• Title/Summary/Keyword: information provider

Search Result 1,231, Processing Time 0.041 seconds

Direction Presentation of Design on Privacy Preserving Mechanism for Location-Sharing Based Services (위치공유기반 서비스의 프라이버시 보호 방안의 설계 방향 제시)

  • Kim, Mihui
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.2
    • /
    • pp.101-108
    • /
    • 2015
  • Location-sharing based service (LSBS) refers to a service that users share their location information with other users with whom friendship. At this time, the location information is shared through service provider, and then their position information is exposed to the service provider. The exposure of this personal position information to the service provider has raised a privacy problem, and thus privacy preserving mechanisms have been proposed to protect them. In this paper, we examine the types and features of the proposed location-sharing based services so far, and survey the research trend of privacy preserving mechanisms for them. Through the analysis on existing privacy preserving mechanisms, we present design factors for a privacy preserving mechanism for the current LSBS services, and suggest future work.

Consistent Distributed Lookup Service Architecture for Mobile Ad-hoc Networks

  • Malik Muhammad Ali;Kim Jai-Hoon
    • International Journal of Contents
    • /
    • v.2 no.2
    • /
    • pp.29-31
    • /
    • 2006
  • Mobile Ad hoc network is a self configuring network of mobile nodes. It allows mobile nodes to configure network spontaneously and share their services. In these networks, service discovery is very important because all nodes do not have same resources in term of memory and computing power. Nodes need to use different services offered by different servers. Some service discovery protocols have been proposed in last couple of years but they include significant traffic overhead and for small scale MANETS. In this paper, we present extensible lookup service scheme based on distributed mechanism. In our scheme neighboring nodes of service provider monitor service provider and send notification to lookup server when the service provider terminates its services unexpectedly. Lookup server can find other service provider or other alternative services in advance because of advance notification method and can provide consistent lookup services. In our scheme neighboring nodes also monitor lookup server and send notification to network when lookup server terminates unexpectedly. Simulation results show that our scheme can reduce up to 70% and 30% lookup failure as compare to centralize and simple distributed mechanism respectively.

  • PDF

Mobility Support on Provider Provisioned VPN (Provider Provisioned VPN에서 이동성 지원 방안)

  • Byun, Hae-Sun;Lee, Mee-Jeong
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10d
    • /
    • pp.405-410
    • /
    • 2006
  • 본 논문에서는 PPVPN(Provider Provisioned VPN)에서 PE(Provider Edge) 기반 모바일 VPN 서비스를 제공하기 위한 네트워크 구조 및 이동성 지원 프로토콜을 제안한다. 제안하는 방안은 RFC2547에 제시된 'BGP/MPLS VPN' 기술을 기반으로 하며, BGP/MPLS VPN 서비스를 제공받고 있는 모바일 사용자가 외부 네트워크로 이동했을 때, 모바일 사용자의 VPN 접속 및 이동성을 지원하기 위해 서비스 제공자 측에 PNS(PPVPN Network Server)를 새로이 도입하였다. PNS는 모바일 사용자와 VPN을 매핑하는 바인딩 정보를 유지하며, 모바일 사용자를 서비스하는 외부 네트워크의 GW와 서비스 제공자 네트워크의 PE간 접속회선으로 IPSec 터널을 설립하도록 지시하고, 그 PE에게 모바일 사용자의 VPN 접속에 필요한 정보를 제공하여 그 PE가 BGP/MPLS 동작에 참여하도록 한다.

  • PDF

Authenticated IGMP for Controlling Access to Multicast Distribution Tree (멀티캐스트 분배트리 접근제어를 위한 Authenticated IGMP)

  • Park, Chang-Seop;Kang, Hyun-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.3-17
    • /
    • 2007
  • Receiver access control scheme is proposed to protect multicast distribution tree from DoS(Denial-of Service) attack induced by unauthorized use of IGMP(Internet group management protocol), by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP(Content Provider), NSP(Network Service Provider), and group members.

Development of Certification Program for Application Service Provider : Application Certification (ASP 인증제도 개발 : 어플리케이션 인증)

  • Seo Kwang Kyu
    • Journal of the Korea Safety Management & Science
    • /
    • v.7 no.3
    • /
    • pp.97-108
    • /
    • 2005
  • The issue of using information system to ensure competitive power in the market is rising. The outsourcing methods that entrust activities of information system of companies to other expert agencies are increasing as the enterprises make a lot of efforts to put their resources to their heart of business in the process of adopting information system. Recently, ASP (Application Service Provider) as new information technology outsourcing method appears due to development of network technology and spreading of peculating software. ASP defines as a software leasing service which is supplied through networks instead of purchasing application software with high price. For successful implementation of ASP, it is necessary to develop a certification program to ensure safety and reliability of ASP. This paper provides the safe and reliable certification program for ASP. In order to develop it, the critical issues related to service quality and certification of ASP are identified and then evaluation methodology for ASP certification program is proposed. This paper presents application certification as the part of ASP certification program.

