• 제목/요약/키워드: key management

검색결과 5,482건 처리시간 0.033초

KEY BARRIERS AND THEIR STRATEGIC RESPONSES TO ACTIVATE KNOWLEDGE SHARING IN CONSTRUCTION ORGANIZATIONS

  • Tae-Wan Kim ;Hyoun-Woo Joh
    • 국제학술발표논문집
    • /
    • The 1th International Conference on Construction Engineering and Project Management
    • /
    • pp.403-408
    • /
    • 2005
  • Being in a knowledge-based industry, many construction organizations are seeking to manage their own knowledge in an effective way. To manage knowledge, the organizations must motivate in-house people to share their knowledge. However, some barriers to knowledge sharing do exist and researches on these barriers considering construction organizations' characteristics seem rare. This study aims to identify key barriers to knowledge sharing considering the characteristics of construction organizations. Based on the identification, strategic responses to each key barrier are presented in two perspectives of technical and behavioral approach to activate knowledge sharing.

  • PDF

Group Key Management based on (2, 2) Secret Sharing

  • Wuu, Lih-Chyau;Hung, Chi-Hsiang;Kuo, Wen-Chung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권3호
    • /
    • pp.1144-1156
    • /
    • 2014
  • In Internet, IP multicast has been used successfully to provide an efficient, best-effort delivery service for group communication applications. However, applications such as multiparty private conference, distribution of stock market information, pay per view and other subscriber services may require secure multicast to protect integrity and confidentiality of the group traffic, and validate message authenticity. Providing secure multicast for group communication is problematic without a robust group key management. In this paper, we propose a group key management scheme based on the secret sharing technology to require each member by itself to generate the group key when receiving a rekeying message multicast by the group key distributor. The proposed scheme enforces mutual authentication between a member and the group key distributor while executing the rekeying process, and provides forward secrecy and backward secrecy properties, and resists replay attack, impersonating attack, group key disclosing attack and malicious insider attack.

Security Improvement of ID-based Multiple Key Management Scheme for t Scalable Ad Hoc Networks

  • 박요한;박영호;문상재
    • 한국산업정보학회논문지
    • /
    • 제16권2호
    • /
    • pp.13-18
    • /
    • 2011
  • Security supports are a significant factor in mobile ad hoc networks. Especially in dynamic topologies, considering cluster, key management is essential to provide a secure system. Recently, Li-Liu proposed iD-based multiple key management scheme for cluster-based ad hoc networks. However, we found the security weakness of their scheme. In this paper, we analyze the security of Li-Liu's scheme and show that master secret key and fragment of the master secret key can be revealed to compromised CHs and nodes. Furthermore, we propose a solution to improve the scheme against disclosure of the share key and the master secret key even though system parameters are opened to compromised nodes and modify the Li-Liu's scheme fitted for a scalable networks. The improved IMKM scheme could be usefully applied in dynamic cluster-based MANETs such as the military battlefields, mobile marketplace and VANETs.

VANET에서 카운팅 블룸 필터를 사용한 효율적인 그룹 키 관리 기법 (An Efficient Group Key Management Scheme using Counting Bloom Filter in VANET)

  • 이수연;안효범
    • 융합보안논문지
    • /
    • 제13권4호
    • /
    • pp.47-52
    • /
    • 2013
  • VANET(Vehicular Ad-hoc Network)은 원활한 교통 소통, 사고 방지 등 여러 가지 편리한 기능들을 제공하지만 그 기반을 애드혹 네트워크에 두고 있기 때문에 애드혹 망에서 발생하는 보안 문제를 가지고 있다. VANET에서 사용자의 프라이버시를 보호하기 위해 그룹 서명방식 등이 연구되어졌다. 그러나 그룹 간에 그룹 키 생성 단계 및 그룹 키 갱신단계에서 RSU(Road-Side Unit) 및 차량의 계산상 오버헤드가 발생한다. 본 논문에서는 효율적인 그룹 키 관리 기술을 제안한다. 즉, 그룹 키 생성 및 갱신 단계에서 CBF(Counting Bloom Filter)를 사용하므로 RSU 및 차량의 계산상 오버헤드를 감소시킨다. 또한, RSU와 차량에서 그룹 키를 자체적으로 갱신하여 관리하는 기법이다.

EPON MAC 계층의 안전한 데이터 전송을 위한 인증 및 키관리 프로토콜 (An Authentication and Key Management Protocol for Secure Data Exchange in EPON MAC Layer)

  • 강인곤;이도훈;이봉주;김영천
    • 한국통신학회논문지
    • /
    • 제28권1B호
    • /
    • pp.1-10
    • /
    • 2003
  • IEEE 802 3ah에서 표준화가 진행되고 있는 EPON은 하나의 OLT와 다수의 ONU가 수동소자에 의해 트리 구조로 연결되므로 도청, 위장, 가용성 등의 보안 위협을 포함한다 본 논문에서는 EPON에서 보안 위협으로부터 망을 보호하고 안전한 데이터 전송을 보장하기 위해 MAC 계층에서 인증 및 비밀성 서비스를 제공하는 보안 프로토콜을 설계하였다. 설계된 보안 프로토콜은 효율적인 키관리를 위하여 공개키 기반 인증 및 키관리 프로토콜을 이용하며, 비밀성 서비스를 위하여 최근 표준화된 AES의 Rijndael 알고리즘을 채택하였다. 제안된 인증 및 키관리 프로토콜은 인증과 공개키 교환을 동시에 수행하며, 공개 난수를 전송하여 공통의 암호키를 생성하는 안전한 프로토콜이다. 키관리의 구현을 위하여 인증 및 공개키 교환 절차, 세션키 변경 절차, 키복구 절차 등을 제안하였다. 제안된 프로토콜을 검증하기 위하여 알려진 세션키, 전향적 비밀성, 미지키 공유, 키손상 위장 등의 안전성을 분석하였다.

