• Title/Summary/Keyword: key manager

Search Result 178, Processing Time 0.022 seconds

ETSI SMG Development of Standards for the UMIT

  • Samukic, Antun
    • Information and Communications Magazine
    • /
    • v.14 no.11
    • /
    • pp.22-28
    • /
    • 1997
  • ETSI SMG plays a key role at the development of standards for the UMTS Universal Mobile Telecommunications System, a set of standards aimed at the global market. It will be a real Third Generation Global System for Mobile CommunlcaUons adding new features and Introducing relevant technological InnovaUons while evolving from both GSM and ISDN networks. UMTS Is based on the carefully selected market requirements and belongs to the IMT-2000 family. UMTS standardlsaUon Is a market driven process being developed In a close co-operatlon with the UMTS Forum and GSM MoU.

  • PDF

A Case Study for Safety Analysis (안전성 분석에 대한 사례 연구)

  • Chang, Kwang-Chi;Lee, Key-Seo
    • Journal of the Korean Society for Railway
    • /
    • v.7 no.3
    • /
    • pp.251-258
    • /
    • 2004
  • A systematic methodology to determine safety requirements for railway signalling system and safety requirement allocation into system are presented. THR concept is used for as an interface between Risk Analysis to be performed by railway operator and System Design Analysis by the supplier. This approach is based on Signalling Safety Standard EN50129 by CENELEC.

Practical Improvement of An Efficient Public-Key framework and Its Application (효율적인 공개키 프레임워크에 대한 실용적 개선과 응용)

  • Yang Jong-Phil;Shin Weon;Rhee Kyung-Hyune
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.4C
    • /
    • pp.472-481
    • /
    • 2006
  • J. Zhou et al. proposed a new public-key framewort in which the maximum lifetime of a certificate is divided into short periods and the certificate could be expired at the end of any period under the control of the certificate owner(or his manager in a corporate environment). However, J. Zhou et al.'s public-key framework is not suitable on implementation in real world. Therefore, we review some security Parameters to change them into more suitable ones for implementation and remove an unnecessary trust party of J. Zhou et al.'s public-key framework. Then, we propose an improved scheme for realistic solution. Moreover, we present a practical application based on the improved framework.

Simulation Based Method for Mid-and-Long Term Technological Forecasting (중장기 기술예측을 위한 시뮬레이션 기반 방법론)

  • Yu, Sung-Yeol
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.1
    • /
    • pp.372-380
    • /
    • 2010
  • In this study, we consider a mid-and-long term technological forecasting method based on simulation technique. We, first, gather information about a point of appearance time of new technologies which will be developed in the future and influence relationship among those technologies by Delphi survey. And then we propose a simulation-based heuristic approach searching for the key technology among new technologies which will be developed to attain a normative objective using the Delphi data. We also provide the range of occurrence time for individual technology and define key technologies in this study in contrast that a expert's estimate to occurrence time is only one point in traditional Delphi survey. The information for key technologies which are detected by this procedure gives priorities of R&D planning and aids the R&D planner or project manager in resource allocation.

Secure Data Management based on Proxy Re-Encryption in Mobile Cloud Environment (모바일 클라우드 환경에서 안전한 프록시 재암호화 기반의 데이터 관리 방식)

  • Song, You-Jin;Do, Jeong-Min
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.4B
    • /
    • pp.288-299
    • /
    • 2012
  • To ensure data confidentiality and fine-grained access control in business environment, system model using KP-ABE(Key Policy-Attribute Based Encryption) and PRE(Proxy Re-Encryption) has been proposed recently. However, in previous study, data confidentiality has been effected by decryption right concentrated on cloud server. Also, Yu's work does not consider a access privilege management, so existing work become dangerous to collusion attack between malicious user and cloud server. To resolve this problem, we propose secure system model against collusion attack through dividing data file into header which is sent to privilege manager group and body which is sent to cloud server and prevent modification attack for proxy re-encryption key using d Secret Sharing, We construct protocol model in medical environment.

