• Title/Summary/Keyword: Technology provider

Search Result 532, Processing Time 0.024 seconds

Development of Certification Program for Application Service Provider : Service Provider(Service Environment) Certification (ASP 인증제도 개발 : 사업자(서비스 환경) 인증)

  • Seo, Kwang-Kyu
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.29 no.1
    • /
    • pp.101-108
    • /
    • 2006
  • The issue of using information system to ensure competitive power in the market is rising. The outsourcing methods that entrust activities of information system of companies to other expert agencies are increasing as the enterprises make a lot of efforts to put their resources to their heart of business in the process of adopting information system. Recently, ASP(Application Service Provider) as a new information technology outsourcing method appears due to the development of network technology and spreading of peculating software. ASP defines as a software leasing service which is supplied through networks instead of purchasing application software with high price. For successful implementation of ASP, it is necessary to develop a certification program to ensure safety and reliability of ASP. This paper provides the safe and reliable certification program for ASP. In order to develop it, the critical issues related to service quality and certification of ASP are identified and then evaluation methodology for the ASP certification program is proposed. This paper presents service provider(service environment) certification as the part of the ASP certification program.

A study on the Information Providers for computational and data Grid environments (계산 및 데이터 그리드 환경을 위한 Information Providers 에 관한 연구)

  • Hong, Won-Taek
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.967-970
    • /
    • 2005
  • 본 논문은 계산 및 데이터 그리드 환경에서 필요한 Information Provider 들의 제공 방법에 관한 것이다. 그리드 정보 서비스의 한 요소로 필요한 Information Provider 를 구현하기 위해서는 일반적으로 요구 사항을 분석한 후, 스키마를 정의하고 그것에 기반하여 Information Provider 를 구현하는 과정을 거친다. 본 논문에서는 Globus Toolkit 과 SRB 를 기반으로 구축된 계산 및 데이터 그리드 환경에서 MCE 스키마와 MSE 스키마를 정의하고, 그에 따른 각각의 Information Provider 들을 구현한다. 각각의 Information Provider 는 계산 자원에 관한 정보 및 MCAT 기반의 SRB 서버에서 유지되는 리플리카에 대한 정보를 제공한다. 이러한 Information Provider 들은 유사하게 구축된 그리드 환경에서 그리드 정보 서비스의 한 요소로 사용될 수 있을 것이다.

  • PDF

Design of U-IT Technology transfer Re-Auction System Model (U-IT 기술이전 역경매 시스템 모델의 설계 개발)

  • Kim, Hye-Sun;Jeon, In-Oh;Yang, Hae-Sool
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.8
    • /
    • pp.99-112
    • /
    • 2009
  • The research is to develop U-IT Technology Transfer Re-auction System Model for technology transfer enable transactions of buyer-oriented. The buyer sends condition technology parts and data informations to provider. The First step, The buyer sends condition technology parts and data informations to provider. The Second step, the buyer's technology and conditions in the First step will be transferred to the DB of a provider who can provide that technology. The Third step, a provider can bid after inputting the conditions. The Fourth step, the buyer decides the ranking of successful bids in condition-optimized auction process. The Fifth step, the buyer invites a provider to be a successful bidder. The last step, if there's no successful bid within the period, the sale considered failed. The buyer-oriented re-auction system is that the deal will become extinct automatically when its sale failed more than two times.

The Effect of Internet Neutrality Regulation on Social Welfare Considering Network Congestion and Investment Incentive (혼잡효과와 망투자유인을 고려한 인터넷망 중립성 규제의 경제적 효과분석)

  • Jung, Choong Young;Jung, Song Min
    • Journal of Information Technology Applications and Management
    • /
    • v.20 no.3_spc
    • /
    • pp.201-217
    • /
    • 2013
  • This paper analyzes the effect of network neutrality regulation on social welfare using the two-sided market under the network congestion. This paper deals with zero price rule regulation which means the price regulation on the side of content. The results are as follows : First, under the monopoly platform, internet use price, contents price, and the number of internet user and content provider are all decreasing as the network congestion increases. Second, under the monopoly platform internet use price, contents price, and the number of internet user and content provider are all increasing as the network capacity increases. Third, the price of internet use and contents internet use which maximize social welfare are increasing and the number of internet user and content provider are decreasing as the network congestion increases. Fourth, optimal network capacity for monopoly platform provider is less than socially optimal network capacity. Fifth, if network neutrality regulation is enforced, the price of internet use is higher than monopoly platform provider and the price of contents is lower than monopoly platform provider. Also, the number of internet user is less than monopoly platform provider and the number of content provider is more than that. By the way, when network congestion increases, internet use price, the number of internet user, and the number of content provider are decreasing. Sixth, network neutrality regulation is more effective for internet user side than contents provider when network congestion is considered. This means that network neutrality regulation is not effective for contents market side when network congestion is seriously large.

