• Title/Summary/Keyword: delegate

Search Result 85, Processing Time 0.032 seconds

The Biometric Signature Delegation Method with Undeniable Property (부인봉쇄 성질을 갖는 바이오메트릭 서명 위임 기법)

  • Yun, Sunghyun
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.389-395
    • /
    • 2014
  • In a biometric signature scheme, a user's biometric key is used to sign the document. It also requires the user be authenticated with biometric recognition method, prior to signing the document. Because the biometric recognition is launched every time the signature session started, it is not suitable for electronic commerce applications such as shopping malls where large number of documents to sign are required. Therefore, to commercialize biometric based signature schemes, the new proxy signature scheme is needed to ease the burden of the signer. In the proxy signature scheme, the signer can delegate signing activities to trustful third parties. In this study, the biometric based signature delegation method is proposed. The proposed scheme is suitable for applications where a lot of signing are required. It is consisted of biometric key generation, PKI based mutual authentication, signature generation and verification protocols.

Design of a Secret Sharing Scheme in a Tree-structured Hierarchy (트리 형태의 계층 구조에 적용 가능한 비밀분산법의 설계)

  • Song, Yeong-Won;Park, So-Young;Lee, Sang-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.3
    • /
    • pp.161-168
    • /
    • 2002
  • A secret sharing scheme is a cryptographic protocol to share a secret among a set of participants P in the way that only qualified subsets of P can reconstruct the secret whereas any other subset of P, non-qualified to know the secret, cannot determine anything about the secret. In this paper, we propose a new secret sharing scheme in hierarchical groups, whose hierarchy can be represented as a tree structure. In the tree structure, participants of higher levels have priorities to reconstruct the secret over participants of lower levels. In the absence of the participant of a higher level, it is possible for this participant to delegate the ability to reconstruct the secret to the child nodes of the next lower level through the transfer of his delegation ticket. This scheme has a dynamic access structure through the recursive delegation process from the root to lower levels where participants aren't absent.

A Study on the Correlation Analysis of the Present Status of Turbo Pumps Installed in Ships

  • Lee, Sang-Il;Kim, You-Taek
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.32 no.7
    • /
    • pp.1051-1060
    • /
    • 2008
  • Now days, various types of ships are operated to transport both cargo and passengers all around the world. Most of the important auxiliary machinery installed in those ships is fluid machinery such as pumps, compressors, and fans. A large percentage of fluid machinery is pumps which are classified as turbo and positive displacement pumps. This paper analyzes only turbo pumps out of the two types. This thesis has two aims: (a) to analyze the present status of pumps installed in merchant and training ships and (b) to find the correlation among sea going pump kW, port pump kW, GE kW, ME MCR, number of pumps, ME kgf, pump kgf. Based on the ship's type, my paper seeks to find special characteristics as a result of analyzing head, flow rate, and kW. Moreover this paper analyzes and compares number of pumps, rpm of pumps, pump kW/ME MCR and pump kW/GE kW under the conditions of seagoing and berthing according to the ship's type. In conclusion, (1) For the exact comparison, information on the head, kW, flow rate, number of pumps by ship's type, the pump installation status of the Merchant Ships and Training Ships were tabulated and compared in this paper. (2) In order to qualify one ship as the delegate ship, several methods were used. The result of the examination indicates that the chosen ships could be justified as a suitable representation of ships of their own type. (3) The correlation of several values(total pump kW, port pump kW, GE kW, seagoing pump kW, pump weight, ME weight, ME MCR, number of pumps and ME kW) could be obtained.

Privilege Delegation Protocol Providing Delegation Traceability Using ID-based Cryptosystem in X.509 Proxy Certificate Environment (X.509 대리 인증서 환경에서 위임 추적 기능을 제공하는 ID 기반 암호 시스템 기반 권한 위임 프로토콜)

  • Lee, Youn-Ho;Kim, Byung-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.9_10
    • /
    • pp.441-451
    • /
    • 2008
  • Currently, the X.509 proxy certificate is widely used to delegate an entity's right to another entity in the computational grid environment. However it has two drawbacks: the potential security threat caused by intraceability of a delegation chain and the inefficiency caused by an interactive communication between the right grantor and the right grantee on the delegation protocol. To address these problems for computational grids, we propose a new delegation protocol without additional cost. We use an ID-based key generation technique to generate a proxy private key which is a means to exercise the delegated signing right. By applying the ID-based key generation technique, the proposed protocol has the delegation traceability and the non-interactive delegation property. Since the right delegation occurs massively in the computational grid environment, our protocol can contribute the security enhancement by providing the delegation traceability and the efficiency enhancement by reducing the inter-domain communication cost.

