• 제목/요약/키워드: secured service

Search Result 195, Processing Time 0.029 seconds

Performance Analysis for Secured Service Signals of RNSS Systems

  • Han, Kahee;Lee, Subin;Lee, Kihoon;Won, Jong-Hoon
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.11 no.4
    • /
    • pp.341-349
    • /
    • 2022
  • When designing a new RNSS signal, the performance analysis for the legacy signal providing the same service, is required to determine the performance requirements. However, there are few studies on the secured service (SS) signal performance analysis, and the waveform is the only published information on the signal design component of the SS signal. Therefore, in this paper, we introduce several figures-of-merit (FoMs) that can be used for performance analysis in terms of the waveform. And then, we calculate the FoMs, such as autocorrelation main peak to secondary peak ratio (AMSR), spectral efficiency, Gabor bandwidth, multipath error, and jamming resistance quality factor, for the existing SS signals and discuss the analysis results. Finally, we conclude that the superior waveform for each FoM is different, and that the consideration of the trade-off relationship between the FoMs is required for waveform design.

Global Network Verification Test for Docker-based Secured mobile VoIP (Docker 기반의 Secured mobile VoIP를 위한 글로벌 네트워크 실증 테스트)

  • Cha, ByungRae;Kang, EunJu
    • Smart Media Journal
    • /
    • v.4 no.4
    • /
    • pp.47-55
    • /
    • 2015
  • Recently, the computing paradigm has been changing and VoIP technology is being revisited to support various services in ICT field. In this paper, we have designed and implemented the systems of software PBX open source Asterisk using light-weighted virtualization Docker technique, hardware platform, and mobile devices to support voice service based on secured mobile VoIP. And we verified the delay test of network traffics and the secured voice communication test in global real network environment.

Design and Verification Test of Virtualized VoIP to support Secured Voice Communication (음성 보안을 제공하기 위한 가상화 기반의 VoIP 설계 및 검증 테스트)

  • Cha, Byung-Rae;Park, Sun;Kim, Jong-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.10
    • /
    • pp.2462-2472
    • /
    • 2014
  • Recently, the computing paradigm has been changing and VoIP technology is being revisited to support various services. In this paper, we have designed and implemented the system of software PBX open source Asterisk, hardware platform, and mobile devices to support secured voice service based on VoIP. Specially, we designed the various platform from single board to servers based on XenServer in hardware platform. And we verified the delay test of network traffics and the secured voice communication test based on this platform.

Related Factors on Health Service Utilization and Satisfaction of Health Center Clients -Using '2010 Community Health Survey'- (보건기관 이용 현황 및 만족도와 관련 요인 -'2010지역사회건강조사' 자료를 이용하여-)

  • Kim, Hye-Sook;Park, Young-Hee
    • The Korean Journal of Health Service Management
    • /
    • v.7 no.3
    • /
    • pp.95-109
    • /
    • 2013
  • The objective of this study is to assess the utilization and satisfactions about public health centers in Korea. For the analysis, the study utilize the nationwide data of 229,229 person on '2010 Community Health Survey' of Ministry of Health & Welfare. The statistical methodology used in the study is ${\chi}^2$, ANOVA, logistic regression model and multiple regression model. This study have four major findings. First, the significant affecting socio-demographic factors in utilizing public health center were gender, age, region, national basic living secured, married, income, education, job, state of health, chronic disease, unmet medical needs and utilization reason. Second, the most serviced category of health center user was vaccination both city and rural area and the next was certificate, primary care, health screening, other use, the mother and child in city area, primary care, health screening, certificate, home visiting health in rural area. Third, the significant affecting socio-demographic factors in satisfaction degree on health center service were age, region, national basic living secured, income, education, job, state of health, utilization degree and reason. Fourth, the most satisfied service of health service center was home visiting health in city area and mental health service in rural area and the next was nutritive control and the lowest satisfied service was user of certificate. The utilization and satisfaction on health center service were identified as different with residental area and user's characteristics. The politic effort are needed to support socially disadvantaged class and to narrow regional gap.

Replication of Internal Service Quality Battery : The Assessment of Its Reliability and Validity (내부서비스품질 측정 도구의 신뢰성 및 타당성 분석)

  • Kang, Gi-Du
    • Journal of Korean Society for Quality Management
    • /
    • v.34 no.2
    • /
    • pp.77-97
    • /
    • 2006
  • Internal marketing has been suggested as the approach for service organizations to be service-and customer-oriented; and the issues of internal service quality has been one of topics widely discussed in the internal marketing literature. While previous studies have attempted to develop the instrument assessing the internal service quality, ISQB(internal service Quality battery) developed by Kang et al.(2002), compared to other instruments have received some attention given its rigorous approach to measure the internal service quality. However, it has been noted that the validity of ISQB does not appear to be thoroughly examined while the reliability of the instrument seems to be secured. The current study attempts to readdress the psychometric properties of ISQB through the replication of the instrument. The empirical testing including confirmatory factor analysis and correlational analyses show that the instrument is reliable and valid in terms of its discriminant and nomological validity.

