• Title/Summary/Keyword: Service identity

Search Result 520, Processing Time 0.022 seconds

Security Model for Pervasive Multimedia Environment

  • Djellali, Benchaa;Lorenz, Pascal;Belarbi, Kheira;Chouarfia, Abdallah
    • Journal of Multimedia Information System
    • /
    • v.1 no.1
    • /
    • pp.23-43
    • /
    • 2014
  • With the rapidity of the development on electronic technology, various mobile devices are produced to make human life more convenient. The user is always in constant search of middle with ease of deployment. Therefore, the development of infrastructure and application with ubiquitous nature gets a growing keen interest. Recently, the number of pervasive network services is expanding into ubiquitous computing environment. To get desired services, user presents personal details about this identity, location and private information. The information transmitted and the services provided in pervasive computing environments (PCEs) are exposed to eavesdropping and various attacks. Therefore, the need to protect this environment from illegal accesses has become extremely urgent. In this paper, we propose an anonymous authentication and access control scheme to secure the interaction between mobile users and services in PCEs. The proposed scheme integrates a biometric authentication in PKI model. The proposed authentication aims to secure access remote in PCE for guaranteeing reliability and availability. Our authentication concept can offer pervasive network service users convenience and security.

  • PDF

A Study of Internet Marketing for Family Restaurant In Korea -Incent of Hompage- (패밀리 레스토랑의 인터넷 마케팅에 관한 연구 -홈페이지를 중심으로-)

  • Lee, Jae-Ryun
    • Culinary science and hospitality research
    • /
    • v.7 no.1
    • /
    • pp.203-227
    • /
    • 2001
  • The purpose of this study is to be groped promotion plan of internet marketing of Family Restaurant to get the motive, which is target market of Family Restaurant in Korea, and segment market of Internet users shows identity. Internet is observed as new marketing tool to understand customized needs of customer and to provide service to them in form of the customization. Based on the case study of Homepage of Family Restaurant in Korea, I would propose promotion plan as follow. First, enhance the function of the database marketing through the two-way communication. Second, enforce the e-commerce through the corporate-marketing in which same target market in cyber space. Third, develop the management skill for the Internet marketing in homepage as like specialty of contents.

  • PDF

Overseas Expansion Strategy of Korean Fashion Character through Sensitive Space Creation (감성적 공간창출을 통한 한국 패션 캐릭터의 해외진출전략)

  • Park, Hyun-Hee
    • Journal of the Korean Home Economics Association
    • /
    • v.49 no.4
    • /
    • pp.25-35
    • /
    • 2011
  • This study was intended to suggest overseas expansion strategy of Korean fashion character through sensitive space creation. This study reviewed literature, and did internet searching and observation. For the research methods were the analysis of the main retail spaces utilizing character and case study for the classification of collaboration types between retail space and character. As a results, 8 collaboration types between space and character were extracted: collaboration between retail distribution space and character, collaboration between product space and character, collaboration between service space and character, collaboration between experience space and character, collaboration between moving space and character, collaboration between publicity & advertising space and character, and collaboration between exhibition space and character. This study suggested the necessity of consistent identity strategy between character and retail space for a new character brand and the effectiveness of collaboration strategy for enhancement of character brand awareness.

A Meta Review of the Researches on PCK in Mathematics (수학의 교수학적 내용 지식(PCK)에 대한 연구의 메타적 검토)

  • Park, Kyung-Mee
    • The Mathematical Education
    • /
    • v.48 no.1
    • /
    • pp.93-105
    • /
    • 2009
  • Considering the fact that PCK(pedogogical content knowledge) tends to guarantee the identity of mathematics education as a discipline and the teacher professionalism, PCK is one of the core concepts in the research on subject matter education. The purpose of this study is to review domestic and international researches on the definition and the components of PCK in mathematics. Based on the review, this study identified 3 knowledges which consist PCK; knowedge of mathematic content, knowledge of learner's understanding, and knowledge of teaching. Then this study provided some examples of PKC in the topic, the limit of sequences, and introduced the LMT and TEDS-M items, which were designed to measure the teacher's PCK. Lastly, this study attempted to evaluate the items on mathematics education included in the Teacher Employment Test administered for pre-service/. teachers in Korea based on PCK.

  • PDF

Attribute based User Authentication for Contents Distribution Environments

  • Yoo, Hye-Joung
    • International Journal of Contents
    • /
    • v.8 no.3
    • /
    • pp.79-82
    • /
    • 2012
  • In digital contents distribution environments, a user authentication is an important security primitive to allow only authenticated user to use right services by checking the validity of membership. For example, in Internet Protocol Television (IPTV) environments, it is required to provide an access control according to the policy of content provider. Remote user authentication and key agreement scheme is used to validate the contents accessibility of a user. We propose a novel user authentication scheme using smart cards providing a secure access to multimedia contents service. Each user is authenticated using a subset of attributes which are issued in the registration phase without revealing individual's identity. Our scheme provides the anonymous authentication and the various permissions according to the combination of attributes which are assigned to each user. In spite of more functionality, the result of performance analysis shows that the computation and communication cost is very low. Using this scheme, the security of contents distribution environments in the client-server model can be significantly improved.

