• Title/Summary/Keyword: Ticket-based

Search Result 89, Processing Time 0.028 seconds

A Study on The Legal Effect of Arbitration Agreement (중재계약의 법적 효력에 관한 연구)

  • Park, Jong-Sam
    • Journal of Arbitration Studies
    • /
    • v.19 no.3
    • /
    • pp.25-42
    • /
    • 2009
  • That occur in international trade disputes between the parties without resorting to a court trial on the basis of principle of government by the parties to resolve the dispute resolution in general (Alternative Disputes Resolution: ADR) agreed to, reconciliation, coordination, mediation and other methods are. Here, unlike arbitration and other dispute resolution arbitrator, the court confirmed the arbitration award came from the judge and the same shall become effective in doing international commerce dispute resolution methods are widely used. Arbitration Agreement is a contractual dispute, regardless of whether a certain law there arise about the relationship between the parties, Currently exists, future conflicts can arise in whole or in part by the arbitration agreement is to be resolved. Arbitration agreement include: the effects of out of contract arbitration proceedings, the court does not want the progress of the dispute referred to arbitration proceedings to the effect, and the presence of the parties to the arbitration agreement does not claim to knowing the defense plea that Appeals ticket of destruction that have the effect of demurrer, that the arbitration agreement are rebuttal to the rebuttal of prozesshindernde Einrede and the mediation of a plea on the merits when the first defense must be submitted to the arbitration proceedings in which the applicant until the arbitration award determined that the property dispute to court for water conservation measures to dispose of the watch was in effect for arbitration in the contract. In addition, the arbitration agreement and the court sentenced the same kinds of effects that resolved the final effect, especially at the same time the effect of foreign recognition and enforcement of the decision regarding the New York Convention arbitration award based on the recognition and enforcement of domestic and international effects are being recognized. Consequently, the arbitration agreement to take effect a valid arbitration agreement exists is determined by whether or not staying. Therefore, agreements between individual university entrance exams based on the company signed a contract regarding the effect of arbitration first, associated with individual university entrance exams, and the leading research and analysis, review, and examine the general concept of the arbitration agreement after the arbitration agreement between the parties focuses on information about the effects of study to contribute to the activation of the arbitration system is aimed at the individual university entrance exams.

  • PDF

A Study on Authentication Technique based on OSGi Service Platform (OSGi 서비스 플랫폼 기반의 인증 기법에 관한 연구)

  • I, Chang-Uk;Hong, Won-Gi;Chang, Hoon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.387-395
    • /
    • 2009
  • The establishment of security architecture is essential because security vulnerabilities occur such as user's unjustifiable connection for the opened gateway and access to resources without permission in OSGi service platform environment. In this paper, it proposes a authentication technique for an Automatic user authentication which is used the Symmetric Key and the Service bundle authentication to consider the constraints of the hardware in the OSGi service platform environment. Typically, the type of entering a password is used for the user authentication mechanism however OSGi platform environment studies not entering the password but using MAC address and encrypted identifier of the automatic user authentication mechanism because the devices are limited in their input. In this paper, the Symmetric Key is used for bundle authentication mechanism. Therefore operation becomes quick and secure authentication process has been successfully completed by using the time data and a ticket which contains a license. Based on these two different authentication mechanisms, it could eliminate the constraints of resources and improve the convenience of users and administrators. Also it shows an effect from omitting the waiting time to enter a password and reducing operations which need for authentication in the OSGi service platform environment.

Anti-Spam for VoIP based on Turing Test (튜링 테스트 기반으로 한 VoIP 스팸방지)

  • Kim, Myung-Won;Kwak, Hu-Keun;Chung, Kyu-Sik
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.3
    • /
    • pp.261-265
    • /
    • 2008
  • As increasing the user of VoIP service using ITSP(Internet Telephony Service Provider), the VoIP spam becomes a big problem. The spam used in the existing public telephone is detected by using the pattern inspection of call behavior because it is difficult to filter contents for the characteristic of real-time voice communication. However there is a false-positive problem. The threat on spam remains where spam with low threshold can't be detected or users share one number. In this paper, we propose anti-spam for VoIP based on luring test. The proposed method gives a user luring test and he/she can connect to a receiver if passing turing test. A ticket is given to a user that pass luring test and it reduces overhead of luring test in re-dial. The proposed method is implemented on ASUS WL-500G wireless router and Asterisk IP-PBX. Experimental results show the effectiveness of the proposed method.

