• 제목/요약/키워드: mutual networking

검색결과 43건 처리시간 0.028초

이용자의 도시적 공간체험을 유도하는 도서관 공간 특성 연구 (A Study on the Characteristics of the Library Space for Introducing Urban Experiences)

  • 문은미
    • 한국실내디자인학회논문집
    • /
    • 제23권4호
    • /
    • pp.240-247
    • /
    • 2014
  • This study is aimed to examine the characteristics of library space, in which user experiences and social networking are central in its design. Today, a library is a place to provide diverse accesses and experiences to information networks, where various individuals and user groups come and share mutual understanding and experiences. Library users developed social ties and a sense of community through library experiences. As a multipurpose space of a community, a library has the characteristics of urban public space like sidewalks and plazas. The eight case studies of libraries are analyzed from the viewpoint of each factor of library experience, including landscape, sidewalk, and plaza experience. The study drew its conclusions as follows. First, a library is a regional landmark for the users. Thus, it tends to be designed to allow transparency on its surface which introduces inner and outer landscape into the inside of the building. Second, the users experience a library similarly as they experience an urban street where they interface, browse, and interact with people and information. As they interact and share experiences, they develop solidarity and social ties among them. A library is designed to preserve continuity to adjacent streets, which increases accessibility to the building and hosts street activities into the building. Third, a library today is designed to be a flexible open space with information networking as well as community networking which allows library users diverse activities within it. For example, a multipurpose grand stairs in the middle of the main circulation of a building allows the users diverse activities. A large open stack with reading areas gives the users the feeling of an urban plaza where they can move vertically and horizontally. In conclusion, all findings of this study imply a user-oriented design for a library building.

한중 사이버 문화 협력과 비즈니스 발전방안 (Suggestions for Business Cooperation Utilizing the Cyber Culture Trends between Korea and China)

  • 박문서
    • 통상정보연구
    • /
    • 제7권1호
    • /
    • pp.261-282
    • /
    • 2005
  • In the 21st century, both globalization and e-Transformation trends of business in China have been in progress simultaneously and very rapidly. Due to those phenomena, there is consequently big change not only in the field of political-economy but also in the cultural trend of the world. But, despite of the importance of mutual cooperation between Korea and China, the research about Chinese cyber culture is neglected relatively. The purpose of this study is to review the cyber cultural aspect of business between two countries, and to devise proper measures for cultural cooperation not only reengineering the role of two countries but developing mutual benefit in East Asia in the era of global competition. The methodology used in this study is basically depending on theoretical study. Major findings are as follows: China has some cyber-cultural characteristics like very big size of netizen, heaven on earth of counterfeit, deepening in digital divide, etc. And Chinese traditional off-line culture has changed as the cyber culture spreaded over in cyberspace recently. But, on the other hand, cultural trends are changed to homogeneity both in nation-side which is between Korea and China and in space-side which is between online and offline culture. It is recommended that Korea and China have to endeavor to understand mutual culture, and to utilize the cyber culture in the respect of business cooperation. Consequently, two countries should effort to prepare exchange program for both netizen group, to design culture-networking system, to strengthen cyber-cultural marketing, and to make good use of both Korean Cultural Wave(said Han-Ryu) and Chinese Cultural Wave(said Hwa-Ryu).

  • PDF

혁신클러스터의 효율적인 네트워크 운영에 관한 연구: 안양벤처밸리에서 지식산업진흥원의 이노카페운영을 중심으로 (The Study on Efficient Information Network in Regional innovation Cluster - The Case of Venture Valley in Anyang -)

  • 홍성만;한경일
    • 디지털융복합연구
    • /
    • 제6권3호
    • /
    • pp.35-43
    • /
    • 2008
  • This research was to analyze information network which contributed Anyang Venture Valley's development. And mutual communication between regional innovated companies was the essential factor of this growth. Anyang city with its Knowledge Industry Promotion Agency, KIPA, has first set up communication network, facility and other structures to create basis of communication. For that, they were able to operate various networking and promotion of communication which led to the enforcement of regional innovation in venture businesses. During its innovation, KIPA played a key role as a link between regional Innovated companies, which enabled active interactions between them. Government can verify significance of establishing network base with mediation function for lively communication for promoting innovation capability through Anyang Venture Valley's case.