Acquiring the International Availability of Construction Manager System in the Global Environment (세계화시대에서의 감리기술자제도의 국제통용성확보에 관한 연구)

  • Moon, Haeng-Kyu;Yang, Jae-Soo
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.8 no.4
    • /
    • pp.163-169
    • /
    • 2009
  • Recently, the concern of the FTA (Free Trade Agreement) have shifted to the promotion of the professional service's trade via the bilateral and reciprocal agreement of its professional laws. In the construction industry, this policy has intended to make the standardization of the construction manager's profession in the world. The purpose of this paper is 1) first to define the general model of professions in the U.S., UK and Japan, 2) then to declare the construction manager's model of the profession in them to apply the general model of professions, and 3) finally to analyze the identity of Korean construction managers and acquirement of its construction manager's law comparing with construction manager's model of the profession in the U.S., UK and Japan.

  • PDF

Information Suppression and Projection Strategies Depending on Personality Traits: Using Social media for Impression Management (사용자의 성격에 따른 정보의 통제와 투사 전략: 인상관리를 위한 소셜미디어의 활용)

  • Yun, Haejung;Lee, Hanbyeol;Lee, Choong C.
    • Knowledge Management Research
    • /
    • v.18 no.3
    • /
    • pp.147-162
    • /
    • 2017
  • As social media started to work as important communication tools, social media users have tried to manage their image, identity, and impression through social media. Social media service providers have been interested in providing various functions effectively disclosing users' emotion, such as posting, commenting, and sharing content; on the other hand, relatively few efforts have been made to provide social media functions for information suppression. In this study, therefore, we attempt to examine the relationship between Facebook users' personality and impression management behaviors. Personal traits of users including public self-consciousness, positive self-expression, and honest self-expression were considered as independent variables. Impression management behaviors are composed of two variables, which are suppression and projection. The survey was conducted, targeting 230 Facebook users. The research findings show that public self-consciousness and positive self-expression are positively associated with information suppression while both positive and honest self-expression is positively associated with information projection.

Effect of Collective Efficacy on Self-Disclosure in Social Network Services (소셜네트워크서비스에서 집합적 효능감이 이용자들의 자기노출에 미치는 영향)

  • Chae, Seong Wook
    • Knowledge Management Research
    • /
    • v.19 no.1
    • /
    • pp.19-39
    • /
    • 2018
  • With the development of information technology, social network services (SNS) such as Facebook and Twitter became popular and many users disclose their personal and sensitive information like private story, photographs and location information through posting and sharing. Despite the privacy concerns in SNSs, individuals continue to disclose their identity online. This phenomenon is called 'privacy paradox'. The purpose of this study is to examine the role of collective efficacy on self-disclosure in SNS context and to explain privacy paradox phenomenon. Drawing upon the communication privacy management theory, research model was developed and empirically tested with cross-sectional data from 306 individuals. Results revealed that collective efficacy has a direct positive effect on self-disclosure while privacy risk is negatively related to self-disclosure. However, privacy concern is not directly related to self-disclosure. The relationship between privacy concern and self-disclosure was moderated by collective efficacy.

Determinants Affecting Intention to Campus SNS in China

  • Hou, Jie;Fan, Liu;Lee, Sang-Chul;Suh, Yung-Ho
    • Proceedings of the Korean Society for Quality Management Conference
    • /
    • 2009.10a
    • /
    • pp.176-181
    • /
    • 2009
  • Social networking service (SNS), which is based on the "six degree separation" theory, has gained its popularity in recent years. SNS creates a new way for maintaining relationship and sharing information over the virtual space. As a major branch, campus SNS provides a new platform for student to study as well as build and maintain inter-personal relationships. The highly realness of personal information and relatively strong group cohesion of campus SNS has turned it into an inevitable tool in students' daily life. The rapid growth of SNS in campus is creating huge academic and commercial benefits. However, little comprehensive research reveals what are determinant factors in driving students' intention to participate in campus SNS. In this paper, we conceptualize the participation of campus SNS as a social behavior and evaluate the impact made by social factors such as subjective norms and identity, as well as the impact of perceived reality and playfulness through an extended technology acceptance model.

  • PDF

Device Authentication Protocol for Smart Grid Systems Using Homomorphic Hash

  • Kim, Young-Sam;Heo, Joon
    • Journal of Communications and Networks
    • /
    • v.14 no.6
    • /
    • pp.606-613
    • /
    • 2012
  • In a smart grid environment, data for the usage and control of power are transmitted over an Internet protocol (IP)-based network. This data contains very sensitive information about the user or energy service provider (ESP); hence, measures must be taken to prevent data manipulation. Mutual authentication between devices, which can prevent impersonation attacks by verifying the counterpart's identity, is a necessary process for secure communication. However, it is difficult to apply existing signature-based authentication in a smart grid system because smart meters, a component of such systems, are resource-constrained devices. In this paper, we consider a smart meter and propose an efficient mutual authentication protocol. The proposed protocol uses a matrix-based homomorphic hash that can decrease the amount of computations in a smart meter. To prove this, we analyze the protocol's security and performance.