A Leverage Strategy of the Defense Program Analysis Based on Systems Thinking (시스템 사고를 이용한 국방 사업분석 레버리지 전략)

  • Seo, Hyeok;Lee, Sang-Eun
    • Korean System Dynamics Review
    • /
    • v.10 no.1
    • /
    • pp.77-95
    • /
    • 2009
  • The ever-increasing government budget constraints have led to a continued decline in the increase rate for defense spending, and the government's 5-year National Fiscal Management Plan has served to reinforce the verification and validation procedures for the Force Improvement Programs (FIP) budget requirements and performance. Additionally, as large programs are controlled in accordance with the Total Program Cost Management Guidelines, timely and credible feasibility study and performance measurement need to be conducted. Due to these internal and external circumstances, needs have surged for feasibility and economic effectiveness study for big ticket projects in the FIP sector, with an increasing number of studies conducted by external research institutes. However, questions have been raised regarding the credibility and thoroughness of the program analyses performed by these research institutes due to various restrictions. This paper analyzes and identifies the structural limitations and problems using a systems thinking approach, and examines the systemic characteristics of the program analysis system. It also presents policy intervention recommendations based on the theory of systems thinking, a method to regularize and reinforce the program analysis system. Policy interventions recommended to ensure alignment of the external studies to the clear analysis objectives and resolve the bottlenecks in the external analysis include training those in charge of external study commissioning for a short term intervention, and increasing the number of research institutes and consulting agencies utilizing analysis and evaluation experts who transition to the private sector from the military for a long term intervention. additionally presented are strategies and policy alternatives to best utilize these policy interventions. They will contribute to the stable funding of Force Improvement Programs and efficient utilization of defense budget.

  • PDF

Analysis & defence of detection technology in network Attacker (네트워크 침입자탐지기법 분석과 대응)

  • Yun, Dong Sic
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.155-163
    • /
    • 2013
  • Connection hijacking attack using the vulnerability of the TCP protocol to redirect TCP stream goes through your machine actively (Active Attack). The SKEY such as one-time password protection mechanisms that are provided by a ticket-based authentication system such as Kerberos or redirection, the attacker can bypass.Someone TCP connection if you have access on TCP packet sniffer or packet generator is very vulnerable. Sniffer to defend against attacks such as one-time passwords and token-based authentication and user identification scheme has been used. Active protection, but these methods does not sign or encrypt the data stream from sniffing passwords over insecure networks, they are still vulnerable from attacks. For many people, an active attack is very difficult and so I think the threat is low, but here to help break the illusion successful intrusion on the UNIX host, a very aggressive attack is presented. The tools available on the Internet that attempt to exploit this vulnerability, known as the recent theoretical measures is required. In this paper, we propose analysis techniques on a wireless network intruder detection.

Design and Safety Analysis of a Role-Based Access Control Framework for Mobile Agents in Home Network Environments (홈 네트워크 환경에서 이동 에이전트의 역할에 기반한 접근제어 프레임워크 설계 및 안전성 평가)

  • Jung, Young-Woo;Ko, Kwang-Sun;Kim, Gu-Su;Eom, Young-Ik
    • The KIPS Transactions:PartC
    • /
    • v.14C no.6
    • /
    • pp.537-544
    • /
    • 2007
  • A home network is a residential local area network in which digital home appliances are connected with each other. Applying the mobile agent technology to the home network is expected to provide a new computing model. In particular, mobility and asynchronous ability of mobile agent can be used to reduce network traffic generated for managing home appliances. However, in order to apply the mobile agent concept to the home network, access control for mobile agents is necessary. In the existing home network system, there is one special server, sometimes called home server This server generally has mapping tables to be updated periodically, which describes access control lists between users' authorities and corresponding devices. In this paper, we propose a role-based access control framework with mobile agents in home networks. This framework, called Secure KAgent framework, is designed and implemented based on KAgent system. It has two main characteristics: to control access permissions based on Role-Based Access Control(RBAC) scheme and to safety assign roles to mobile agents by role tickets.

A Study on the Improvement Plan for the Revitalization of Commercial Facilities in Railway Station Building - Focused on Ecute of Commercial Facilities of Railway Station Building in Japan - (철도 역내 상업시설의 이용 활성화를 위한 개선방안 모색 - 일본의 역내 상업시설 'ecute'에 관한 고찰을 중심으로 -)

