journal of Platform Technology
    • /
    • v.12 no.1
    • /
    • pp.12-31
    • /
    • 2024
  • Today, many countries around the world recognize the development of autonomous vehicles as a national growth engine, support technology development through various projects, and promote it as national policy. China and Korea are representative countries that are strongly promoting autonomous vehicle policies. The Chinese government's policy direction for self-driving cars focuses on support for fostering new industries. Korea has established mid- to long-term goals and plans to foster the future mobility industry as a key growth engine and is promoting these as a national task. Recently, China and Korea have established national pilot areas to test autonomous vehicle operation and are actively pursuing policies. We aim to compare and analyze the operation status of self-driving cars in China's Xiong'an New Area and South Korea's Sejong City and derive policy implications regarding self-driving cars, which are emerging as a key industry of the future. According to the analysis results, it was found that China's Xiong'an New District is ahead of Korea's Sejong City in terms of leader leadership. As a result, autonomous driving is being operated at the government-wide and national level in Xiong'an New Area. In terms of the driving force, in the case of Xiongan New Area, the policy is being promoted by companies centered on Baidu, and in the case of Sejong City, the policy is being promoted by the local government. As a result, it is estimated that Xiongan New Area will be able to reach commercialization before Sejong City. In the final policy proposal, it was proposed to break away from the existing government-led method and switch to a collaboration with the private sector and a private-led method.

  • PDF

A Study on Key Issues of Vitalizing the Governance of Rural Area Development and Policy Improvement Plans: Focusing on the Case of Regions in Chungcheongnam-do with Privately Entrusted Intermediary Support Organizations for the Community building Established (농촌 마을만들기 거버넌스의 활성화를 위한 주요 쟁점 및 정책 개선방안에 관한 연구: 충남지역 내 민간위탁형 마을만들기 중간지원조직 설치 지역을 사례로)

  • Ko, Kyoung-Ho
    • Korean Journal of Organic Agriculture
    • /
    • v.29 no.1
    • /
    • pp.51-73
    • /
    • 2021
  • This study is intended to derive the key issues on vitalization of the governance of rural area development for 6 cities and counties in Chungcheongnam-do where privately entrusted intermediary support organizations have been established and to present their improvement plans of policy. The findings of the study have shown the governance for the case regions is still being characterized with a very formal governance being dominated by the strong administrative initiative and expediency. What have been presented as the improvement plans of policy are as follows: First, core provisions of the ordinances must be strengthened to mandatory regulations, and some ways to check and supplement such as monitoring, policy forums by public-private partnership, etc. are required for the sake of the effective operation of the ordinances. Second, in relation to the bases of competence according to the roles of core governance players, it is necessary to overcome the limitations of job rotation system, align the administrative support systems, expand the functions of a policy committee based on public-private cooperation and operate it effectively in the case of administration, and to strengthen a footing of a civilian community and the perspectives of political incubation in administration and provide support projects contributing to the growth of the corporations in the case of the entrusted corporation, and to align the operating systems of the centers, review the introduction of a system with a full-time center head, continuously provide specialized education and improve the working environment in the case of the support centers.

A Case Study on the Building of Service Quality Improvement Strategies Using CSI, ESI and KPI: Focusing on Public Sector (고객만족도, 직원만족도와 핵심성과지표달성도를 이용한 공공서비스 품질개선전략 수립에 대한 사례연구)

  • Lee, Min-Jung
    • Information Systems Review
    • /
    • v.13 no.3
    • /
    • pp.83-97
    • /
    • 2011
  • CRM (Customer relationship management) has become increasingly relevant in the public sector as citizens have become accustomed to high levels of service in private sectors. Public sectors have begun to emphasize on their customers and customer service quality. Thus to improve the service quality in citizens, public sectors conduct several types of surveys to analyze customer satisfaction and employee satisfaction on their product/services. Most of the public sector organizations, however, are reluctant to conduct the total survey targeting the whole teams and analyze the relationship among types of surveys because of the limitation of budget and time. In this paper, we propose the methodology to analyze the relationship of customer satisfaction index, employee satisfaction index and KPI achievement of whole teams and a framework which identifies key action initiatives and builds KPI.