작은 UHF RFID를 이용한 열쇠관리용 철재캐비닛 시스템과 인식률에 관한 연구 (Study of Reading Rate & Small UHF RFID Tags in The Key Management System in a Metallic Cabinet)

  • 정유정
    • 한국통신학회논문지
    • /
    • 제35권2B호
    • /
    • pp.263-268
    • /
    • 2010
  • 본 논문에서는 작은 폐쇄된 철재 캐비닛 안에 설치된 작은 UHF RFID 태그를 사용하여 열쇠관리 시스템을 개발하였다. 보안상 열쇠를 안전한 곳에 보관하기 위해서 잠글 수 있는 철재 캐비닛을 사용하였고, 열쇠의 유무를 실시간으로 파악하기 위해서 RFID 리더기와 안테나 그리고 설계된 태그가 사용되었다. 철재 캐비닛에는 6개의 랙에 360개의 태그 안테나가 있다. 각 1개의 랙에는 60개의 태그안테나와 열쇠, 열쇠고리가 보관되어 관리된다. 태그 안테나용 RFID 칩은 Gen2를 사용하였고, 시스템 안에 응용 프로그램은 태그의 정보 ID와 수신 안테나 정보를 TCP/IP 프로토콜을 통하여 호스트 컴퓨터에게 전달하여 호스트 컴퓨터에 데이터베이스와 연동하는 프로그램이다. 또한 360개의 태그를 읽기를 위한 여러 실험과 비교 결과와 최적의 안테나의 위치에 의한 인식률과 리더기 Bios에 따른 인식률도 비교 하였다.

Exploring Factors and Elements of Coordination between Key Account Management Units and Non-key Account Management Units: Case Study in an IT-related Machinery and System Vendor

  • Tonai, Shoko
    • Asia Marketing Journal
    • /
    • 제18권1호
    • /
    • pp.1-22
    • /
    • 2016
  • Studies in key account management (KAM) have identified the importance of cross-functional coordination in firms to effectively implement KAM. However, these studies have ignored how companies integrate KAM and other customer management (non-KAM). This paper explores coordination design between KAM units and non-KAM units by analyzing a case study through three dimensions: front-end coordination, back-end-coordination, and organizational translation at the beginning of research. The case study shows that non-KAM conditions can require a modification of the coordination design. This research performs an in-depth analysis of changes in the implementation of sales reforms for an IT-related machinery and system vendor in Japan. Data sources include interviews with KAM units and non-KAM sales units and an analysis of secondary data. This paper suggests that studying the coordination between KAM units and non-KAM units will further our understanding of internal coordination in KAM research.

건설공사 공종별 사고유형 및 사고객체 교차분석을 통한 중점안전관리항목 도출 (Derivation of Key Safety Management Factors by Construction Process through Cross-Tabulation Analysis between Accident Types and Objects)

  • 유나영;김하림;이찬우;조훈희
    • 한국건축시공학회:학술대회논문집
    • /
    • 한국건축시공학회 2022년도 봄 학술논문 발표대회
    • /
    • pp.127-128
    • /
    • 2022
  • The construction industry has a higher disaster rate than other industries, so safety education and management are highly important. In order to reduce the construction accident rate, it is necessary to study the key safety management factors reflecting the characteristics of the construction industry, where there are differences in processes and manpower input for each process, and a small number of managers. Therefore, in this study, key safety management factors for each Process of construction were derived through cross-analysis between safety accident types and accident occurrence objects through disaster case data. The extracted key safety management factors are expected to provide useful information for safety education and supervision of construction sites.

  • PDF

웹사이트에 나타난 디지털 라이프의 특성 분석 (An analysis on the characteristics of digital life reflected in web sites)

  • 조명은;김현경;이현수
    • 한국주거학회논문집
    • /
    • 제12권2호
    • /
    • pp.181-190
    • /
    • 2001
  • The purpose of this study is to analysis web sites which relate to housing environment on Internet and to suggest guidelines which are needed in digital life. Data are in 53 web sites searched by housing environmental word such as people, living, town and so on. The web sites are analyzed by key words. The results of this study were as follow: The web sites are divided into e-housing community, e-housing management, e-housing workplace and e-housing design. These are the digital life of new type. E-housing community sitess key words are 3D virtual world, chatting, information, service, community etc. E-housing community is related to making new wired community cross time and space. E-housing management sitess key words are guard management, apartment management, building management etc. E-housing management sites provide the useful information of housing management. E-housing workplace sitess key words are virtual office. conference etc. E-housing workplace sites enable us to work in cyberspace. E-housing design sitess key words are design, interior, furniture etc. E-housing design sites provide marketing, consulting and designing in relation to the house. The web life style on cyberspace is common and makes many changes happen in house life and environment.

  • PDF

A Forward & Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA

  • Park, Dong-Gook
    • Journal of information and communication convergence engineering
    • /
    • 제7권2호
    • /
    • pp.98-106
    • /
    • 2009
  • Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently been added to the already wide collection of wireless sensor networks applications. The PCS/SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in the environment, however, are still open to devastating attacks such as node capture, which makes designing a secure key management challenging. In this paper, a key management scheme is proposed to defeat node capture attack by offering both forward and backward secrecies. Our scheme overcomes the pitfalls which Nilsson et al.'s scheme suffers from, and is not more expensive than their scheme.