• Title/Summary/Keyword: Service identity

Search Result 520, Processing Time 0.02 seconds

An Analysis Study on the Operation Status of the Korean Children's Library Cultural Programs (어린이도서관 문화프로그램 유형별 현황 및 운영실태 분석 연구)

  • Kang, Jung A;Noh, Younghee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.29 no.1
    • /
    • pp.99-124
    • /
    • 2018
  • This study examines the actual operation status of the Korean children's library cultural program and analyzes the service type and operation status. Through this, it seeks the direction of cultural programs that can accommodate the needs of the users and establish the identity of the library. This study analyzes 856 kinds of cultural programs found on the homepage of 48 children's libraries in Korea. It was found that the lecture type programs for elementary school students were operated the most. In addition, most of the students participated one to three times during the lower grades of elementary school by their parents' recommendation. The satisfaction level of experiential cultural programs was the highest.

Mutual Authentication and Secure Session Termination Scheme in iATA Protocol

  • Ong, Ivy;Lee, Shirly;Lee, Hoon-Jae;Lim, Hyo-Taek
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.4
    • /
    • pp.437-442
    • /
    • 2010
  • Ubiquitous mobile computing is becoming easier and more attractive in this ambient technological Internet world. However, some portable devices such as Personal Digital Assistant (PDAs) and smart phones are still encountering inherent constraints of limited storages and computing resources. To alleviate this problem, we develop a cost-effective protocol, iATA to transfer ATA commands and data over TCP/IP network between mobile appliances and stationary servers. It provides mobile users a virtual storage platform which is physically resided at remote home or office. As communications are made through insecure Internet connections, security risks of adopting this service become a concern. There are many reported cases in the history where attackers masquerade as legitimate users, illegally access to network-based applications or systems by breaking through the poor authentication gates. In this paper, we propose a mutual authentication and secure session termination scheme as the first and last defense steps to combat identity thief and fraud threat in particular for iATA services. Random validation factors, large prime numbers, current timestamps, one-way hash functions and one-time session key are deployed accordingly in the scheme. Moreover, we employ the concept of hard factorization problem (HFP) in the termination phase to against fraud termination requests. Theoretical security analysis discussed in later section indicates the scheme supports mutual authentication and is robust against several attacks such as verifiers' impersonation, replay attack, denial-of-services (DoS) attack and so on.

A Study on the Characteristics of Branded Environments in Hotel Spaces (호텔 공간의 브랜드화 환경 특성 연구)

  • Lee, Hwa-Kyoung;Ahn, Seongmo
    • Korean Institute of Interior Design Journal
    • /
    • v.23 no.1
    • /
    • pp.143-151
    • /
    • 2014
  • Nowadays, space branding becomes more important since it reflects and synthesizes the diverse experiences of the consumer. The objective of the research is to present the new possibilities that space branding offers by analyzing the brand strategy and the design characteristics of branded hotels, which are being projected as constructed branded environments. By integrating the brand with visible or invisible elements of the hotel, such as unique space planning, service, and consumer experience, a branded hotel can be a good vehicle to reflect fast changing consumer lifestyles and trends; it enables the consumer to experience brands in his or her everyday life, and it conveys the overall image of the brand by considering the consumer's multi-sensual experiences. The study processed with theoretical research which is related to the hotel space and branded environment. Four brands were selected with distinct business area and brand strategy, and studied to analyze the strategy and the characteristics of the branded environment in a branded hotel. In particular, the case study attempted to evaluate the distinctiveness of the branded hotel's spatial design by comparing each brand's representative flagship store with the hotel. As a result, four characteristics of branded environments in branded hotels were identified, namely, strengthen brand image, consistent brand strategy, extend brand perception, spatialize brand experience. Armani emphasizes their consistent brand image by applying similar design methods in both retail stores and hotel spaces. IKEA, in contrast, applies not their design identity but their brand concepts like practicality, efficiency, and low prices. Pantone gives an expanded brand experience by using synesthetic sensual stimulation using their color system. Missoni mixes and composes their patterns and materials in a three-dimensional manner and strengthens design possibilities and spatiality. This study suggests specific design methods to construct a branded environment in a branded hotel and offers new strategic directions for space branding.