A Study on the Domestic Model for Cyber Threat Information Sharing by Analyzing the Relevant Systems of Major Advacnced Countries (주요국의 사이버위협정보 공유체계 분석을 통한 국내 적용모델 연구)

  • Yoon, Oh Jun;Cho, Chang Seob;Park, Jeong Keun;Bae, Sun Ha;Shin, Yong Tae
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.101-111
    • /
    • 2016
  • The recent cyber threats are becoming real threats to our lives. This gloomy situation from cyber threats necessarily demands the establishment of the cyber threat information sharing system between the public and private area. Key countries, like the US, Japan and the UK, are stabilizing the cyber threat information sharing systems by founding exclusive organizations for sharing information and setting up and implementing relevant measures. In this thesis, I would like to propose the model for cyber threat information sharing in order to cope efficiently with the ever-intensifying cyber threats. My model would include key elements for the efficient information sharing, such as the clear designation of main operator of information sharing system, the management of collaboration system between the public and private sector, the build-up of the integrated and automated system and the supplementation of legal system including the grant of privilege, and so on.

COVID-19 and IT Service: Challenges and Responses (COVID-19와 IT 서비스: 변화와 대응)

  • Lee, Jungwoo;Kang, Ju Young;Lee, Sang Kon
    • Journal of Information Technology Services
    • /
    • v.20 no.5
    • /
    • pp.1-9
    • /
    • 2021
  • Since the first confirmed case in January 2020, Coronavirus disease 2019(COVID-19) has brought many changes to our society, and Korea is no exception. Some changes are direct and immediate such as restrictions on overseas travel and social distancing, but the others are indirect and slowly adapted such as lifestyle changes impacting industries and businesses. IT service sector is tremendously influenced by COVID-19. IT service is used extensively in response to COVID-19 taking advantage of its non-face-to-face characteristics. In that sense, the industry is positively affected and in some sense invigorated, giving birth to new kind of services. This special issue focuses on introducing how the IT services are affected, what kind of transformations are undergoing, and how these are expedited after COVID-19. This special issue expands and extends the case research section by collecting new IT service case studies concerning these topics. After competitive review process, 11 studies are selected for this special issue which deals with four different but closely related aspects: (1) evolutions of private IT services, (2) transformations in public IT services, (3) impacts in the hospitality and tourism industry, and (4) changes of people's behavior along with COVID-19. The first set reports on the evolution of private IT services that have created terms such as foodtech and edutech as we enter a rapid non-face-to-face situation. The second set consists of studies dealing with the evolution of public IT services. Evolution and rapid response to non-face-to-face appear to be no exception in the public sector. The third includes studies of hospitality and tourism which is most strongly affected by COVID-19. The last set deals with the behavioral changes of users such as technostress in telecommuting. Lessons learned through best practices and key problems identified in these studies may help us to actively respond to the coming waves of changes incurred by COVID-19 in our society as well as in the IT service industry.

Trustworthy authentication and key management for NSDR ad-hoc network (안정적인 동적 복합 ad-hoc 네트워크와 이에 대한 신뢰성 있는 키 인증과 키 관리)

  • Rhee, Chung Sei
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.49-55
    • /
    • 2012
  • In this paper, we consider the limit of the previous works for ad-hoc network, then propose a dynamic routing scheme which employs a 2-tier hierarchical structure. We adopt the advantages of proactive and reactive routing scheme for efficient network management. We define this method as NSDR(New Secure Dynamic Routing) scheme. We also propose a trustworthy authentication and key management for the proposed ad-hoc network. We currently study the possibility that ad-hoc networks can provide a service such as key management and authentication for the next generation mobile network.

An Effective Group Management Method for Secure Multicast Transmission (안전한 멀티캐스트 전송을 위한 효율적인 그룹 관리 방법)

  • Ko Hoon;Jang Uijin;Kim Sunho;Shin Yongtae
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.1
    • /
    • pp.9-15
    • /
    • 2006
  • While a lot of important information is being sent and received on the Internet, the information could be exposed to many threats, and the more the Multicast Service is various and generalized, the more the service range is widened. When a new member joins in or leaves from the Multicast Group, the Group Key, which the existing member use for, should be newly updated. The existing method had a problem that the performance was depreciated by the key exchanging. This paper proposes the effective group management mechanism for a secure transmission of the Multicast Data on the Multicast Group.