  • Moon, Suh-hyun
    • Korean Institute of Interior Design Journal
    • /
    • v.26 no.3
    • /
    • pp.101-112
    • /
    • 2017
  • Based on an analysis of the characteristics of "Ecute" of the East Japan Railway Company (JR East) that planned the world's first large scale commercial facilities inside a ticket gate (paid-area including waiting room and platforms), the present study proposes a brand development of commercial facilities inside aged railway stations, where only basic railway business have been provided focusing on passenger transportation, by renewing the definition of railway commercial facilities and presenting a detailed planning and the direction of the operation system. A list of practical tasks that can be carried out in academia, planning and operation / management to facilitate the revitalization of the use of commercial facilities inside railway stations are as follows: 1) the setting of a wide scope for the revitalization of railway commercial facilities around the railway station focusing on private-funded stations in addition to existing stations; a setup of the direct scope of commercial development in the practical railway operation for passengers and stations in terms of external research, and a corresponding shift in thinking in terms of internal research 2) development of under used spaces such as the transfer area (Gongdeok Seoul Wangsimri Station are first target stations where more than four subway lines intersect) 3) brand establishment through improvement strategies for image and symbolism specialized for railway stations 4) rent of suitable business stores and layout of commercial facilities by analysis of passenger move pattern 5) development of commercial facilities which can attract customers by displaying various products, as well as finding a way to develop them in to a base facility that connects to local infrastructures 6) providing advertisement and management system for continual maintenance, and 7) brand specialization through unique storytelling and design plan that stimulates sensibility. The above study results can be utilized as a starting point for design brand awareness about commercial facilities in railway stations in Korea, which can be developed further to improve station image and passenger convenience, as well as to increase the revenue of railway businesses.

Estimation of Willingness-to-pay for Mitigating Crowdedness in High-speed Rail Trains (고속철도 차량 내 혼잡도 완화에 대한 지불 용의액 추정 연구)

  • Lee, Jang-Ho;Kim, Dong-Sun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.37 no.2
    • /
    • pp.379-387
    • /
    • 2017
  • As the average load factor of High-Speed Rail (HSR) trains increased up to 98%, it caused uncomfortable crowdedness in the cabin and deteriorated the level of service to the HSR users. In this paper, we estimated the willingness-to-pay (WTP) of the HSR users for mitigating the crowdedness in the cabin. The contingent valuation method based on the stated preference data was used and the tobit model was applied for the estimation of WTP. It can be concluded that WTP for mitigating the crowdedness in the HSR trains is proportional to the congestion level of train and income level of user. Males, first-class users, not-assigned ticket users, and monthly pass users have relatively higher WTPs, while homemakers, travelers in weekends, commuters and leisure travelers have relatively lower values. The results can provide the fundamental information to estimate the benefits of mitigating crowdedness or the magnitude of governmental subsidy to railway operators for additional introduction of HSR trains.

A Study on Cooperation between Kerberos system and Credit-Control Server

  • Choi, Bae-Young;Lim, Hyung-Jin;Chung, Tai-Myoung
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.281-284
    • /
    • 2005
  • Kerberos is system that offer authorization in internet and authentication service. Can speak that put each server between client and user in distributed environment and is security system of symmetry height encryption base that offer authentication base mutually. Kerberos authentication is based entirely on the knowledge of passwords that are stored on the Kerberos Server. A user proves her identity to the Kerberos Server by demonstrating Knowledge of the key. The fact that the Kerberos Server has access to the user's decrypted password is a rwsult of the fact that Kerberos does not use public key cryptogrphy. It is a serious disadvantage of the Kerbercs System. The Server must be physically secure to prevent an attacker from stealing the Kerberos Server and learning all of the user passwords. Kerberos was designend so that the server can be stateless. The Kerberos Server simply answers requests from users and issues tickets. This study focused on designing a SIP procy for interworking with AAA server with respect to user authentication and Kerberos System. Kerberos is security system of encryption base that offer certification function mutually between client application element and server application element in distributed network environment. Kerberos provides service necessary to control whether is going to approve also so that certain client may access to certain server. This paper does Credit-Control Server's function in AAA system of Diameter base so that can include Accounting information that is connected to Rating inside certification information message in Rating process with Kerberos system.

  • PDF

Reversible Data Hiding based on QR Code for Binary Image (이진 이미지를 위한 QR 코드 기반의 가역적인 데이터 은닉)

  • Kim, Cheonshik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.281-288
    • /
    • 2014
  • QR code (abbreviated from Quick Response Code) is code system that is strong in against to apply image processing techniques (skew, warp, blur, and rotate) as QR codes can store several hundred times the amount of information carried by ordinary bar codes. For this reason, QR code is used in various fields, e.g., air ticket (boarding control system), food(vegetables, meat etc.) tracking system, contact lenses management, prescription management, patient wrist band (patient management) etc. In this paper, we proposed reversible data hiding for binary images. A reversible data hiding algorithm, which can recover the original image without any distortion from the marked (stego) image after the hidden data have been extracted, because it is possible to use various kinds of purposes. QR code can be used to generate by anyone so it can be easily used for crime. In order to prevent crimes related QR code, reversible data hiding can confirm if QR code is counterfeit or not as including authentication information. In this paper, we proved proposed method as experiments.