Secure Location Information Protection Scheme from the Network Provider and the third party in Mobile Communication Environments (이동통신 환경에서 네트워크 제공자 및 제 3자로부터 안전한 위치정보 보호기법)

  • Kim, Soon-Seok;Lee, Chang-Hun
    • The KIPS Transactions:PartC
    • /
    • v.10C no.7
    • /
    • pp.867-878
    • /
    • 2003
  • In thls Paper, we Propose a new scheme, protecting information about the location of a mobile user against attacks from inside users of the mobile communication, especially the network providers. There have already been some proposals about how to protect location information of user in mobile communication environments〔1-5〕. Among them, Kesdogan et al.〔2, 3〕 proposed a new method, using so-called temporary pseudonyms and also described protection method against a passive and an active attack of network providers. However, the description of protection method against the active attack between the two is not clear. Moreover, there is an additional load that it should append a reachability manager〔1, 6〕 to the proposed system. Therefore, we propose a new scheme improving the above method of Kesdogan et al. and analyze its security and effectiveness.

Expression of Cyclomaltodextrinase Gene from Bacillus halodurans C-125 and Characterization of Its Multisubstrate Specificity

  • Kang, Hye-Jeong;Jeong, Chang-Ku;Jang, Myoung-Uoon;Choi, Seung-Ho;Kim, Min-Hong;Ahn, Jun-Bae;Lee, Sang-Hwa;Jo, Sook-Ja;Kim, Tae-Jip
    • Food Science and Biotechnology
    • /
    • v.18 no.3
    • /
    • pp.776-781
    • /
    • 2009
  • A putative cyclomaltodextrinase (BHCD) gene was found from the genome of Bacillus halodurans C-125, which encodes 578 amino acids with a predicted molecular mass of 67,279 Da. It shares 42-59% of amino acid sequence identity with common cyclomaltodextrinase (CDase)-family enzymes. The corresponding gene was cloned by polymerase chain reaction (PCR) and the dimeric enzyme with C-terminal 6-histidines was successfully overproduced and purified from recombinant Escherichia coli. BHCD showed the highest activity against ${\beta}-CD$ at pH 7.0 and $50^{\circ}C$. Due to its versatile hydrolysis and transglycosylation activities, BHCD has been confirmed as a member of CDases. However, BHCD can be distinguished from other typical CDases on the basis of its novel multisubstrate specificity. While typical CDases have over 10 times higher activity on ${\beta}-CD$ than starch or pullulan, the CD-hydrolyzing activity of BHCD is only 2.3 times higher than pullulan. In particular, it showed significantly higher activity ratio of maltotriose to acarbose than other common CDase-family enzymes.

A Study on oblique spatial expansion through Henry Ciriani's 4 Logements Studio (앙리 시리아니의 4 Logements Studio를 통한 사선적 공간확장성에 대한 연구)

  • Jun, In-Mok
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.6
    • /
    • pp.227-235
    • /
    • 2017
  • The essence of architecture is space acquired as a result of architect's design act, but the object of the design is not the space and it is the physical elements to construct it. The masters of modern architecture have described the types of spaces that can be composed of these elements, but there is a difficulty in constructing the space because they does not mention how to construct it. From this point of view, if architecture is the techniques for human behavior and the art of building space, it is recognized that there is a need for concrete research on how to construct a space with ambiguous substance. Therefore, I conducted research on the extensibility of diagonal spaces through '4 Logements Studio' by Henri Ciriani, a representative architect of Neo Corbusian. The 'network for identity' method proposed by Ciriani was examined as a methode to realize spatial expansion and the furniture should be designed as an element of reading space and 3 optimal alternatives for 4 housing arrangements were obtained based on the Equivalence, Lighting, View, and Community life.

Developments in Space Law in regulating commercial space activities (우주(宇宙) 상업활동(商業活動) 규율(規律)에 있어서의 우주법(宇宙法)의 발전적(發展的) 위상(位相))

  • Shin, Hong-Kyun
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.3
    • /
    • pp.233-258
    • /
    • 1991
  • This paper examines current developing status of space law as defined in terms of its unique principle that "the utilization of outer space for all mankind's interest". As commercialization of space activities has brought about heated debate on its legitimacy with respect to that principle, space law has come to witness a dual situation. One is the realization of that principle in establishing commercial space activities system where all mankind's interest is respected through the non-discriminatory distribution mode of space benefit. In satellite telecommunication system, the INTELSAT Organization assures its public service policy while protecting itself against a competition from separate systems. For remote sensing, commercialization of LANDSAT Systems promoted since 1984 seems not to affect present non-discriminatory distribution of data and information obtained. On the other hand, active participation of private entity aiming at commercial profit enables national government to manage more effective control and supervision of those activities with a view to promoting national interests. Also, newly developed private rules and regulations are emerging in business relations about commercial space activities. Extended capacity of national government assuring its national interest in production and distribution of international resources that is outer space, and regulation of space activities by newly developed rules and customs provoke a concern about a identity problem of space law. The best way to summarize this perspective might consist in saying that non space law regulations, which are not assumed as aiming at the promotion of all mankind's interest, are confirming their role about space related activities. For those reasous, we are now facing a developing status of space law as developments of commercial space activities continues.