A Study on the Difference between Groups in Perception of the Level and Importance of the Key Competencies of Technical High School Students (공업계 고등학교 학생들의 직업기초능력 수준과 중요도에 대한 집단 간 인식차이)

  • An, GwangSik
    • 대한공업교육학회지
    • /
    • v.31 no.1
    • /
    • pp.1-22
    • /
    • 2006
  • The purpose of this study is to measure the level and importance of the key competencies of technical high school students in order to improve their key competencies. The subject was 12 teachers in charge of school-to-work education in a technical high school and 7 managers responsible for an apprentice in a company. The results of this study showed there was a difference in perception of the key competencies between teachers in charge of school-to-work education and managers responsible for that part in a company. Especially, both of two groups, teacher group and manager group, estimated apprentice's comprehension ability of the English documents low and also regarded its importance as low. So the comprehension ability of the English documents needs to be reconsidered as the key competencies. It appeared that the reading comprehension ability of Chinese characters and the ability of listening courteously needed to be added to the existing key competencies. To cultivate them, the key competencies should be examined accurately which technical high school students have to master. And on the basis of this, an instrument to measure the key competencies needs to be developed.

A Study on the Evaluation Model of Strategic Information Systems Planning (정보시스템 전략계획 평가모형에 관한 연구)

  • 김동태;문용은;이재범
    • Korean Management Science Review
    • /
    • v.15 no.1
    • /
    • pp.149-178
    • /
    • 1998
  • Strategic Information Systems Planning(SISP) has gained considerable interest among researchers and practitioners in recent years Which has instigated various related research. Neverthless, only 24 percent of the projects recommended as a result of SISP are ultimately performed. This statistics raise the questions for the need of SISP. This study provides the framework that may enable SISP to be more effectively utilized by studying factors for consideration from the review of pertinent literature. These factors will then be validated by case studies of domestic companies and by simultaneously inducing key characteristics and solutions of SISP. The result of the study indicate some inconsistency between literal factors and the case study. The factors added through case study were considered to be actual factors of SISP. This study emphasized the role of the senior manager, the quality of the implementation of the state plan, change management and the capability of the planning team. As a key characteristics of domestic companies considered was the general lack of ability to collect and analyze data. In addition, the domestic companies have little consideration of the organizational contingency factors.

  • PDF

정보시스템 전략계획 평가에 관한 연구

  • 김동태;문용은;이재범
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1996.10a
    • /
    • pp.245-249
    • /
    • 1996
  • Strategic Information Systems Planning(SISP) has gained considerable interest among researchers and practitioners in recent years which has instigated various related research. Nevertheless, only 24 percent of the projects recommended as a result of SISP are ultimately performed. This statistics raise the questions for the need of SISP. This study provides the framework that may enable SISP to be more effectively utilized by studying factors for consideration from the review of pertinent literature. These factors will then be validated by case studies of domestic companies and by simultaneously inducing key characteristics and solutions of SISP. The result of the study indicates some inconsistency between literal factors and the case study. The factors added through case study were considered to be actual factors of SISP. This study emphasized the role of the senior manager, the quality of the implementation of the state plan and the capability of the planning team. As key characteristics of domestic companies considered were the general lack of ability to collect and analyze data. In addition, the domestic companies have little consideration of the organizational contingency factors.

  • PDF

Towards a "better" University: the Use of the EFQM Model in a UK Higher Education Institution

  • Blackmore, Jacqueline;Douglas, Alex
    • International Journal of Quality Innovation
    • /
    • v.4 no.2
    • /
    • pp.1-15
    • /
    • 2003
  • This paper examines the use of the EFQM Model in H.E. Institutions in the UK and offers a case study of how one University used the Excellence Model as a means to change the way it operated. It identifies and discusses the critical success factors for a university utilizing the Model, in particular Leadership (criteria 1), People Management, particularly with regard to performance evaluation (criteria 3), having key processes in place (criteria 5) and the identification of the correct key performance results for its various stakeholders (criteria 9).

Working Design Management of the Design Build Projects Using CBR (CBR(Case-Based Reasoning)을 활용한 턴키 공사 실시설계관리 방안)

  • Park Se-Kun;Kim Young-Jae;Kim Kyung-Rai;Shin Dong-Woo
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • autumn
    • /
    • pp.432-437
    • /
    • 2002
  • As the working design process of Turn-Key projects is a basic process for the final contract, this process has lots of business decision to be made. Because such results of business decision can be the basis on contract documents, it is the step which needs a through management for Turn-key project. But in case of domestic construction companies, because those are not organized process of working design process, project manager has had lots of trouble at each process to make the business decision. As a means of settling the problems, this research is initiated. First, working decision management process is identified and generalized by interviews with project managers. Second, cases that actually happened in the project are investigated and categorized. Third, response plan to solve the problems and check lists to prevent the problems are suggested. Finally, the process, cases, response plan, and check list are integrated using CBR for future reuse.

  • PDF