A Deployment Strategy for ISP's Active Response Service (ISP의 능동 대응 서비스 제공 방안)

  • 이승민;남택용
    • Proceedings of the IEEK Conference
    • /
    • 2002.06a
    • /
    • pp.391-394
    • /
    • 2002
  • Because of great damages by illegal hacking, demand for security of the public network as well as the private is seemingly limitless. This critic리 requirement is leading ISPS to deploy new security services for their customers. In this paper, we present active responses for the security of a ISP's network, and describe the deployment of a new security service using the network secured by that responses.

  • PDF

A Lightweight RFID Authentication Protocol Based on Hash Chain (해시체인기반의 경량화 RFID 인증 프로토콜)

  • Youn, Keun-Young;Kim, Dong-Seong;Park, Jong-Sou
    • Convergence Security Journal
    • /
    • v.6 no.1
    • /
    • pp.45-53
    • /
    • 2006
  • It has been proposed that several RFID authentication protocols based on hash chain. Status based authentication protocol and challenge-response based authentication protocol are secured against location tracking attacks, spoofing attacks, replay attacks, traffic analysis attacks but are vulnerable to Dos attacks. RFID authentication protocol with strong resistance against traceability and denial of service attack is secured against location tracking attack, spoofing attacks, replay attacks, DoS attacks but are vulnerable to traffic analysis attacks. The present study suggests a more secure and lightweight RFID authentication protocol which is combining the advantages of hash-chain authentication protocol and RFID authentication protocol with strong resistance against traceability and denial of service attack. The results of the secure analysts for a proposed protocol are illustrated that it is secured against location tracking attacks, spoofing attacks, replay attacks, traffic analysis attacks, Dos attacks and is a lightweight operation between server and tag.

  • PDF

A Service Scenario Development for Digital Comics Content using DRM Technology (DRM 기술을 활용한 디지털 만화 콘텐츠 서비스 시나리오 개발)

  • Oh, Sang-Hoon;Cho, Hyun-Joo;Kang, Ji-Hoon
    • The KIPS Transactions:PartD
    • /
    • v.10D no.7
    • /
    • pp.1213-1224
    • /
    • 2003
  • In recently, digital comic content distribution was not stable for illegal distribution and the weak of intellectual property right in the internet. The research activities of suggest the distribution model and secure intellectual property right are going in international standard communities, not yet in Korea. As the basis of the research, the general framework of international projects and standards such as MPEG-21, IMPREMATUR, FILIGRANE was analysed. Targeting on the domain of digital comics industry, the digital comics distribution structure and business flow model are defined adapting secured distribution system, DRM. The detail content of this research consist of three themes. The first, survey and analysis of the international standard & leading DRM project's models. The second, suggestion of the service scenario on the digital comic content distribution. The third, suggestion of the model on the secured distribution of digital comics. Through this research targeting at the digital comics business, we found that standards technical items and requirements was well adapted into target domain, and would affect other domain in digital content industry.

Analysis on The Regional Industrial Growth and the Employment Effects of the First Newtown Project in Seoul Metropolitan Area (수도권 1기 신도시 지역산업의 성장과 고용효과의 변화 분석: 고양시와 성남시를 대상으로)

  • Park, So Hyun;Lee, Keumsook
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.20 no.1
    • /
    • pp.34-48
    • /
    • 2017
  • The purpose of this study is to investigate the growth of major industries and effects of regional employment on the economic growth of Goyang city and Seongnam city in Gyeonggi Province. We examine the structural changes of the industrial specialization and factors of the growth in two regions by applying Location Quotients and dynamic shift-share analysis respectively. Both regions have been strengthened gradually in their industrial bases during the last 20 years since they have developed as the bed-towns for Seoul with the First Newtown Project of the Metropolitan Seoul area. These two regions have secured in the industrial specialization and competitiveness compare to other regions in the Metropolitan Seoul area. In particular, knowledge service industries have been agglomerated in both regions. Goyang city have secured in the medical welfare, culture and tourism of service sectors, while Seongnam city have secured in the information service and science technology service sectors. Therefore, each region might be differentiated regional foster industries in these sectors in order to succeed the economic development.

A Media Key Distribution Scheme for Lawful Interception in Secured VoIP Systems (보안이 적용된 VoIP 시스템의 합법적 감청을 위한 미디어 키 분배 기법)

  • Roh Hyo-Sun;Jung Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.8B
    • /
    • pp.730-735
    • /
    • 2006
  • This paper proposes a media key distribution scheme for lawful interception in secured VoIP systems. A problem of the current US or EU standards for lawful interception is that they do not provide a mechanism for collecting keys used for encrypting media streams between two end points. In the proposed scheme, dual encryption was applied on the media keys using two shared secrets: one between the ISP AAA server and user agent, and the other between the TSP registrar and user agent. Only the lawful agency with court warrant can collect both keys from the service providers. This scheme can still provide a privacy by preventing the misusage of the keys by the service providers.