• Title/Summary/Keyword: it security

Search Result 11,441, Processing Time 0.036 seconds

Willingness to Pay for Residential Water on Drought Conditions (가뭄시 가정용수에 대한 소비자 지불의사)

  • Park, Doo-Ho;Park, Yoon-Shin
    • Journal of Korea Water Resources Association
    • /
    • v.40 no.11
    • /
    • pp.861-867
    • /
    • 2007
  • This Research analyzes the consumers' willingness to pay(WTP) for residential water on severe drought condition. The 7 large cities and 32 chronicle drought regions have been selected for this research survey. Results show that the consumers of large cities, which are relatively rich, think water quality is more important than quantity, but the consumers of 32 chronicle drought regions expressed just opposite. Dichotomous choice and open-ended questionnaire are mixed for the survey and Tobit model is applied in the analysis. As we expected, the higher the education level, the number of household member, and the income, the higher the WTP. When there is 25% reduction of supply, the WTP is about $2 per month. Contrary to the expectation, WTP is just slightly increased for 50% of water supply reduction. This is because of the resistance of tax as well as the limited actual experiences of water shortage so, they underestimated it. In any cases, actual WTP for actual water shortage is much higher than this result. More effective water supply and distribution schedule must be ready as a national and local level to prepare severe drought in the near future. Consumers are willing to pay higher price than the current level for water security. Water distributional system should be reconsidered and alternative source of water also be prepared.

Dynamic Multi-Proxy Signature Schemes based on Secret Sharing and Diffie-bellman Problem (비밀분산법과 Diffie-Hellman 문제에 기반한 동적 멀티 대리서명 프로토콜)

  • 박소영;이상호
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.8
    • /
    • pp.465-472
    • /
    • 2004
  • Proxy signatures is a signature scheme that an original signer delegates one's signature capability to a proxy signer, and then the proxy signer creates a signature on behalf of the original signer. Delegation of authority is a common practice in the real world, in particular, it happens naturally in hierarchical groups such as company, bank and army, etc. In this paper, we propose a new dynamic multi-proxy signature scheme allowing repetitive delegations in a hierarchical group. We adopt multi-proxy signatures to enhance the security of proxy signature. In multi-proxy signatures, plural proxy signers can generate a valid proxy signature collectively on behalf of one original signer. In our scheme, the proxy group is not fixed but constructed dynamically according to some situations. Delegations are processed from higher level to lower level in the hierarchy using delegation tickets. When the original signer wants to delegate one's signature authority, the original signer generates a delegation ticket based on secret sharing and Diffie-Hellman problems. The delegation ticket is shared among proxy signers and then all the proxy signers can generate a valid proxy signature collectively by reconstructing the original signer's delegation ticket. If a certain proxy signer can not attend the proxy signature generating protocol, the proxy signer can also delegate repetitively his partial signature authority to the lower level participants, and then the proxies are constructed dynamically.

The Effect of Cultural Marketing Activities on a Corporate Brand Asset (문화마케팅 활동이 기업브랜드 자산에 미치는 영향)

  • You, Hee-Bong;Ha, Kyu-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.6
    • /
    • pp.1856-1868
    • /
    • 2008
  • This paper is about what is the effect of cultural marketing - which is affecting business ethics and social responsibility - on corporate image and formation of brand asset, and about which is getting more influence by cultural marketing among factors that is forming corporate image and brand asset. The results are like below. First, cultural marketing activities had an indirect influence on the corporate brand asset. Second, cultural marketing had an direct influence on the corporate brand image. Third, cultural marketing had a positive impact on reminding of the brand image. Fourth, social responsibility and business ethics had an indirect influence on the brand loyalty. Fifth, corporate social responsibility and business ethics had a positive impact on the brand image. Sixth, among the corporate social responsibility, community activities played a control variables. Seventh, regarding the characteristics of the respondents it showed that there's perception gaps among marketing, responsibility and ethics as well as brand assets. All in all, cultural marketing had an indirect effect on formulating corporate brand asset by the means of corporate image. The result is pointing out the importance of establishing a strategic marketing plan that is taking harmony between the character of cultural marketing and media, continuous and long-term plan, connection with the type of the brand asset into account. Moreover, as people realized that corporate business activities are brining not only economic consequences, such as providing goods and services but also social consequences, such as uneven distribution of wealth, dirty links between business and politics, consumers' security, pollution, and etc., companies are reconsidering its own role in society. This reconsideration is called corporate social responsibility and this pushed the company to keep business ethics together with their business.

