• Title/Summary/Keyword: Ticket-based

Search Result 89, Processing Time 0.024 seconds

LOS Analysis of Korean Regional Railway by TCRP Report (TCRP Report에 따른 지역간 철도의 LOS 평가)

  • Choi, Myoung-Hun;Suh, Sun-Duck;Shine, Young-Ho
    • Proceedings of the KSR Conference
    • /
    • 2008.06a
    • /
    • pp.2426-2441
    • /
    • 2008
  • This research is analyzed by the operation frequency of Regional Railroad and the Load Factor on the level of each service based on the Regional railroad ticket sales data on the 2007 fiscal year. Because the Regional Railroad passenger's satisfaction is sensitive of the transportation demand alteration, this research analyzed LOS. In addition to, analyzed the LOS will affect driving patterns of the Regional Railroad.

  • PDF

Modelling and performance analysis for the end-to-end path tracing managment in ATM network (ATM망의 단대단 통신로 추적관리의 모델링 및 성능분석)

  • 박명환;안중영;조규섭
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.9
    • /
    • pp.2385-2401
    • /
    • 1996
  • In this paper, a management model and a path trace algorithm are proposed for the end-to-end path tracing management in ATM network. Proposedmodel is based on the TINA(Telecommunication Information Networking Architecture) and computational object(CO) of ODP(Open Distributed Processing).We related computational object for the path trace to another computational object which covers the ATM routing and established operational procedure according to this relationship. This procedure identifies the end-to-end by way of tracing the ATM connections then collect identification information on the that path. End-to-end trace is performed on the network management level. Broadcasting-with-synchronized-control and GTM(Global Ticket Method) are proposed as path trace algorithm considering the real time properties and data ingetrity. Computer simulations are also performed to evaluate the performance of the proposed algorithm and its resuls are shown in this paper.

  • PDF

Authentication Mechanism for Secure Fast Handover in HMIPv6 (HMIPv6 환경에서의 안전한 Fast Handover를 위한 인증 메커니즘)

  • Kim, Min-Kyoung;Kang, Hyun-Sun;Park, Chang-Seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.3
    • /
    • pp.91-100
    • /
    • 2007
  • In this paper, We design and propose a protocol for supporting secure and efficient mobility in integrating fast handover and HMIPv6. In the proposed protocol which is AAA-based HMIPv6, if the MN enters the MAP domain for the first time, then it performs an Initial Local Binding Update for authentication. We propose a secure Fast Handover method using the ticket provided by MAP, which includes the secret key for authentication. Also, we analyze and compare security properties of our proposed scheme with those of other scheme using various attack scenario.

A Study on Blind Ticket-Based AAA Service Model for User Anonymity and Privacy offer (사용자 익명성과 프라이버시 제공을 위한 블라인드 티켓 기반 AAA 서비스 모델에 관한 연구)

  • Moon Jong-Sik;Lee Im-Yeong
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.774-777
    • /
    • 2006
  • 컴퓨터 및 네트워크의 발전은 사용자들에게 다양하고 풍부한 서비스를 제공하고 있다. 그러나 최근 사용자의 익명성, 프라이버시 측면에서 많은 문제점을 드러내고 있다. 따라서 본 연구에서는 사용자가 서비스를 이용하는데 안전하고 효율적이면서 사용자의 프라이버시 및 익명성을 제공할 수 있으며, 이동성을 고려하여 홈 네트워크에서 외부 네트워크로 이동하더라도 티켓을 사용하여 안전하고 빠른 인증을 제공할 수 있게 한다.

  • PDF

A Study on AAA Mechanism Using ID-based Ticket in Mobile Environment (모바일 환경에서 ID기반 티켓을 이용한 AAA 메커니즘에 관한 연구)

  • Moon, Jong-Sik;Lee, Im-Yeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1064-1065
    • /
    • 2007
  • 본 연구는 모바일 디바이스가 홈 인증 서버로부터 인증을 받고 난 후에 외부 네트워크로 이동하더라도 홈 인증 서버로부터 발급받은 티켓을 이용하여 홈 인증 서버로 접근 하지 않고 외부 네트워크에서의 인증을 제공하여 서비스를 받을 수 있게 한다. 본 방식은 ID기반 티켓을 사용함으로써 정당한 사용자만이 서비스를 제공받을 수 있고 교환되는 메시지 및 지연을 줄이며 지속적인 서비스를 제공받을 수 있어 안전성과 효율성을 높일 수 있다

  • PDF

Ticket Based Service Access Protocol for Mobile Communications (이동 통신을 위한 티켓 기반 서비스 접근 프로토콜)

  • 이병래;장경아;김태윤
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.04a
    • /
    • pp.862-864
    • /
    • 2001
  • 다양한 도메인에 있어서 이동 호스트의 서비스 접근은 이동성 계약에 의한 홈 도메인과 도메인간 인증에 의하여 이루어지고 있다. 그러나 다양한 서비스 제공자와 서비스들 그리고 수많은 이동 사용자들에게 있어서 홈 도메인에 의존 한 이동성 계약은 비효율적이며 실용적이지 못한다. 본 논문에서는 티켓에 기반 한 새로운 지불 프로토콜을 제안한다. 공개키 암호 시스템에 기반 한 제안된 티켓 기반 지불 프로토콜은 기존의 연고[1,2]와 비교하여 개선된 안전성과 확장성을 제공한다.

