• Title/Summary/Keyword: key manager

Search Result 178, Processing Time 0.023 seconds

En-route Ground Speed Prediction and Posterior Inference Using Generative Model (생성 모형을 사용한 순항 항공기 향후 속도 예측 및 추론)

  • Paek, Hyunjin;Lee, Keumjin
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.27 no.4
    • /
    • pp.27-36
    • /
    • 2019
  • An accurate trajectory prediction is a key to the safe and efficient operations of aircraft. One way to improve trajectory prediction accuracy is to develop a model for aircraft ground speed prediction. This paper proposes a generative model for posterior aircraft ground speed prediction. The proposed method fits the Gaussian Mixture Model(GMM) to historical data of aircraft speed, and then the model is used to generates probabilistic speed profile of the aircraft. The performances of the proposed method are demonstrated with real traffic data in Incheon Flight Information Region(FIR).

Design of a Security Manager in Global Peer-to-Peer Engine Based on XML (XML 기반 글로벌 Peer-to-Peer 엔진의 보안 관리자 설계)

  • 이일수;이재욱;권태숙;이승룡
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.673-675
    • /
    • 2001
  • 본 논문에서는 PC, 웹, 모바일 환경을 지원하는 글로벌 Peer-to-Peer 엔진에서 인증, 기밀성 및 무결성을 제공하기 위해 암호화/복호화에 필요한 공개키 쌍의 생성/분배/관리 기능을 지원하는 보안 관리자의 설계에 대하여 기술한다. 기존의 Peer-to-Peer 시스템이 단지 인증기관이 발행한 인증서에 의한 공개키의 분배를 지원하는데 비해 제안된 보안 관리자는 인증서뿐만 아니라 인증서가 아닌 다른 전송매체에 의해 분배된 공개키 또한 저장/관리할 수 있는 기능을 제공한다. 이것은 기존의 시스템이 인증서를 발급 받기 위해서 복잡하고 번거로운 신원 확인과 사용료를 부담하는 것에 비해 간편하게 키를 공유하여 보안을 적용시킬 수 있다. 이를 위해 본 논문에서는 키링(Key Rings)이라는 개념을 도입하는데 이는 각 피어에 해당하는 다수의 공개키/개인키를 저장 및 관리란 수 있는 한 쌍의 자료구조로써 제공된다. 또한 본 논문은 이렇게 저장/관리되는 다수의 공개키를 선택하여 사용하기 위한 알고리즘을 제시한다. 제안된 키 링을 사용하는 방식은 인증서를 사용하는 클라이언트/서버 형태의 Peer-to-Peer 보다 순수한 Peer-to-Peer 모델에 근접한 형태라고 볼 수 있다.

  • PDF

Factors Influencing of Job Stress Response to Job Satisfaction (직무스트레스에 따른 직무만족 요인 조사연구)

  • 서장훈;유지철
    • Journal of the Korea Safety Management & Science
    • /
    • v.5 no.4
    • /
    • pp.195-208
    • /
    • 2003
  • All managers should consider both of job performance and job satisfaction as influential key results to be achieved by people at work. One without the other is simply insufficient to meet the high standards of today's workplace. Some workers achieve a sense of personal satisfaction from their jobs while others do not. the others achieve high levels of task performance while others do not. The test of a manager's skill in building value added jobs is to discover what work means to other people, and then to create work environments that help them achieve high levels of both performance and satisfaction. this study set out to investigate the job satisfaction of the employees at work station along with the needs resulting from exploding population of salary citizens. This paper aims to survey and analyze the job satisfaction of the workers and a potent influence factors of Job stress for organization management.

Malicious Trust Managers Identification (MTMI) in Peer to Peer Networks

  • Alanazi, Adwan Alownie
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.91-98
    • /
    • 2021
  • Peer to Peer Networks play an increasing role in today's networks, also it's expected that this type of communication networks evolves more in the future. Since the number of users that is involved in Peer to Peer Networks is huge and will be increased more in the future, security issues will appear and increase as well. Thus, providing a sustainable solution is needed to ensure the security of Peer to Peer Networks. This paper is presenting a new protocol called Malicious Trust Managers Identification (MTMI). This protocol is used to ensure anonymity of trust manager, that computes and stores the trust value for another peer. The proposed protocol builds a secure connection between trust managers by using public key infrastructure. As well as experimental testing has been conducted to validate the proposed protocol.

A Study on the list of valid PKI certificate verification system for intranet environments (인트라넷 환경을 위한 PKI 인증서 유효목록 검증 시스템에 관한 연구)

  • Kim, Jong-Kwon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.743-745
    • /
    • 2010
  • 기 구축된 Public Key Infrastructure(이하 PKI) 에서 발급된 디지털인증서를 외부 네트워크와 단절된 인트라넷 환경에서 사용하기 외부 네트워크에 지정된 인증서 검증 서버에 접속할 수가 없기 때문에 인증서 유효성 검증의 문제를 발생시켜 사용이 불가능하다. 이러한 문제점을 해결하기 위해 인트라넷 환경을 위한 인증서유효목록 검증 시스템을 제안한다. 인증서유효목록 검증 시스템은 기존의 PKI 에서 인증서 검증을 위해서 사용하는 Certificate Revocation List (이하 CRL)를 대체하는 Certificate Valid List (이하 CVL)를 사용하여 외부 네트워크와 접속이 단절된 인트라넷 환경에서도 기 구축된 PKI 에서 발급된 디지털 인증서의 유효성을 검증할 수 있다. 인증서유효목록 검증 시스템은 CVL 의 생성을 위한 Certificate Valid List Manager (이하 CVLM)와 주기적인 CVL 발급 및 게시를 위한 Certificate Valid List Issuer (이하 CVLI), 응용서비스에서 사용하는 User Agent (이하 UA) 를 포함한다.