Analysis of Importance, Difficulty, and Frequency of Nurses' Job in Outpatient Departments (외래간호사의 직무에 대한 중요도, 난이도, 빈도 분석)

  • Yi, Yeo-Jin;Cho, Kyung-Sook;Park, Young-Sook;Lim, Nan-Young;Kim, Dong-Oak;Kwon, Sung-Bok;Lee, Eun-Hee
    • Journal of Korean Academy of Fundamentals of Nursing
    • /
    • v.16 no.2
    • /
    • pp.232-241
    • /
    • 2009
  • Purpose: The purpose of this study was to analyze the importance, difficulty, and frequency of work (duties and tasks) done by nurses' in Outpatient Departments (OPD). Method: Data were collected using structured questionnaires, which included 11 duties and 92 tasks making up the OPD nurse's job. Questionnaires were completed by 286 nurses. Each duty and task was analyzed for importance, difficulty, and frequency (range 1-3). Results: The mean score for importance was $2.58{\pm}0.29$, for difficulty, $2.11{\pm}0.31$, and for frequency, $2.18{\pm}0.31$. OPD nurses recognized 'patient education and consultation' as important and difficult. However, in practice OPD nurses reported the most frequent task as 'support for medical services'. There was a significant difference in importance and difficulty of duties according to OPD nurses' university degree (F=3.693, p=.026; F=4.089, p=.018) and hospital size (F=4.274, p=.006; F=3.154, p=.025). However there were no differences in importance, difficulty, or frequency according to clinical experience in OPD. Conclusion: The findings indicate that OPD nurses must be able to do important and difficult duties and tasks, especially patient education and consultation. To have time for these uniquely nursing tasks, OPD nurses need to delegate 'preparation for medical service', and 'management of facility and environment' to nonmedical health-care workers.

  • PDF

A New Certificate Path Processing Scheme employed the Trusted CA for improving an efficiency on the Computational Aspect (연산적 측면의 효율성을 향상시키는 신뢰 CA를 이용한 새로운 인증 경로 처리 기법)

  • 최연희;전문석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.9C
    • /
    • pp.908-922
    • /
    • 2003
  • The Public Key Infrastructure (PKI) trends to delegate the certificate path processing to the Delegated Path Discovery (DPD) Server and Delegated Path Validation (DPV) server recently. The most critical factor for the selection of the delegated server is to allow the server to be equipped with a high reliability through a low cost, and simple implementation. In this paper, we propose a new certificate path processing scheme employed the trusted CA as the DPD/DPV server by adding the capability of the Validation Authority (VA) to the trusted CA. Since our proposed scheme uses the existing trusted CA as validation server, we can achieve a high trust through a simple implementation for the processing. Besides, we propose an additional scheme for reducing an overhead on the trusted CA. it is obtained by delegating digital signature verification to CAs on the path and by skipping the repeated path processing. As the result, our proposed validation scheme can be performed efficiently with high speed and low computational overhead.

A Study on the Information Use Behavior of Social Science Researchers (사회과학 연구자의 정보이용행태에 관한 연구)

  • Choi Eun-Ju
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.30 no.4
    • /
    • pp.13-38
    • /
    • 1996
  • This study focuses on investigating and analyzing overall information use behavior of the social science researchers. questionnaires were sent to 150 researchers in three major libraries or research institutes in the area of the social sciences, Five hypotheses were tested on the basis of the assumption that there would exist unique characteristics in the information seeking behavior of social science researchers The findings of the study shows that social science researchers prefer monographs and journals: they tend to use current material: the first information source for their research activities is the cited references in the book or journal article : they are likely to delegate literature searching to the librarian, but they tend to conduct direct searching in online setting: in general, they react positively for the rapid change in information environment caused by recent development of information technology, It is emphasized that to design an efficient information system and provide an effective information service in the social science related library or information center, it is essential to consider the major characteristics and attributes of social science researchers in terms of their information use behavior.