  • PDF

Dynamic Multi-Proxy Signature Schemes based on Secret Sharing and Diffie-bellman Problem (비밀분산법과 Diffie-Hellman 문제에 기반한 동적 멀티 대리서명 프로토콜)

  • 박소영;이상호
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.8
    • /
    • pp.465-472
    • /
    • 2004
  • Proxy signatures is a signature scheme that an original signer delegates one's signature capability to a proxy signer, and then the proxy signer creates a signature on behalf of the original signer. Delegation of authority is a common practice in the real world, in particular, it happens naturally in hierarchical groups such as company, bank and army, etc. In this paper, we propose a new dynamic multi-proxy signature scheme allowing repetitive delegations in a hierarchical group. We adopt multi-proxy signatures to enhance the security of proxy signature. In multi-proxy signatures, plural proxy signers can generate a valid proxy signature collectively on behalf of one original signer. In our scheme, the proxy group is not fixed but constructed dynamically according to some situations. Delegations are processed from higher level to lower level in the hierarchy using delegation tickets. When the original signer wants to delegate one's signature authority, the original signer generates a delegation ticket based on secret sharing and Diffie-Hellman problems. The delegation ticket is shared among proxy signers and then all the proxy signers can generate a valid proxy signature collectively by reconstructing the original signer's delegation ticket. If a certain proxy signer can not attend the proxy signature generating protocol, the proxy signer can also delegate repetitively his partial signature authority to the lower level participants, and then the proxies are constructed dynamically.

Active Authentication Method using NFC (NFC를 활용한 능동형 인증 방법)

  • Lee, Min-Gu;Kim, Dong-Wan;Sohn, Jin-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.2C
    • /
    • pp.140-156
    • /
    • 2012
  • Since most of recently launched smart devices support NFC(Near Field Communication), RFID applications are tend to be replaced. For instance, previous RFID application areas such as entrance control, mobile e-ticket, electronic payment and et. al are subject to change using NFC. Due to the limitation of passive communication in RFID, it is impossible to cover all security requirements of authentication and authorization mechanism that wide areas of applications demand. Therefore authentication and authorization mechanism based on NFC is very attractive to such applications because active communication methods make it possible to be highly secure in authentication and authorization. In this paper, authors propose a new approach of secure authentication and authorization mechanism using NFC smart devices based on EAP(Extensible Authentication Protocol) and AAA(Authentication, Authorization and Accounting) protocols.

Main/Sub Device Authentication and Authorization Protocol in Ubiquitous Office Network (유비쿼터스 오피스 네트워크에서의 Main/Sub 디바이스 인증/인가 프로토콜)

  • Moon, Jong-Sik;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.105-118
    • /
    • 2009
  • In modern society, as the rapid development of IT technology combined with the computer-based high-speed communication networks makes it possible to provide a wide spectrum of services and devices, we have been confronting a new cultural transformation era, referred to as the information society. However, the requirements to be considered in security aspect have became more complicated and diversified, and there remains the same security weaknesses as in the existing media or protocol. Particularly, the office network device with roaming is susceptible to the different kinds of attacks such as terminal hacking, virus attacks, and information leakage because the computing capacity is relatively low and the loading of already developed security functions is difficult. Although developed as one solution to this problems, PKI security authentication technology isn't suitable for multi-domain environments providing uonments proffice network service, and so the development of a novel authentication system is needed. Therefore, in this paper researched the roaming and device authentication/auth for multitechnology using an ID-based public key, authorization ticket, and Sub-device ticket with a purpose to contribute to the development of the secured and efficient technology.

Analysis of Spectator Factors of Seongnam Football Club Spectators

  • Kim, So Hee;Kwon, Ki Hyun;Han, Seung Jin
    • Journal of Sport and Applied Science
    • /
    • v.5 no.2
    • /
    • pp.63-71
    • /
    • 2021
  • Purpose: The purpose of this study, we will evaluate and analyze the importance and performance of Seongnam Football Club visitors using IPA analysis to present new marketing strategies and improvement plans based on the basis of the audience's perception of the team's priority, low priority, and excessive effort. Research design, data, and methodology: In order to achieve the purpose of the study, the survey was conducted on 120 home spectators of Seongnam Football Club, and the analysis of the data was conducted using SPSS Window Version 21.0. Data were analyzed via frequency analysis, exploratory factor analysis, corresponding sample t-test, and IPA analysis. Findings are as follows. Results: First, the first quadrant showed 'The convenience of access to the stadium', 'Parking lot convenience', 'Tournament schedule guidance', 'Providing information about player', 'Providing information about the team', 'Ticket reservation method'. Second, the second quadrant showed 'Players' fan service', 'Cleanliness of toilets', 'A player's level of performance', 'Team's level of play', 'A match against a rival team'. Third, the third quadrant showed 'Indication of facility guidance', 'Seat comfort', 'Team's Star Player Possession', 'Various participation events', 'Gift recommendation'. Fourth, the fourth quadrant showed 'Player-related promotion through media', 'Promote match schedules through media', 'Entrance convenience', 'Ticket Price'. Conclusions: Based on these findings, Factor in first quadrant, fourth quadrant should be kept. On the other hand, factors in second quadrant should be improved as soon as possible while factors in third quadrant can be improved through new marketing strategies in the future. Future implications were discussed.