  • PDF

신뢰성을 보장하는 IEEE802.11 기반의 그룹핸드오버 기법 (Reliable Group Handover Scheme based on IEEE802.11)

  • 김기영;고훈
    • 디지털산업정보학회논문지
    • /
    • 제5권1호
    • /
    • pp.33-41
    • /
    • 2009
  • Network industry is complex combined with various fields of industry, such as communication, broadcast, construction, and home appliances. Moreover, it's fairly lucrative since the growth industry makes lots of added values, interacting with the others.The network industry, usually called 'Ubiquitous', connects some home appliances and makes an integrated system that you can use them with whenever and wherever. A demand for network security, however, has skyrocketed due to the relatively low safety. It's been expected that the market of home security is going to be grown up nearly 30 percent every year. Recently, analog surveilance cameras have been replaced with digital ones, and they will be providing stronger security services taking advantage of mutual interaction with related industies. In this paper, a mobile monitoring system for home security is proposed, which makes it possible to supervise all home appliances wherever you're, using the conventional wired/wireless network infra.

홈 시큐리티를 위한 모바일 모니터링 시스템 개발 (Development of Mobile Monitoring System for Home Security)

  • 왕종수;서두옥
    • 디지털산업정보학회논문지
    • /
    • 제5권1호
    • /
    • pp.43-49
    • /
    • 2009
  • Network industry is complex combined with various fields of industry, such as communication, broadcast, construction, and home appliances. Moreover, it's fairly lucrative since the growth industry makes lots of added values, interacting with the others. The network industry, usually called 'Ubiquitous', connects some home appliances and makes an integrated system that you can use them with whenever and wherever. A demand for network security, however, has skyrocketed due to the relatively low safety. It's been expected that the market of home security is going to be grown up nearly 30 percent every year. Recently, analog surveilance cameras have been replaced with digital ones, and they will be providing stronger security services taking advantage of mutual interaction with related industies. In this paper, a mobile monitoring system for home security is proposed, which makes it possible to supervise all home appliances wherever you're, using the conventional wired/wireless network infra.

재난관리 영역에서 안전네트워크 체계화 모색 (Seeking Safety Network Organized in the Area of Disaster Management)

  • 이정일
    • 대한안전경영과학회지
    • /
    • 제13권2호
    • /
    • pp.43-49
    • /
    • 2011
  • New governance in the area of disaster management(New Governance) of the Safety Building in the form of public-private network as required in this era, SWOT can provide a strategic way to build public-private partnership recognized the necessity for a more efficient way. Between government agencies, private organizations and government and private organizations for the network between the systematic approach based on mutual trust, and participation by the activation of the meaning of seeing places studied. Partnership for Disaster Management as a result of the settlement than if the existing disaster management system for disaster response system more effective and efficient functioning in reducing human and material damage is expected to contribute are getting out.

An Approach Towards Secure Matchmaking Using Mobile Social Network

  • Abbas, Fizza;Hussain, Rasheed;Son, Junggab;Oh, Heekuck
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2013년도 추계학술발표대회
    • /
    • pp.698-701
    • /
    • 2013
  • Mobile social networking applications are getting increasingly popular among today's mobile applications. Mobile users find their old or new friends anywhere or anytime through mobile social network (MSN) services. MSN uses matchmaking mechanisms to discover mutual interests among different people. To discover friends in MSN, a user must share his/her private information which can be a risk for his/her personal privacy as this information can be learned by a malicious or semi honest user. In this paper we give a brief survey on MSN that includes MSN categories, components, architecture and applications. In the rest of the paper we discuss the matchmaking protocols. Finally we give some suggestions to improve the previous protocols.