Novel Pre-pushing & Downloading Model in Mobile Peer-assisted Streaming Network

  • Lin, Fuhong;Zhou, Xianewi;Chen, Changjia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.12
    • /
    • pp.3135-3148
    • /
    • 2013
  • The popularization of streaming networks and mobile devices brings a new kind of network called mobile peer-assisted streaming network. In this network, service provider not only offers downloading services, but also pre-pushes resources to users for caching. Users can download their demanded resources while working as servers for uploading the cached data. Also the mobile characteristic makes high package losing probability in this network. So we study how the service provider pre-pushes or the user downloads resources efficiently and effectively while considering the package losing in this paper. We build utility models for service provider and user, and solve the models using Bellman's theory to achieve Nash Equilibrium which shows the service provider's optimal pre-pushing speed and user's optimal downloading speed. The numerical simulation demonstrates the efficiency and effectiveness of our proposed pre-pushing and downloading scheme by comparing to the traditional scheme.

A Study on Systematic Certification Methodology for Application Service Provider (체계적인 ASP 인증 방법론에 관한 연구)

  • Seo, Kwang-Kyu
    • IE interfaces
    • /
    • v.19 no.1
    • /
    • pp.62-69
    • /
    • 2006
  • In these days companies are rapidly implementing the extended enterprise collaboration to provide enhanced management services and products based on the enterprise integration that human resources, technologies and the management process. In this corporate environment, ASP (Application Service Provider) which is the developed type of outsourcing in the area of information technology, is a good alternative for corporate information system management. ASP defines as a software leasing service which is supplied through networks instead of purchasing application software with high price. For successful implementation of ASP, it is necessary to develop the certification methodology to ensure safety and reliability of ASP. The paper provides the safe and reliable certification methodology for ASP. In order to develop it, the critical issues related to service quality and certification of ASP are identified and the systematic certification methodology of application and service provider(service environment) domains of ASP are provided. A evaluation method for the developed certification methodology is also proposed.

A Study on OLE/COM-based GIS Data Provider Component Development Toward Application System Development (응용시스템 구축을 위한 OLE/COM 기반의 GIS 데이터 제공자 컴포넌트 시스템에 관한 연구)

  • 김민수;김광수;오병우;이기원
    • Spatial Information Research
    • /
    • v.7 no.2
    • /
    • pp.175-190
    • /
    • 1999
  • Recently , as GIS technology is rapidly improved and stabilized, there are some needs to reuse pre-developed and powerful GIS technology. GIS standardization based on components and open interfaces becomes a way to solve those reusability of previous GIS technology. This GIS standardization currently focuses on building the GIS Data Infrastructure that is being deployed globally. Especially, OpenGIS consortium which is mainly made up of international GIS leading vendors is announcing some GIS abstract specifications and implementation specifications. This study focuses on how could we design and implement the OLE/COM-based data provider component based on various DBMS or file systems, how could these data provider components be used for enterprise UIS(Urban Information Systems) and how could various formatted GIS data be shared in one system. Also some problems practically caused by an implementation process of data provider component are listed up and some solutions are given. Furthermore, design and analysis of UML(Unified Modeling Language) was reformed through the data provider component development task and this UML methodology is able to indicate a standardized model for newly developed data provider component.