A Study on Documentation Strategy for Archiving Locality (지역 아카이빙을 위한 기록화방안 연구)

  • Kwon, Soon-Myung;Lee, Seung-Hwi
    • The Korean Journal of Archival Studies
    • /
    • no.21
    • /
    • pp.41-84
    • /
    • 2009
  • Lots of cultures, memories, histories of the local life have disappeared. Some sectors of universities and religion have keep their records in manuscript archive only. On the other hand records of public sectors were at least able to be managed by the records management law. Citizen's groups and academic bounds were also roles to get public records strong. However can we just describe whole body with only public records? As records management law a record of private sector which has value of preserving can be managed under national protection. Yet establishment of local archive is not obligate. Only stressing on public records is like what dictatorial government acted in past years. It is what we ignore diversity and request of community. We need to move our view that we have focused on public and central sectors to private and local sectors. Local records management based on locality could help to complete the entire puzzle. The way complete the puzzle is various and wide spheres including from cultural space to being extinct village. Locality is defined as the property in certain area or distinctiveness of locals. Establishing production strategies is as important as collecting records produced over the past years for local archiving. Local archiving has to be regionally conducted in phase. Moreover common wealth and recognition of communities are reflected in the acquisition process. In next to archiving local organizations and private records according to collection policy, methodology on local archiving needs for archive management and use in various public and private fields. This methodology could be possible by building a local archive networking tool. It is true that Local archiving is not familiar and clear yet. If we can turn the effort for public records we have made to endeavor for private sectors, we might expect big fruits in private sectors. We easily emphasis on globalization or internationalization, our daily lives start on our villages. Setting aside our small communities, such a puzzle of the whole would never be completed. This is good time to begin finding lost puzzle for future. The key that can find lost puzzles be held in archiving localities.

Case Study on BSC System Implementation in Korean Public Firms: Focused on KOTRA (BSC 시스템 구축 사례 연구: 대한무역투자진흥공사를 중심으로)

  • Kim, Sung-Soo;Lee, Hak-Seon
    • Information Systems Review
    • /
    • v.9 no.1
    • /
    • pp.233-257
    • /
    • 2007
  • BSC has gained increasing popularity as an effective management tool aligns employee actions and goles with corporate strategy since first being introduced in 1992. Though a lot of people have thought that many corporations have achieved a lot of effectiveness in their business with BSC, by the way, public enterprises have been difficulties in implementing BSC as a management innovation tool because of different characters between private and public enterprises. KOTRA's BSC among domestic public enterprises is early introduced and evaluated very high in quality. So the purpose of this paper is to represent success factors and problems for implementing BSC System of KOTRA and then expects to be used for implementing successful BSC System as a good reference model in domestic public enterprises.

Study on a Secure Authentication and Authorization Protocol based on Kerberos (커버로스 기반의 안전한 인증 및 허가 프로토콜 에 관한 연구)

  • 김은환;김명희;전문석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5C
    • /
    • pp.737-749
    • /
    • 2004
  • Kerberos authenticates clients using symmetric-key cryptography, and supposed to Oust other systems of the realm in distributed network environment. But, authentication and authorization are essential elements for the security. In this paper, we design an efficient and secure authentication/authorization mechanism by introducing the public/private-key and installing the proxy privilege server to Kerberos. In the proposed mechanism, to make a system more secure, the value of the session key is changed everytime using MAC(message authentication code) algorithm with the long-term key for user-authentication and a random number exchanged through the public key. Also, we reduce the number of keys by simplifying authentication steps. Proxy privilege server certifies privilege request of client and issues a privilege attribute certificate. Application server executes privilege request of client which is included a privilege attribute certificate. Also, a privilege attribute certificate is used in delegation. We design an efficient and secure authentication/authorization algorithm with Kerberos.