A novel ID-based multi-domain handover protocol for mesh points in WMNs

  • Zhang, Xue;Li, Guangsong;Han, Wenbao;Ji, Huifang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권7호
    • /
    • pp.2512-2529
    • /
    • 2015
  • Wireless mesh networks (WMNs) provide an efficient and flexible method to the field of wireless networking, but also bring many security issues. A mesh point may lose all of its available links during its movement. Thus, the mesh point needs to handover to a new mesh point in order to obtain access to the network again. For multi-domain WMNs, we proposed a new ID-based signcryption scheme and accordingly present a novel ID-based handover protocol for mesh points. The mutual authentication and key establishment of two mesh points which belong to different trust domains can be achieved by using a single one-round message exchange during the authentication phase. The authentication server is not involved in our handover authentication protocol so that mutual authentication can be completed directly by the mesh points. Meanwhile, the data transmitted between the two mesh points can be carried by the authentication messages. Moreover, there are no restrictions on the PKG system parameters in our proposed multi-domain ID-based signcryption scheme so our handover scheme can be easily applied to real WMNs circumstances. Security of the signcryption scheme is proved in the random oracle model. It shows that our protocol satisfies the basic security requirements and is resistant to existing attacks based on the security of the signcryption. The analysis of the performance demonstrates that the protocol is efficient and suitable for the multi-domain WMNs environment.

IPTV 서비스에서 사용자의 수신자격을 효율적으로 판별할 수 있는 해쉬 함수 기반의 상호 인증 프로토콜 (A Mutual Authentication Protocol based on Hash Function for Efficient Verification of User Entitlement in IPTV Service)

  • 정윤수;김용태;정윤성;박길철;이상호
    • 한국정보과학회논문지:정보통신
    • /
    • 제37권3호
    • /
    • pp.187-197
    • /
    • 2010
  • 최근 방송과 통신의 융합 흐름은 방송 영역에서 제공되던 멀티미디어 콘텐츠를 초고속 인테넷, 케이블 TV망 그리고 위성 망 등을 통해 실시간으로 전송하는 IPTV 서비스로 변화되고 있다. 그러나 디지털 방송 서비스가 다양한 매체로 확산되면서 서비스 제공자가 사용자들에게 제공하는 IPTV 서비스의 콘텐츠 보안은 기존 방송 시스템에서 제공하는 CAS(Conditional Access System)만을 이용해서는 완벽하게 지원할 수 없다. 이 논문에서는 IPTV 서비스의 콘텐츠 보안 문제를 해결하기 위해 IPTV 시스템을 구성하는 구성 요소 중 수신기(Set-Top BoX, STB)와 스마트카드 사이의 사용자 수신자격을 효율적으로 판별할 수 있는 상호인증 프로토콜을 제안한다. 제안된 프로토콜은 기존 프로토콜에 비해 사용자가 지불하는 채널에 대한 수신자격을 수신기가 올바르게 전송할 수 있도록 서명기반의 해쉬함수를 사용한다. 또한, 제안 프로토콜은 상호인증 과정을 통해 수신기와 스마트카드 사이에서 생성된 세션키를 이용하여 EMM를 암호화한 후 제3자가 서비스를 불법적으로 이용할 수 없도록 한다.

이동 Ad Hoc 망을 위한 다중 계층 클러스터링 기반의 인증 프로토콜 (An Authentication Protocol-based Multi-Layer Clustering for Mobile Ad Hoc Networks)

  • 이근호;한상범;서혜숙;이상근;황종선
    • 한국정보과학회논문지:정보통신
    • /
    • 제33권4호
    • /
    • pp.310-323
    • /
    • 2006
  • 본 논문에서는 ad hoc 망에서의 다중 계층 기법 기반의 안전한 클러스터 라우팅 프로토콜을 표현하였다. 클러스터기반 라우팅인 ARCH와 DMAC의 수정을 통해 CH와 CCH의 선택 알고리즘을 이용하여, ad hoc 라우팅 프로토콜에서의 보안 위협 요소에 대한 효율적인 프로토콜인 AMCAN(Ad hoc 망을 위한 다중 계층 클러스터링 기반의 인증 )을 제안하였다. 본 프로토콜은 ad hoc 망에서 임계치 (threshold) 인증 기법을 통한 Shadow Key를 이용하여 확장성을 제공하였다. 제안된 프로토콜은 다른 클러스터 노드들간의 상호 신뢰 관계를 갖는 종단간 인증 프로토콜로 구성하였다. 제안된 기법은 규모가 넓은 ad hoc 망에서 임계치 인증키 구성의 장점을 갖는다. 본 논문의 실험결과를 통해 다중 계층 라우팅 기법에서 임계치 키 구성을 이용한 임시 세션키의 안전한 분산을 통해 노드 ID 위조를 방지하고, 상호 종단간 인증과 Reply Attack을 검출하여 안전한 채널을 구축하는 것을 확인하였다.