PS-Net : Personalized Secure Wi-Fi Networks (PS-Net : 개인별 보안 Wi-Fi 네트워크)

  • Lee, Nam-Seh;Lee, Ju-Ho;Jeong, Choong-Kyo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.3
    • /
    • pp.497-505
    • /
    • 2015
  • Existing Wi-Fi networks require users to follow network settings of the AP (Access Point), resulting in inconveniences for users, and the password of the AP is shared by all users connected to the AP, causing security information leaks as time goes by. We propose, in this work, a personalized secure Wi-Fi network, in which each user is assigned her own virtual Wi-Fi network. One virtual Wi-Fi per user makes the user-centric network configuration possible. A user sets a pair of her own SSID and password on her device a priori, and the AP publishes its public key in a suitable way. The AP also maintains an open Wi-Fi channel, to which users can connect anytime. On user's request, the user device sends a connection request message containing a pair of SSID and password encrypted with the AP's public key. Receiving the connection request message, the AP instantiates a new virtual AP secured with the pair of SSID and password, which is dedicated to that single user device. This virtual network is securer because the password is not shared among users. It is more convenient because the network adapts itself to the user device. Experiments show that these advantages are obtained with negligible degradation in the throughput performance.

A Study on the Development of Standard Profiles Management System which supports the Technical Reference Model for Information Technology Architecture (정보기술 아키텍처를 위한 기술참조모델을 지원하는 표준프로파일 관리시스템 개발에 관한 연구)

  • Yang, Jin-Hyeok;Kim, Yeong-Do;Jeong, Hui-Jun;Yang, Jin-Yeong;Yu, Myeong-Hwan
    • The KIPS Transactions:PartD
    • /
    • v.8D no.6
    • /
    • pp.665-672
    • /
    • 2001
  • ITA (Information Technology Architecture) satisfies the requirements of information system, supports the information used in the institution's business to guarantee the interoperability and security, and analyzes the components of information system. ITA consists of EA (Enterprise Architecture), TRM (Technical Reference Manual) and SP (Standard Profile). The SP, one of the major components of ITA, is a set of information technology standards. In this paper, to construct and utilize the ITA, we mention the applications of information technology about the SP system implementation based on the TRM. The SP management system implemented in this paper is the first trial in Korea, and designs the software with object oriented programming languages such as JSP and Java. Moreover the basic and detailed specification based on the UML notation, system design using the component and system design pattern consisting of software architectures enhance the software reusability. And the constructed system in this paper shows less maintenance cost by using the public softwares such as Linux system, Korean DBMS, Apache and Tomcat, etc. Finally, the system includes the SP reference system which is used in the other institutions and cannot be found in other institutions. Also it includes the additional diverse service modules which support the subsequent processing for the establishment and revision of standards via internet.

  • PDF

The Optimum Design of Suspended Growth Systems (부유성 미생물을 이용한 생물처리법의 최적 설계)

  • Lee, Jeoung-Su
    • Journal of Korean Society of Environmental Engineers
    • /
    • v.22 no.6
    • /
    • pp.1011-1019
    • /
    • 2000
  • The purpose of this study is to examine the basis of design condition of existing treatment processes, namely, Extended Aeration Process, Conventional Activated Process, High Rate Aeration Process and Modified Aeration Process, by clarifying the correlations of influent wastewater concentration, hydraulic retention time, food-to-microorganism ratio and sedimentation of sludge, as well as to ascertain the feasibility of design, regardless of the existing design condition. In particular, this study made a priority investigation of hydraulic retention time and sludge sedimentation, because sludge sedimentation is the main factor$^{1)}$ which determines the operating conditions of existing treatment processes. Therefore, it is generally known that in case exceeds the sphere of design presented for each treatment, sludge bulking may occur. The results of Lesperance's test$^{1)}$, which formed the basis of design, showed the sphere of loading without security of sludge sedimentation, as in Fig. 1. The reason for sludge bulking in a certain condition, as above, is due to failure in application of optimum loading corresponding to each retention time by employing a few operating condition, which proved to be consecutively workable after years of trials and failures by Lesperance, for test conditions. However, the result of this test showed that in case of proper maintenance of loading. sludge sedimentation can be ensured under 120 SVI. Therefore, this study suggested hydraulic retention time and its corresponding optimum loading, and identified the hydraulic retention time as a determinant of sludge sedimentation. And. on the basis of these findings, this study suggested the feasiblity of UHR(Ultra High Rate), a new operating process, exceeding several times the applicable loading value of High Rate Aeration Process under one hour retention time which has not yet applied to the existing treatment processes.

