• Title/Summary/Keyword: 기술정보 공유

Search Result 2,626, Processing Time 0.032 seconds

A Practical Process Model for Clients in Service-Oriented Architecture (서비스 지향 아키텍처의 클라이언트를 위한 실용적 프로세스 모델)

  • Lee, Jae-Yoo;Kim, Soo-Dong
    • The KIPS Transactions:PartD
    • /
    • v.15D no.4
    • /
    • pp.513-522
    • /
    • 2008
  • Service-Oriented Architecture(SOA) is an method to develop applications by developing and publishing reusable services which potentially be used in various applications, and discovering and composing right services dynamically. SOA adopts a paradigm of publish-discover-invoke, which is considerably different from object-oriented and component-based development(CBD) approaches. The service in SOA is different from function in procedural programming, object in object-oriented programming, and component in CBD, and its fundamental requirement is a high level of reusability and applicability. In SOA, service providers and service consumers are loosely coupled since the providers try to develop reusable services and the consumers try to locate right services without knowing much about the providers and their published services. Moreover, the process of searching, choosing and invoking right services is not presented in conventional programming paradigms. Therefore, conventional approaches to developing user interfaces and invoking the functionality on servers through JSP, and RMI in object-oriented programming cannot well be applicable to designing clients’ programs in SOA. Therefore, there is a high demand for a practical and systematic process for developing clients’ applications, and the such a process should be devised by considering key characteristics of services and SOA. However, little work on this area is known to date, and there has not a process for client side just except few guide lines for developing service client. In this paper, we propose a practical and systematic development process for developing clients' applications in SOA. Then, we define instructions for carrying out each activity in the process. To show the applicability of the proposed work, we show the result of applying our process in developing a services application for searching and booking hotels.

A Crypto-processor Supporting Multiple Block Cipher Algorithms (다중 블록 암호 알고리듬을 지원하는 암호 프로세서)

  • Cho, Wook-Lae;Kim, Ki-Bbeum;Bae, Gi-Chur;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2093-2099
    • /
    • 2016
  • This paper describes a design of crypto-processor that supports multiple block cipher algorithms of PRESENT, ARIA, and AES. The crypto-processor integrates three cores that are PRmo (PRESENT with mode of operation), AR_AS (ARIA_AES), and AES-16b. The PRmo core implementing 64-bit block cipher PRESENT supports key length 80-bit and 128-bit, and four modes of operation including ECB, CBC, OFB, and CTR. The AR_AS core supporting key length 128-bit and 256-bit integrates two 128-bit block ciphers ARIA and AES into a single data-path by utilizing resource sharing technique. The AES-16b core supporting key length 128-bit implements AES with a reduced data-path of 16-bit for minimizing hardware. Each crypto-core contains its own on-the-fly key scheduler, and consecutive blocks of plaintext/ciphertext can be processed without reloading key. The crypto-processor was verified by FPGA implementation. The crypto-processor implemented with a $0.18{\mu}m$ CMOS cell library occupies 54,500 gate equivalents (GEs), and it can operate with 55 MHz clock frequency.

Multi-Hop Vehicular Cloud Construction and Resource Allocation in VANETs (VANET 망에서 다중 홉 클라우드 형성 및 리소스 할당)

  • Choi, Hyunseok;Nam, Youngju;Lee, Euisin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.11
    • /
    • pp.263-270
    • /
    • 2019
  • Vehicular cloud computing is a new emerging technology that can provide drivers with cloud services to enable various vehicular applications. A vehicular cloud is defined as a set of vehicles that share their own resources. Vehicles should collaborate with each other to construct vehicular clouds through vehicle-to-vehicle communications. Since collaborating vehicles to construct the vehicular cloud have different speeds, directions and locations respectively, the vehicular cloud is constructed in multi-hop communication range. Due to intermittent wireless connectivity and low density of vehicles with the limited resources, the construction of vehicular cloud with multi-hop communications has become challenging in vehicular environments in terms of the service success ratio, the service delay, and the transmitted packet number. Thus, we propose a multi-hop vehicular cloud construction protocol that increases the service success ratio and decreases the service delay and the transmitted packet number. The proposed protocol uses a connection time-based intermediate vehicle selection scheme to reduce the cloud failure probability of multi-hop vehicular cloud. Simulation results conducted in various environments verify that the proposed protocol achieves better performance than the existing protocol.

