• Title/Summary/Keyword: key management

Search Result 5,434, Processing Time 0.038 seconds

Antecedents and Consequence of Key Account Management Success: a Review, Framework and Research Agenda

  • Ahmmed, Kawsar;Noor, Nor Azila Mohd.
    • Asia-Pacific Journal of Business
    • /
    • v.4 no.1
    • /
    • pp.15-24
    • /
    • 2013
  • This paper traces the issue of key account management success which has regarded as a pressing concern of many companies' sales efforts at the organizational business-to-business context. Based on the extensive review of extant literatures, we introduced a theoretical framework that covers the antecedents and consequence of key account management success. We theorized the conditions under which organizational and relational factors influence the success of key account management approach. We endeavor to develop research propositions for each construct and provide necessary suggestions to isolate a platform for future empirical research. Beyond this span, an improved understanding from this framework will help developing policies for successful key account management approach.

  • PDF

Key Management Server Design for Providing Cryptographic Service in Cloud Computing Environment (Services in a Cloud Environment)

  • Jung, Ki Hyun;Shin, Seung Jung
    • International journal of advanced smart convergence
    • /
    • v.5 no.4
    • /
    • pp.26-31
    • /
    • 2016
  • In a cloud computing environment, a cryptographic service allows an information owner to encrypt the information and send it to a cloud server as well as to receive and decode encrypted data from the server which guarantees the confidentiality of shared information. However, if an attacker gains a coded data and has access to an encryption key via cloud server, then the server will be unable to prevent data leaks by a cloud service provider. In this paper, we proposed a key management server which does not allow an attacker to access to a coded key of the owners and prevents data leaks by a cloud service provider. A key management server provides a service where a server receives a coded public key of an information user from an owner and delivers a coded key to a user. Using a key management server proposed in this paper, we validated that the server can secure the confidentiality of an encryption key of data owners and efficiently distribute keys to data users.

A Social network analysis on the research subjects in Journal of Korean Safety Management and Science (대한안전경영과학회지의 연구 주제에 대한 사회 연결망 분석)

  • Yang, Byoung-Hak
    • Journal of the Korea Safety Management & Science
    • /
    • v.15 no.2
    • /
    • pp.161-166
    • /
    • 2013
  • The purpose of this research is to analyse the research subject in journal of Korean safety management and sciences. Total 1850 key words in 560 papers were analysed by the Pajek system which is one of well known social network analysis tool. Key words trend from 2008 to 2012 was examined. Then the relationship among each key words was visualized. There were five key words group which strongly connected among key words. The degree centrality, between centrality, proximity prestige on each key words were calculated to verify influence degree to other key words.

A Study for the Determination of Key Issues in Information Systems Management of Financial Institutions in Korea (우리나라 금융기관 정보시스템 관리에 있어서 핵심과제분야의 파악을 위한 연구)

  • Seo, Gil-Su
    • Asia pacific journal of information systems
    • /
    • v.2 no.2
    • /
    • pp.55-69
    • /
    • 1992
  • There have been several studies on the key issues in information systems (IS) management. This study replicates the Society for Information Management (SIM) survey done in U.S.A. to investigate the key issues in IS management in Korea. This survey focused especially on the professions in financial institutions. A three-round Delphi method was employed to collect the opinions of participants and obtain a reasonable level of consensus about the key IS management issues of financial institutions in Korea. The number one issue identified was top management support, followed by recruitment and development of IS human resources. This article also compares the key IS management issues of financial institutions and those of manufacturing industries in Korea.

  • PDF

Design of CEK Distributed Management System for Secure DRM Key Management. (안전한 DRM 키 관리를 위한 비밀 분산 관리 시스템 설계)

  • Sung Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.2
    • /
    • pp.390-396
    • /
    • 2005
  • With the spread of computer and development of internet service, the varied contents and digital data has been produced, then provided. The digital contents are more efficiently able to be created, produced, provided as well as distributed, on the other hand, its own copyrights seem to be more easily broken than analogue contents due to the convenience to make copies of original contents. Therefore, protecting copyrights recently become the key issue. DRM(Digital Rights Management) is the current technology to protect digital contents from duplication but it sometimes causes problems in the key-management. In this thesis, we would first like to analyze DRM and find out some trouble in the key-management of it. Finally, we will show CDMS(CEK Distributed Management System) to improve DRM out of the key-management problem and continue to study for better key-management system with it.