  • PDF

A Study of the Situation Based Disaster Response Model from the Damage of Storm and Flood Field Manual (풍수해 현장조치 행동매뉴얼 분석을 통한 상황 기반 재난 대응 모델 연구)

  • Lee, Chang Yeol;Park, Gil Joo;Kim, Twehwan;Lee, Hyeon Sung
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.4
    • /
    • pp.617-625
    • /
    • 2019
  • Purpose: The fields manuals which is managed by the each disaster types are the integrated guideline. When the disaster occurred, all kinds of SOPs which are described in the manual does not need. Therefore, the person in charge is confused which SOP is executed. In this study, we propose the disaster response process model based on the specific disaster situation case. Method: Firstly, we define the disaster situation cases which is mentioned in the field manual, and then, we develop the disaster response process model including indispensible SOPs for the specific disaster situation case. As a verification and feedback process, we apply the model to Safety Korea Exercise scenario. Result: We developed SOP model and disaster response process model reflecting the concept of the disaster situation case. Conclusion: Safety Kore Exercise scenario reflecting the developed model may continuously upgrade the field manual.

RFID Tag Identification with Scalability Using SP-Division Algorithm on the Grid Environment (그리드 환경에서 SP분할 알고리즘을 이용한 확장성 있는 RFID 태그 판별)

  • Shin, Myeong-Sook;Ahn, Seong-Soo;Lee, Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.10
    • /
    • pp.2105-2112
    • /
    • 2009
  • Recently RFID system has been adopted in various fields rapidly. However, we ought to solve the problem of privacy invasion that can be occurred by obtaining information of RFID Tag without any permission for popularization of RFID system To solve the problems, it is Ohkubo et al.'s Hash-Chain Scheme which is the safest method. However, this method has a problem that requesting lots of computing process because of increasing numbers of Tag. Therefore, We suggest the way (process) satisfied with all necessary security of Privacy Protection Shreme and decreased in Tag Identification Time in this paper. First, We'll suggest the SP-Division Algorithm seperating SPs using the Performance Measurement consequence of each node after framing the program to create Hash-Chain Calculated table to get optimized performance because of character of the grid environment comprised of heterogeneous system. If we compare consequence fixed the number of nodes to 4 with a single node, equal partition, and SP partition, when the total number of SPs is 1000, 40%, 49%, when the total number of SPs is 2000, 42%, 51%, when the total number of SPs is 3000, 39%, 49%, and when the total number of SPs is 4000, 46%, 56% is improved.

A Crypto-processor Supporting Multiple Block Cipher Algorithms (다중 블록 암호 알고리듬을 지원하는 암호 프로세서)

  • Cho, Wook-Lae;Kim, Ki-Bbeum;Bae, Gi-Chur;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2093-2099
    • /
    • 2016
  • This paper describes a design of crypto-processor that supports multiple block cipher algorithms of PRESENT, ARIA, and AES. The crypto-processor integrates three cores that are PRmo (PRESENT with mode of operation), AR_AS (ARIA_AES), and AES-16b. The PRmo core implementing 64-bit block cipher PRESENT supports key length 80-bit and 128-bit, and four modes of operation including ECB, CBC, OFB, and CTR. The AR_AS core supporting key length 128-bit and 256-bit integrates two 128-bit block ciphers ARIA and AES into a single data-path by utilizing resource sharing technique. The AES-16b core supporting key length 128-bit implements AES with a reduced data-path of 16-bit for minimizing hardware. Each crypto-core contains its own on-the-fly key scheduler, and consecutive blocks of plaintext/ciphertext can be processed without reloading key. The crypto-processor was verified by FPGA implementation. The crypto-processor implemented with a $0.18{\mu}m$ CMOS cell library occupies 54,500 gate equivalents (GEs), and it can operate with 55 MHz clock frequency.

Effects of Short-Term Music Therapy in Fire Fighters with Post-Traumatic Stress Risk (외상 후 스트레스 위기 소방관에 대한 단기간 음악치료의 효과)

  • Shim, Gyu-Sik;Kim, Nam-Song;Bang, Sung-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.6
    • /
    • pp.4040-4047
    • /
    • 2015
  • The purpose of this study was to analyze a change in Post-traumatic Stress Disorder (PTSD) level and the continuity of the effects in music therapy by applying short-term music therapy program in fire fighters with Post-traumatic Stress (PTS). Forty two fire fighters in 3 districts were randomly assigned to experimental group (21 subjects) and control group (21 subjects). Music therapy was applied in totally 10 sessions by two sessions (120 minutes) a day for 5 days. PTS level was measured immediately after the end of program, after 4 weeks, and after 12 weeks. As a result, PTS level has significantly decreased into $8.90{\pm}4.55$ from $26.52{\pm}2.32$ right after the music therapy program(p<0.05). And the effect was shown to be continued significantly up to after 4 weeks($11.95{\pm}4.57$) and after 12 weeks($13.76{\pm}5.62$)(p<0.05). As a result of research, it is considered that the music therapy is effective approach for reduction in PTS as for fire fighters who belong to the group with high risk of PTSD. Accordingly, the application of regular program for managing fire fighters' mental health is understood to likely to contribute to enhancing the field service competence.