A Study on the Measurement Method of Cold Chain Service Quality Using Smart Contract of Blockchain (블록체인의 스마트계약을 이용한 콜드체인 서비스 품질 측정 방안에 대한 연구)

  • Kim, ChangHyun;Shin, KwangSup
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.3
    • /
    • pp.1-18
    • /
    • 2019
  • Due to the great advances in e-Marketplace and changes in type of items purchased from the online market, it has been dramatically increased the demand of the storage and transportation under the special conditions such as restricted temperature. Especially, the cold chain needs the way to transparently measure and monitor the entire network in realtime because it has a very complicated structure and requires totally different criteria at the every different steps and items. In this research, it has been presented the performance evaluation metrics to make contract using service level agreement (SLA), the way to apply the smart contract based on blockchain, the structure of blocks, service platform and application in order to build cold chain which can prevent the risk factors by measuring and sharing information in realtime using block chain technology. In addition, we have proposed the way to store the measured performance and reputation of each player in the block using smart contract based on SLA. With the presented framework, all players including service providers as well as users can secure the information for making the rational decisions. When the service platform is actually built and operated, it seems possible to secure the information in transparently and realtime. Also, it is possible to prevent the risk factors or prepare the preemptive plans to react on them.

Apriori Based Big Data Processing System for Improve Sensor Data Throughput in IoT Environments (IoT 환경에서 센서 데이터 처리율 향상을 위한 Apriori 기반 빅데이터 처리 시스템)

  • Song, Jin Su;Kim, Soo Jin;Shin, Young Tae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.10
    • /
    • pp.277-284
    • /
    • 2021
  • Recently, the smart home environment is expected to be a platform that collects, integrates, and utilizes various data through convergence with wireless information and communication technology. In fact, the number of smart devices with various sensors is increasing inside smart homes. The amount of data that needs to be processed by the increased number of smart devices is also increasing, and big data processing systems are actively being introduced to handle it effectively. However, traditional big data processing systems have all requests directed to cluster drivers before they are allocated to distributed nodes, leading to reduced cluster-wide performance sharing as cluster drivers managing segmentation tasks become bottlenecks. In particular, there is a greater delay rate on smart home devices that constantly request small data processing. Thus, in this paper, we design a Apriori-based big data system for effective data processing in smart home environments where frequent requests occur at the same time. According to the performance evaluation results of the proposed system, the data processing time was reduced by up to 38.6% from at least 19.2% compared to the existing system. The reason for this result is related to the type of data being measured. Because the amount of data collected in a smart home environment is large, the use of cache servers plays a major role in data processing, and association analysis with Apriori algorithms stores highly relevant sensor data in the cache.

A KCDSA Magic Ink Sinature Secret Sharing Method (분배된 비밀 공유 기법을 이용한 KCDSA 매직 잉크 서명 방식)

  • 류영규
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.2
    • /
    • pp.13-24
    • /
    • 1999
  • Electronic cash is a digital signature issued by bank. If the concept of the distributed secret sharing and magic ink signature is introduced in the existing electronic cash system we can increase the security level and the availability of electronic cash system and trace the electronic cash itself and the owner of electronic cash which was issued anonymously to a user in case of illegal usage of electronic cash by users. If the trust is concentrated on one bank system. the problem of misuse of bank can be occurred. To solve this problem, the distributed secrete sharing scheme need to be introduced in electronic cash system. In this paper We propose a DSS(Digital Signature Standard) distributed magic ink signature scheme and a KCDSA(Korea Certificate-based Digital Signature Algorithm) distributed magic ink signature scheme using a verifiable secret sharing method. and we compare two methods with respect to the required computation amount for the generation of magic-ink signature.

The Effect of Eye Contact on User Experience in Synchronous Online Communication (실시간 온라인 커뮤니케이션에서 눈 맞춤이 사용자 경험에 미치는 영향)

  • Shin, Hyorim;Lee, Soyeon;Choi, Junho
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.8
    • /
    • pp.20-31
    • /
    • 2021
  • The spread of non-face-to-face culture due to COVID-19 led to innovation in untact services and the increase of non-face-to-face communication through video conference platforms. However, it is difficult to identify nonverbal expressions in synchronous online communication. Moreover, it is hard to interact with people by making eye contact. Despite the positive effects of eye contact, including such as sharing emotions and helping build intimacy, no research has empirically verified the effectiveness of eye contact in synchronous online communication. Thus, the study verified the effectiveness of eye contact in synchronous online communication. Depending on the context of the communication and whether(or not) there is eye contact, six video treatments were used to measure four dependent variables-Continuance Intention to Use, Performance Expectancy, Interactivity, and Personal Connection. The study shows that the communication with eye contact in all contexts was rated higher than the one without eye contact in all measurement variables. This study will help to provide a better user experience in synchronous online communication by verifying the effectiveness of eye contact in synchronous online communication and proposing the need of technology and the direction of the technological development.