A Study of Location-based Key Management Using a Grid for Wireless Sensor Networks (무선 센서 네트워크에서 그리드 정보를 활용한 위치 기반 키 관리 연구)

  • Choi, Jaewoo;Kim, Yonghyun;Kim, JuYoub;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.759-766
    • /
    • 2015
  • This paper proposes a location-based key management scheme in wireless sensor networks, and among the existing location-based key management techniques, we focused on the LDK (Location Dependent Key management). In order to improve the problems occurred by communication interference, we introduced the key revision process and the method of key establishment using grid information. According to the simulation of this scheme, it increased connectivity while decreased compromise ratio than those of the previous LDK, futhermore, we confirmed that a hexagon distribution of AN reduces the network cost.

Managing Key Accounts in the Readymade Garments Industry: To What Extent Bangladeshi Companies Perform

  • Ahmmed, Kawsar;Noor, Nor Azila Mohd.
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.5 no.4
    • /
    • pp.57-65
    • /
    • 2018
  • With the paramount importance of key account management in business-to-business relationship, today companies are using this approach as a strategic weapon in their selling efforts targeted at the most important customers to solve their complex requirements with special treatment that eventually ensures both parties' financial and nonfinancial objectives. The aim of this paper is to investigate the level of key account management performance among the export-oriented readymade garments companies in Bangladesh with regards to company's experience in business, size of the company and key account serving capacity of the company. Using a questionnaire, data from 112 readymade garments companies in Bangladesh were collected and analyzed using descriptive analysis and ANOVA to test the level of key account management performance. Results show that the level of key account management performance by the garments companies did not vary by the company's experience in business and size of the company respectively. In contrast, the level of key account management performance was found to be different concerning high, medium, and low customer service capacity. Apparently, companies with big number of customers show better performance than companies with small number of customer. Implications for this study are discussed along with suggestions for future research avenues.

Efficient Key Management Protocol for Secure RTMP Video Streaming toward Trusted Quantum Network

  • Pattaranantakul, Montida;Sanguannam, Kittichai;Sangwongngam, Paramin;Vorakulpipat, Chalee
    • ETRI Journal
    • /
    • v.37 no.4
    • /
    • pp.696-706
    • /
    • 2015
  • This paper presents an achievable secure videoconferencing system based on quantum key encryption in which key management can be directly applied and embedded in a server/client videoconferencing model using, for example, OpenMeeting. A secure key management methodology is proposed to ensure both a trusted quantum network and a secure videoconferencing system. The proposed methodology presents architecture on how to share secret keys between key management servers and distant parties in a secure domain without transmitting any secrets over insecure channels. The advantages of the proposed secure key management methodology overcome the limitations of quantum point-to-point key sharing by simultaneously distributing keys to multiple users; thus, it makes quantum cryptography a more practical and secure solution. The time required for the encryption and decryption may cause a few seconds delay in video transmission, but this proposed method protects against adversary attacks.

Determinants of Key Account Management Performance in Business-to-Business Relationship: The Garments Industry in Bangladesh

  • Ahmmed, Kawsar;Noor, Nor Azila Mohd
    • Journal of Distribution Science
    • /
    • v.12 no.11
    • /
    • pp.5-13
    • /
    • 2014
  • Purpose - This study traces the determinants of key account management performance in the garments industry in Bangladesh. The key account management approach involves significant challenges for marketers to manage their strategically important customers and use this approach as a strategic weapon in their selling efforts. This study examines three categories of determinants of key account management performance including operational variables, organizational variables, and relational variables by exploring data from 100% export oriented readymade garments companies in Bangladesh. Research design, data, and methodology - Data were collected from 30 readymade garments manufacturers, considering a company as a unit of analysis. Using the data, instrument validity and reliability and, subsequently, data normality were examined using the Statistical Package for the Social Sciences (SPSS) software to isolate the important determinants of key account management performance. Results - The instruments are reliable and the data are reasonably normal. Conclusion - The study explored and validated the adapted instruments of various operational, organizational, and relational antecedent factors of key account management performance, most of which were thus far ignored.