EDS scenario Implementation for the Multiple Network and Multiple Service Environments

  • Kim, Dong-Il;Lee, Soong-Hee
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.2
    • /
    • pp.135-140
    • /
    • 2009
  • The wide deployment of wireless access technologies and the integration of various access network interfaces into a single terminal, allows mobile end-users to be always connected to the IP network, and to use those interface simultaneously. In this paper the CTE provides various access network interfaces capabilities, allowing reception of data over multiple service providers with different characteristics. Considerations for multiple network and service provider environments are regarded as essential for the successful deployment of convergence services in Next Generation Network (NGN). Event Driven Service (EDS) is regarded as a typical convergence service converging different functions of multiple service providers. This paper first describes the deployment model of NGN convergence services for multiple service provider environments. It also covers the service scenario of EDS, a convergence service for multiple service provider environments in NGN. Multiple provider environments stimulates the unified identifier management, namely ubiquitous identification (U-ID), to enable users to be provided convergence services without awareness of multiple provides. Then the designed structure and procedures of U-ID based EDS are given. Finally, the implementation results tested on Korea Advanced Research Network (KOREN) are described.

Determinants and Optimum Modelling of Logistics Outsourcing Strategy (물류(物流) 아웃소싱 전략(戰略) 결정요인(決定要因) 및 최적(最適) 모델)

  • Song, Gye-Eui
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.13
    • /
    • pp.283-302
    • /
    • 2000
  • The firms aim to acquire services and costs advantage from logistics outsourcing strategy. But it is very important to select optimum service provider. A checklist of the criteria for the evaluation of service providers follows : service quality, low cost, logistics information system, service network, financial stability, investments in plant and equipment, management attitude and lookout for the future strategic fit, cultural and psychological barriers etc. Also, a 8-step implement of logistics outsourcing strategy will be of help for maximizing benefits of logistics outsourcing. It follows : 1-step : logistics environment analysis, 2-step : check service provider availability, 3-step : logistics outsourcing determinant analysis, 4-step : select of optimum service provider, 5-step : contract with optimum service provider, 6-step : identify of remaining barriers, 7-step : performance of logistics outsourcing, 8-step : evaluation.

  • PDF

Criminal liability of Internet Service Provider who leave illegal positing to take its own course (인터넷불법게시물을 방임하는 인터넷서비스제공자의 형사책임)

  • Yoo, In-Chang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.8
    • /
    • pp.163-170
    • /
    • 2012
  • Nowadays Internet is the greatest and most participating media of prompting expression with 37 million users in Korea. Internet enables collective communications between social members and contributes to form sound public opinions and to develop democracy while it has negative aspect to distribute massively crime by illegal posting which is forbidden by the Criminal Act. Criminal actors who involve to diffuse information on Internet consist of three categories of information provider, user and internet service provider. Illegal posting generated on Internet is originated from IP and the criminal regulation on it is useless and meaningless because of its countless of users and ambiguous boundary with liberty for expression. Accordingly, the only criminal policy means to prevent danger by illegal posting on Internet is to regulate ISP which saves illegal posting and mediates contacts among users. In spite of it, legislation to regulate ISP is unprepared. The prudent legislative review should be done. And it should be accordance with the doctrines of propriety and vagueness of the principle of "nulla poena sine lege".

Convergence Security Provider Self-Conformity System (융합보안 공급자 자기 적합성 제도)

  • Baik, Namkyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.2
    • /
    • pp.53-61
    • /
    • 2019
  • In this paper, we propose 'a self - conformance system of convergence security provider' to provide basic data for security and reliability of convergence industrial technology, system and service. It is difficult to evaluate convergence security systems, limited to information and communication service providers, unable to check convergence security items, burden of submission documents, difficulty in measuring convergence security service level and we will summarize product and service-based requirements that can be integrated and systematically measure the level of convergence security and define renewed life cycle-based convergence security information and content security and assurance requirements. On the basis of this, each convergence security company declares conformity with the standard itself without the certification of the certification body, and introduces the provider conformity certification system which can manufacture and sell. This will enable the company to strengthen its competitiveness through timely launch and implementation of products and services and cost reduction.

An Exploratory Study of Information Services Based on User's Characteristics and Needs (이용자의 특성과 요구에 기반 한 정보서비스에 관한 탐험적인 연구)

  • Lee, Lan-Ju
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.27 no.1
    • /
    • pp.291-312
    • /
    • 2016
  • The purpose of this study is to develop an effective information service process based on user's characteristics and needs in academic libraries. The process was informed by analysis of the entire information service cycle using real users as an exploratory study. The interview process between the user and information provider, and the information provider's perspectives regarding information services demonstrated that the user's information and subject analysis, effective interview methods, communication skills, information provider's recognition of information services, and core ability are important elements for effective information services.