A Study on Establishing the Strategies for Integrated Management and Utilization of Disaster & Safety Research Data (재난안전연구데이터 통합관리·활용을 위한 전략 수립 연구)

  • Ryu, Shin-Hye;Yoon, Heewon;Kim, Daewuk;Choi, Seon-Hwa
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.6_3
    • /
    • pp.1789-1803
    • /
    • 2022
  • With the increase of data and the development of AI technology, the strategies and policies related to integrated data are being actively established to increase the usability of data all over the world. Recently, in the research field, infrastructure projects and management systems are being prepared to utilize research data at the initiative of the government. Also, in Korea, platforms for searching and sharing research data are being actively developed. The National Disaster Management Research Institute (NDMI) has been conducting extensive research on disaster & safety as a national institute, but data-oriented management and utilization are insufficient. Because it still lacks consistent data management systems, metadata for outcomes of research, experts on data and policies for utilization of data to research. In order to move to the data-based research paradigm, we defined the master plans and verified a target model for the integrated management and utilization of disaster & safety research data. In this study, we found out the need to establish differentiated data governance, such as data standardization and unification of the data management system, and dedicated organization for managing data, based on the necessity and actual demands of NDMI. In order to verify the effectiveness of the target model reflecting the derived implications, we intend to establish a pilot mode. In the future, major improvement measures to establish a disaster & safety research data management system will be implement.

A Study on the Classification of OVAL Definitions for the Application of SCAP to the Korea Security Evaluation System (국내 보안평가체제에 SCAP을 활용하기 위한 OVAL 정의 분류 연구)

  • Kim, Se-Eun;Park, Hyun-Kyung;Ahn, Hyo-Beom
    • Smart Media Journal
    • /
    • v.11 no.3
    • /
    • pp.54-61
    • /
    • 2022
  • With the increase in the types of information systems managed by public institutions and companies, a security certification system is being implemented in Korea to quickly respond to vulnerabilities that may arise due to insufficient security checks. The korea security evaluation system, such as ISMS-P, performs a systematic security evaluation for each category by dividing the categories for technical inspection items. NIST in the United States has developed SCAP that can create security checklists and automate vulnerability checks, and the security checklists used for SCAP can be written in OVAL. Each manufacturer prepares a security check list and shares it through the SCAP community, but it's difficult to use it in Korea because it is not categorized according to the korea security evaluation system. Therefore, in this paper, we present a mechanism to categorize the OVAL definition, which is an inspection item written in OVAL, to apply SCAP to the korea security evaluation system. It was shown that 189 out of 230 items of the Red Hat 8 STIG file could be applied to the korea security evaluation system, and the statistics of the categorized Redhat definition file could be analyzed to confirm the trend of system vulnerabilities by category.

A Study on China's SNS Opinion Leader through Social Data (소셜 데이터를 통한 중국의 여론 주도층에 관한 연구)

  • Zheng, Xuan;Lee, Jooyoup
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.9
    • /
    • pp.59-70
    • /
    • 2016
  • The rapid development of the Chinese version of Twitter, the groom Weibo has become an important communication means for Chinese SNS users to obtain and share information. As a result, in China, the phenomenon of the power shift has emerged from the traditional opinion leaders to SNS opinion leasers. The relationship analysis of demographic variables of the Chinese SNS users and their Information on the relationship between keywords was made by utilizing the centrality analysis using Social Network Program NetMiner. China's SNS opinion leaders have general interest in daily activities with their families or friends rather than in social issues. And in case of SNS opinion leaders of high betweenness centrality, it was analyzed that general users was a key mediator role that organically out lead to the adjacent information. These properties are not independent of demographic variables, such as professional, therefore, the demographic characteristics of SNS opinion leaders showed a significant effect on the parameters of betweenness centrality. This study analyzed the characteristics of SNS users, especially opinion leaders in China by looking at the aspects of Chinese social phenomenon in terms of information. Through this study, we expect to provide basic information about the social characteristics of China through collective communication.