• Title/Summary/Keyword: on-line service provider

Search Result 40, Processing Time 0.031 seconds

Information Security Management System on Cloud Computing Service (클라우드 컴퓨팅 서비스에 관한 정보보호관리체계)

  • Shin, Kyoung-A;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.155-167
    • /
    • 2012
  • Cloud computing service is a next generation IT service which has pay-per-use billing model and supports elastically provisioning IT infra according to user demand. However it has many potential threats originating from outsourcing/supporting service structure that customers 'outsource' their own data and provider 'supports' infra, platform, application services, the complexity of applied technology, resource sharing and compliance with a law, etc. In activation of Cloud service, we need objective assessment standard to ensure safety and reliability which is one of the biggest obstacles to adopt cloud service. So far information security management system has been used as a security standard for a security management and IT operation within an organization. As for Cloud computing service it needs new security management and assessment different from those of the existing in-house IT environment. In this paper, to make a Information Security Management System considering cloud characteristics key components from threat management system are drawn and all control domain of existing information security management system as a control components are included. Especially we designed service security management to support service usage in an on-line self service environment and service contract and business status.

A Study on the Development of CITIS(Contractor Integrated Technical Information Services) (CITIS(Contractor Integrated Technical Information Services)구현에 관한 연구)

  • Jeong, Seok-Chan;Woo, Hoon-Shik;Cho, Chang-Hyuk;Paik, Jong-Myung;Ju, Kyung-Joon
    • IE interfaces
    • /
    • v.10 no.3
    • /
    • pp.1-10
    • /
    • 1997
  • CALS, being widely adopted by industry, is a strategy to share integrated digital product data through a set of standards to achieve effieciencies and competition in business. For CALS implemetation, creating a shared information system is necessary and CITIS is proposed for that. CITIS shall provide on-line access and automated exchange of all the technical information between contractor and service provider, and the function of CITIS is difined in MIL-STD-974. In this paper, regarding CITIS as a infrastructure of information for CALS, we proposed CITIS server system which comprise global data sharing software, global data management system, workflow manager, and configuration management maneger.

  • PDF

The Design of License Agent Rights Protection (디지털 저작권 보호를 위한 라이센스 에이전트의 설계)

  • 이광형;이근왕;김희숙
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.275-282
    • /
    • 2004
  • As the logistic environment of digital contents is rapidly changing, the protection of the digital rights for digital content has been recognized as one of critical issues. Digital Right Management(DRM) has taken much interest Internet Service Provider(ISP), authors and publishers of digital content as an interested approach to create a trusted environment for access and use of digital resources. This paper propose an interested digital rights protection scheme using license agent to address problems facing contemporary DRM approached : static digital rights management, and limited application to on-line environment. We introduce a dynamic mission control technology to realize dynamic digital rights management. And we incorporate license agent to on- and off-line monitoring and tracking. The proposed system prevent illegal access and use by using PBD security method real time action monitoring for user, data security for itself.

  • PDF

Music summarization using visual information of music and clustering method

  • Kim, Sang-Ho;Ji, Mi-Kyong;Kim, Hoi-Rin
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02a
    • /
    • pp.400-405
    • /
    • 2006
  • In this paper, we present effective methods for music summarization which summarize music automatically. It could be used for sample music of on-line digital music provider or some music retrieval technology. When summarizing music, we use different two methods according to music length. First method is for finding sabi or chorus part of music which can be regarded as the most important part of music and the second method is for extracting several parts which are in different structure or have different mood in the music. Our proposed music summarization system is better than conventional system when structure of target music is explicit. The proposed method could generate just one important segment of music or several segments which have different mood in the music. Thus, this scheme will be effective for summarizing music in several applications such as online music streaming service and sample music for Tcommerce.

  • PDF

A Credit Card based Secure Micro-Payment Protocol Design (신용카드기반의 안전한 소액 지불 프로토콜 설계)

  • 김석매;이현주;이충세
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.215-218
    • /
    • 2003
  • In this paper, we propose a protocol both allow a End-to-End security between user and service provider and independent in mobile Internet platform in AIP. In particular, our proposed protocol generates a session key using Weil pairing by ID-based public key system. We analysis a security and efficient of protocol when on-line certification authority participates in authentication process.

  • PDF

A Study on Stabilizing a Network Security Zone Based on the Application of Logical Area to Communication Bandwidth (통신 대역폭 논리영역 적용 기반의 네트워크 보안구간 안정화 연구)

  • Seo, Woo-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.5
    • /
    • pp.3462-3468
    • /
    • 2015
  • Regarding countless network disorders or invasions happening nowadays from 2014 until 2015, illegal access intended to attack through the communication line provided by ISP (Internet Service Provider) appears to be the source of the problem. As a defensive way to prevent such network-based attacks, not only stabilization structures for network communication but various policies as well as physical security devices and solutions corresponding to those have been realized and established. Therefore, now is the time to gain foundational research data to secure network security sections by producing logical area on communication bandwidth or such, suggest tasks to expand the communication line which is another research topic in the network security market, and recognize the fact that the active communication bandwidth linkage paradigm using network communication bandwidth is needed as one of the areas that can realize physical security. Additionally, it is necessary to limit the data in the forms of organizing visible security structures into a certain range of physical information by re-dividing communication capacity being currently provided by telecommunicators into subdivided organizational areas and applying the logical virtualization of communication capacity in each of the areas divided. By proposing a network security section based on a logical field application in place of the existing physical structure, basic data that designs a stable physical network communication structure will be provided.