  • PDF

A Study on Michelle Obama's Hair Styles - Focused on Her Period of the First Lady - (미셸 오바마의 헤어스타일 연구 - 퍼스트레이디 기간을 중심으로 -)

  • Jeoung, Sun-Ju
    • Journal of Fashion Business
    • /
    • v.16 no.4
    • /
    • pp.88-99
    • /
    • 2012
  • Recently the hair style of Michelle Obama, the world's most recognized First Lady of the United States has been loved by the public with her optimistic confidence and as a fashion leader. For Michelle Obama's hair styles by length, a medium-short cut style was expressed in various ways to show her strong will by exposing the forehead, an elegant image by asymmetry hair, or a progressive image by a short volume hair cut. A medium cut style expressed an elegant and intelligent image in shoulder-length and a trendy image using a side parting. A updo hair style produced young, womanly, and casual images using twisting, binding, typing up, and rolling technique according to situations. For hair styles associated with her roles, when participating as a diplomatic delegate, she expressed the President's helpful partner by a soft and womanly image using bobbed hair and half updo technique. For the participation in state occasions, her hair styles were examined in three situations. First of all, she mainly had a neat style, exposing her forehead in official schedules as a political partner to create an intelligent and high-class image. Second, she expressed a strong will with a medium-short style during an election campaign. Finally, she showed an elegant and refined hair style in consideration of T.P.O. during social activity. Michelle Obama overcame her hair's handicap, grasped her images associated with hair length, and expressed hair strategically according to her roles as the first African-American First Lady of the United States.

New Proxy Blind Signcryption Scheme for Secure Multiple Digital Messages Transmission Based on Elliptic Curve Cryptography

  • Su, Pin-Chang;Tsai, Chien-Hua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5537-5555
    • /
    • 2017
  • Having the characteristics of unlinkability, anonymity, and unforgeability, blind signatures are widely used for privacy-related applications such as electronic cash, electronic voting and electronic auction systems where to maintain the anonymity of the participants. Among these applications, the blinded message is needed for a certain purpose by which users delegate signing operation and communicate with each other in a trusted manner. This application leads to the need of proxy blind signature schemes. Proxy blind signature is an important type of cryptographic primitive to realize the properties of both blind signature and proxy signature. Over the past years, many proxy blind signature algorithms have been adopted to fulfill such task based on the discrete logarithm problem (DLP) and the elliptic curve discrete log problem (ECDLP), and most of the existing studies mainly aim to provide effective models to satisfy the security requirements concerning a single blinded message. Unlike many previous works, the proposed scheme applies the signcryption paradigm to the proxy blind signature technology for handling multiple blinded messages at a time based on elliptic curve cryptography (ECC). This innovative method thus has a higher level of security to achieve the security goals of both blind signature and proxy signature. Moreover, the evaluation results show that this proposed protocol is more efficient, consuming low communication overhead while increasing the volume of digital messages compared to the performance from other solutions. Due to these features, this design is able to be implemented in small low-power intelligent devices and very suitable and easily adoptable for e-system applications in pervasive mobile computing environment.

Archetype and Adaptation of the Heroic Narrative Structure in NHK Drama Yoshitune -Focused on Hero's Journey by Joseph Campbell (NHK드라마 「요시쓰네(義經)」에 나타난 영웅 서사구조의 원형과 변용 -조셉 캠벨의 영웅서사를 중심으로-)

  • Choi, Jung-Eun
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.2
    • /
    • pp.163-172
    • /
    • 2012
  • The hero is in the TV drama's long. TV drama Heroes historical blip on the public's desire to delegate to the body and its functions as an intensive, which have a specific period drama that soars like a hero's welcome and it is the communication between the viewer a sense of contemporary popular devices that can be separated. This study today, the various cultural areas which are becoming popular in Japan's historical hero 'Yoshitune' a heroic drama, the hero's narrative research stories In the analysis occupies an important place in the Joseph Campbell's 17 steps of heroic narrative, based on analysis achetype and adaptation. Campbell, 11 of the 17 stage dramas to apply different levels, and the omission of two steps, and shows a variation of the four stages, in order to relaunch the popular culture as the content selection and a constant strain was able to find out that you need.