  • PDF

A Discourse Analysis to Public Library Ecosystem in Korea (국내 공공도서관 생태계의 담론적 분석)

  • Yoon, Hee-Yoon
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.51 no.1
    • /
    • pp.5-27
    • /
    • 2017
  • The goal of this study is to suggest various improvements and expanding strategies of the public library ecosystem. For this goal, researcher reviewed and analyzed the realistic landscapes and social recognitions about the public library ecosystem as local public goods, and discoursed the basic principles and structural terrain of public library ecosystem based on natural ecosystem. As a result, researcher proposed multifaceted alternatives (ensure library's identity and publicity applying Law of Karma, strengthen librarian's professionalism on the premise of overcoming the Minerva's syndrome, optimize the library service and collection management based on the Pareto principle, reduce reading room and differentiated program through resolution of Halo effect, eliminate usage bias by life cycle based on the Gauss distribution, acceptance of the digital paradigm and use-friendly spatialization that ruminates the Icarus paradox, incorporate small library into public library system through a clear understanding of the Gresham's law, and enforce communication and spread social and cultural value through the practice of the Pompeii paradox).

Design of MBB System for provide Mobility continuity in Environment IPSec (IPSec 환경에서 연속적인 이동성 제공을 위한 MBB 시스템 설계)

  • Kim, Seon-Young;Jo, In-June
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.3
    • /
    • pp.478-484
    • /
    • 2008
  • When a mobile node moves, MIPv6 operates an authentication process for the new connection. These kinds of frequent binding update and authentication processes cause much traffic and delay the service. To solve this problem, PMIPv6 provides a network-based mobility protocol in order to lessen the load on a mobile node. However, when it is moved from a domain to a domain or in a domain, there still lies a need fDr a new address, so MIPv6's demerit still exists. In IPsec, too, a new negotiation should be made when it is moved to WAN(Wide Area Network). This causes load to the mobile node. In this paper suggests MBB(Make Before Break) system to eliminate disconnections or delays resulted from the address change or renegotiation for security. When the mobile node receives a CoA address, IPsec negotiation gets operated. Its identity is authenticated by sending the identifier used for the prior negotiation to CN(Correspondent Node) through the BID message suggested. After that, negotiation Bets simplified that disconnections can be eliminated, and in the IPsec negotiation, the load on the mobile node can be lessened as well; moreover, two addresses are used for the communication simultaneously, so the probability of packet loss can be reduced.

Cloning and Characterization of Carboxylesterase (est2R) Gene from Cow Rumen Metagenomic Library

  • Kang, Tae-Ho;Kim, Min-Keun;Kim, Tae-Yang;Kim, Gi-Hwan;Kim, Jung-Ho;Kim, Hoon;Yun, Han-Dae
    • Journal of agriculture & life science
    • /
    • v.46 no.3
    • /
    • pp.109-118
    • /
    • 2012
  • The gene encoding an esterase enzyme was cloned from a metagenomic library of cow rumen bacteria. The esterase gene (est2R) was 2,120 bp in length, encoding a protein of 516 amino acid residues with a calculated molecular weight of 57,286 Da. The molecular weight of the enzyme was estimated to be 57,000 Da by SDS-PAGE. Est2R shared 35.6% amino acid identity with esterase (CAH19079) of uncultured prokaryote. The Est2R was most active at $20-40^{\circ}C$, and showed optimum at $30^{\circ}C$ and pH 8.0. The most activity of Est2R for the different chain length of p-nitrophenyl ester group as substrate was p-nitrophenyl acetate. Moreover, the enzyme was found to be most active without organic solvent, followed by 98% active with ethanol, and the enzyme activity was highly affected by the acetonitrile. The enzyme was significantly inhibited by $Zn^{2+}$ but stimulated by $Ca^{2+}$. So, novel esterase gene est2R is likely to obtain from cow rumen metagenome and supposed to use for industrial purpose.