A Policy Implementation Analysis on the Care Voucher for the Aged -Focusing on Choice and Competition- (노인돌보미바우처 정책집행분석 -선택과 경쟁은 실현되는가?-)

  • Yang, Nan-Joo
    • Korean Journal of Social Welfare
    • /
    • v.61 no.3
    • /
    • pp.77-101
    • /
    • 2009
  • As a case study in the field of policy implementation research, this study focuses on how the logic of consumer choice and provider competition operates on the front line of policy processing. To find the implementation process of the program, 39 interview data were analyzed, including voucher users, care workers, social workers in 4 agencies and local public officers in one of the district in Seoul, and relevant officials from the Ministry for Health, Welfare and Family affairs and the Center for Social Service Management. The main results are as follows: In the level of policy implementation, user choice and competition, which was the main logic behind the implementation of the voucher program, did not occur as expected by policy makers. Instead of user choosing his/her provider, it was found that the providers were choosing its users. Secondly, the case study found that providers have formed a caucus which allocated the local users equally amongst the providers. In this process, local public officers have supported the meeting by providing them with a list of users. Such results may be interpreted as a habitual execution from the tradition of supply-side subsidy, rather than the way of implementation in the market system. Thirdly, although voucher users could not choose their preferred agency in the first stage of service, some other choices exists so that users may choose their preferred care-giver and time for service. Finally, the change of agency and care-giver in the way of delivering services were observed.

  • PDF

Analysis on Static Characteristics for Greylist-based SPIT Level Decision of VoIP SPAM Calls (VoIP 스팸 Call의 Grey List 기반 SPIT 레벨 결정을 위한 정적 속성 분석 연구*)

  • Chang, Eun-Shil;Kim, Hyoug-Jong;Kang, Seung-Seok;Cho, Young-Duk;Kim, Myuhng-Joo
    • Convergence Security Journal
    • /
    • v.7 no.3
    • /
    • pp.109-120
    • /
    • 2007
  • VoIP service provides various functions that PSTN phone service hasn't been able to provide. Since it also has superiority in service charge, the number of user is increasing these days. When we think of the other side in cost aspect, the spam caller can also send his/her commercial message over phone line using more economic way. This paper presents the characteristics that should be considered to detect the spam call using greylisting method. We have explored static and dynamic characteristics in VoIP calls, and analyzed the relation among them. Especially, we have surveyed the authentication and charging method of Korean VoIP service provider. We have analyzed each charging method using our spam call simulation result, and derived the charging method that can be favored by spam caller. The contribution of the work is in analysis result of static aspect for SPIT Level calculation in greylisting method.

  • PDF

Research on data analysis method of KTX TORNAD network system (고속열차(KTX)의 TORNAD 네트워크시스템 데이터 분석방법 연구)

  • Kim, Hyeong-In;Jung, Sung-Youn;Kim, Hyun-Shik;Jung, Do-Won;Kim, Han-Dou
    • Proceedings of the KSR Conference
    • /
    • 2008.06a
    • /
    • pp.1032-1038
    • /
    • 2008
  • KTX train system is composed of TORNAD* network for transmitting information of train's internal equipments and OBCS which proceed information within train. OBCS of one trainset consisted of 28 equipments takes intelligent and dynamic composition according to equipment handling, train command and control flow. Each OBCS which is installed within trainset handle and supervise mutually action information about equipments, transmit it to driver to transmit information about train operation and preventive management. This mutual supervision and information transmission use KTX TORNAD* network system. TORNAD* network system is the one which is uniquely developped by GEC ALSTHOM, the KTX trainset manafacturing provider and this field is excluded from technical know-how transfer item. Through the research on analysis method of KTX TORNAD* system data structure which is operating on Seoul-Pusan Line, I hope that this thesis can contribute to train network system's standardization after applying it to improvement of train network system maintenance, enhancing quality of train service and applying it to future Korean rolling stock network system development.

  • PDF

Study of Coverage Implementation Using Lenticular Sticker (렌티큘러 스티커를 이용한 커버리지 구현 연구)

  • Jeong, Seung-Hyuk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.3
    • /
    • pp.573-578
    • /
    • 2019
  • Recently, the development of indoor positioning technology, base station positioning, Wi - Fi positioning, and Bluetooth beacon positioning technology have been introduced in buildings and underground space. This paper introduces a technique that enables user-oriented ultra-high precision positioning by adopting a lenticular positioning technology, which is a method in which a user directly locates a user's moving line based on a provider-oriented positioning system and service. Through the study on the implementation of coverage using lenticular stickers, we will discuss how to implement coverage of lenticular stickers, which is one of the most important parts of lenticular positioning technology.