  • PDF

Verification Control Algorithm of Data Integrity Verification in Remote Data sharing

  • Xu, Guangwei;Li, Shan;Lai, Miaolin;Gan, Yanglan;Feng, Xiangyang;Huang, Qiubo;Li, Li;Li, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.565-586
    • /
    • 2022
  • Cloud storage's elastic expansibility not only provides flexible services for data owners to store their data remotely, but also reduces storage operation and management costs of their data sharing. The data outsourced remotely in the storage space of cloud service provider also brings data security concerns about data integrity. Data integrity verification has become an important technology for detecting the integrity of remote shared data. However, users without data access rights to verify the data integrity will cause unnecessary overhead to data owner and cloud service provider. Especially malicious users who constantly launch data integrity verification will greatly waste service resources. Since data owner is a consumer purchasing cloud services, he needs to bear both the cost of data storage and that of data verification. This paper proposes a verification control algorithm in data integrity verification for remotely outsourced data. It designs an attribute-based encryption verification control algorithm for multiple verifiers. Moreover, data owner and cloud service provider construct a common access structure together and generate a verification sentinel to verify the authority of verifiers according to the access structure. Finally, since cloud service provider cannot know the access structure and the sentry generation operation, it can only authenticate verifiers with satisfying access policy to verify the data integrity for the corresponding outsourced data. Theoretical analysis and experimental results show that the proposed algorithm achieves fine-grained access control to multiple verifiers for the data integrity verification.

Information Credibility between Social Media Site and Review Site : Which One Do I Trust More?

  • Seo, DongBack;Lee, Jung
    • Journal of Information Technology Applications and Management
    • /
    • v.21 no.3
    • /
    • pp.35-52
    • /
    • 2014
  • This study aims to examine how the relationship with an information source affects people to perceive credibility of online information. We developed a conceptual framework that explained how people perceived information credibility when they were familiar with the information source and/or when the information source seemed credible. We then compared the models in two different contexts, namely, online review and social media sites, to examine differences. We surveyed 136 online social media users with their online shopping experiences. Among our eight hypotheses, three (H6: the personality similarity between an information provider and an information seeker enhances the perceived credibility of the former; H7: the credibility of an information provider produces a much stronger mediating effect in review sites than in social media sites; H8: the familiarity of an information seeker with an information provider produces a stronger mediating effect in social media sites than in review sites) are fully supported and four (H1: the credibility of an information provider has a positive influence on the perceived credibility of the online information; H2: the familiarity of an information seeker with an information provider has a positive influence on the perceived credibility of the online information; H3: the goal similarity between an information provider and an information seeker enhances the perceived familiarity of the latter with the former; H5: the personality similarity between an information provider and an information seeker enhances the perceived familiarity of the latter with the former) are partially supported. The hypothesis of H4: the goal similarity between an information provider and an information seeker enhances the perceived credibility of the former is rejected. The result confirms that credibility of information is strongly mediated by credibility of information source than familiarity with information source in online review sites and vice versa in social media sites.

A Study on the Adoption of Electronic Contract Service (전자계약서비스의 문제점과 해결방안)

  • Choi, Seok-Beom;Kim, Tae-Hwan;Kim, In-Kyung;Kim, Jae-Hak;Park, Sun-Young;Yoon, Young-Rim
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.34
    • /
    • pp.157-185
    • /
    • 2007
  • The purpose of this thesis is to contribute to the activation of e-contract service for one stop e-trade by analyzing the problems and its solutions in e-contract service at home and abroad. In order to achieve the purpose of this thesis, case studies are done on e-contract service providers such as CECTRUST service of NTT DATA in Japan and HanCM.com of Haansoft in Korea and user companies such as Taisei Corporation using CECTRUST service and Hyundai Card using HanCM.com. The problems in the e-contract service are the lack of e-contract service providers, rare publicity of e-contract service, limited use of e-contract service at only home, higher pricing for e-contract service, short time management of e-contract documents by service providers, no application of newly developed security technology to e-contract service, unsatisfaction of requirements of e-contract service provider as trusted third party, absence of lower pricing e-contract service by service provider, authorizing key error in electronic signature under recognized authentication system in case of fail in renewal of digital certificate and reproduction of digital certificate. The solutions of these problems are the upbringing of e-contract service providers, broad publicity of e-contract service, development of e-contract service on a global basis, establishment of lower pricing for e-contract service, long time management of e-contract documents by service providers, application of newly developed security technology such as bio technology to e-contract service, satisfaction of requirements of e-contract service provider as trusted third party by designation of recognized e-document repository, development of lower e-contract service by way of application service provider(ASP), introduction of time stamping of e-contract document and signature key value. The limitation of this thesis is that the problems and its solutions could not meet with the broad recognition as they are conferred by intuition because of few e-contract service provider.

  • PDF