Leadership Comparison Analysis of Hotel F&B Manager (호텔 식음료 지배인의 리더십 비교 분석)

  • Shim, Hong-Bo
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.12
    • /
    • pp.375-385
    • /
    • 2008
  • As hotel industry lately recognize that food and drink industry produces more profits than hotel rooms, multi-various and scientific management policies are required along with the management of profitability. Particularly, as hotel services have become more alike due to the development of technology and sharing information, opportunities for differentiation have decreased. Human resource is a significant key for the hotel business as it could lead to a success or failure. It would be overwhelming for employees if they carry all the burdens on their shoulders to impress the customers and improve the service culture in this fast-changing society with different colors of human desire. Therefore, it is essential to focus on developing strategies of efficient organizational as well as human resource management, and the managerial leadership with capability of understanding the organizational structure should play the leading role, considering the specific characteristics of hotel business. The purposes of the study are transformational leadership and transactional leadership comparison analysis of hotel F&B to management strategy.

A Study on Factors Determining the Level of Smartwork : Focusing on the Role of Middle Level Manager (스마트워크 수준 결정요인에 관한 연구 : 중간관리자 역할을 중심으로)

  • Cho, Young-Ku;Hyun, Keum-Yi;Lee, Han-Chul;Park, Seong-Taek
    • Journal of Digital Convergence
    • /
    • v.10 no.8
    • /
    • pp.63-71
    • /
    • 2012
  • Smart is becoming a social fever since Apple had invented iPhone. It looks old fashioned, if the word Smart is missed in TV, phone even white electronic goods. Korean's major firms made a slogan Smart Work as an important business strategy and tried to implement some activities. These Smart trends influenced the way people's working and organization. In this research, we explore the key factors related to smart work and empirically test the significance of antecedent variables such as Dynamics, Collaborativeness, Connectivity in determining the smartwork level. The statistical result, based upon survey responses, shows that organizational dynamics, organizational collaborativeness and process collaborativeness are the most salient factors for smarkwork level. As a conclusion, the academic and practical implications of these findings are also discussed.

Management, Orchestration and Security in Network Function Virtualization (네트워크 기능 가상화 관리 및 오케스트레이션 기능과 보안)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.16 no.2
    • /
    • pp.19-23
    • /
    • 2016
  • The design, management, and operation of network infrastructure have evolved during the last few years, leveraging on innovative technologies and architectures. With such a huge trend, due to the flexibility and significant economic potential of these technologies, software defined networking (SDN) and network functions virtualization (NFV) are emerging as the most critical key enablers. SDN/NFV enhancing the infrastructure agility, thus network operators and service providers are able to program their own network functions (e.g., gateways, routers, load balancers) on vendor independent hardware substrate. They facilitating the design, delivery and operation of network services in a dynamic and scalable manner. In NFV, the management and orchestration (MANO) orchestrates other specific managers such as the virtual infrastructure manager (VIM) and the VNF Manager (VNFM). In this paper, we examine the contents of these NFV MANO systematically and proposes a security system in a virtualized environment.

Improvement of Construction Management Process for the Site Manager in Small Scale Building Construction Project (소규모 건설프로젝트에서 현장관리업무 개선방안)

  • Lee, Da-Un;Yun, Seok-Heon
    • Journal of the Korea Institute of Building Construction
    • /
    • v.18 no.1
    • /
    • pp.81-87
    • /
    • 2018
  • Since February 2017, site managers in small architectural projects are required by the revised building act. In order to address issues for site managers and to improve project efficiency, system improving methods are surveyed and proposed in this study. The key inspection items in the existing surveillance guidance manual were investigated, and the checklist for site managers for a small to medium sized construction site was analyzed. This study also tries to propose using web-based site management systems for improvement of the utilization of checklists. It is expected that these on-site management systems, along with BIM technology, will be able to monitor the small size building construction project in real time and effectively monitor the various problems occurring on-site.

Efficient and Secure Member Deletion in Group Signature Scheme (그룹 서명 기법에서의 효율적이고 안전한 구성원 탈퇴 방법)

  • 김현정;임종인;이동훈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.6
    • /
    • pp.41-51
    • /
    • 2001
  • Group signature schemes allow a group member to sign messages anonymously on behalf of the group. In case of dispute, only a designated group manager can reveal the identity of the member. During last decade, group signature schemes have been intensively investigated in the literature and applied to various applications. However, there has been no scheme properly handling the situation that a group member wants to leave a group or is excluded by a group manager. As noted in[3], the complexity of member deletion stands in the way of real world applications of group signatures and the member deletion problem has been a pressing open problem. In this paper we propose an efficient group signature scheme that allows member deletion. The length of the group public key and the size of signatures all independent of the size of the group and the security of the scheme relies on the RSA assumption. In addition, the method of tracing all signatures of a specific member is introduced.