• Title/Summary/Keyword: 동적 ID

Search Result 82, Processing Time 0.028 seconds

A Mapping Technique of XML hierarchical structure from Relational Model (관계형 모델에 대한 XML계층 구조 사상 기법)

  • 안영희;황부현
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10c
    • /
    • pp.196-198
    • /
    • 2002
  • 웹 상에서 다양한 데이터를 표현하고 정보교환을 위한 수단으로 등장하는 XML문서가 급속도로 증가하고 데이터베이스를 이용한 XML 문서 저장기법에 대한 많은 연구가 현재 진행되고 있다. XML 문서의 구조 정보를 활용하기 위해서는 기존의 문서와는 다른 계층적인 트리 방식으로 처리되어야한다. 본 논문에서는 관계형 데이터베이스에 XML문서를 저장할 때 XML이 지니는 구조정보를 효과적으로 데이터베이스에 표현할 수 있도록 스키마를 생성하는 사상 기법을 제안한다. XML 문서를 엘리먼트 타입에 따라 분류하여 효과적으로 스키마를 생성하고, XML문서의 구조를 나타내기 위해 레코드(record)단위로 ID를 생성한다. 또한 멀티미디어 데이터와 같은 동적인 데이터를 포함하고 있는 XML문서를 효율적으로 저장할 수 있고 빠른 검색이 가능하도록 스키마를 설계한다.

  • PDF

Recruiting Ranking Techniques Based on Hybrid Using Clustering (군집화를 이용한 하이브리드 기반 채용검색 랭킹 기법)

  • Cho, Bo-Yun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.1587-1590
    • /
    • 2012
  • 인터넷의 활용이 보편화 됨에 따라 정보의 양은 급격히 늘어나고 있다. 이에 취업을 희망하는 구직자의 경우 IR 로부터 원하는 정보를 검색하기 위해 과거보다 더 많은 시간과 노력이 필요하게 되었다. 이에 본 논문에서는 TF(Term Frequency)기법을 통해 문서를 추출하고 추출된 문서의 Doc_ID 빈도수를 기준으로 한 내용기반과 군집기법을 혼합한 하이브리드 검색 시스템을 제안한다. 구직자들이 클릭한 취업정보들의 링크번호들을 K-means 알고리즘을 이용하여 군집화를 한다. 생성된 군집들은 각기 하나의 문서로 가정하고, 기존 문서과 더불어 검색 주제와 연관성을 갖고 있는 문서들을 동적비율로 검색 랭킹 하는 방식이다. 기존의 IR 기술과의 비교 실험을 통해 성능을 평가하였다. 실험결과 본 논문에서 제안한 방법이 기존의 방법보다 우수함을 확인할 수 있었다

Medical Information Dynamic Access System in Smart Mobile Environments (스마트 모바일 환경에서 의료정보 동적접근 시스템)

  • Jeong, Chang Won;Kim, Woo Hong;Yoon, Kwon Ha;Joo, Su Chong
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.47-55
    • /
    • 2015
  • Recently, the environment of a hospital information system is a trend to combine various SMART technologies. Accordingly, various smart devices, such as a smart phone, Tablet PC is utilized in the medical information system. Also, these environments consist of various applications executing on heterogeneous sensors, devices, systems and networks. In these hospital information system environment, applying a security service by traditional access control method cause a problems. Most of the existing security system uses the access control list structure. It is only permitted access defined by an access control matrix such as client name, service object method name. The major problem with the static approach cannot quickly adapt to changed situations. Hence, we needs to new security mechanisms which provides more flexible and can be easily adapted to various environments with very different security requirements. In addition, for addressing the changing of service medical treatment of the patient, the researching is needed. In this paper, we suggest a dynamic approach to medical information systems in smart mobile environments. We focus on how to access medical information systems according to dynamic access control methods based on the existence of the hospital's information system environments. The physical environments consist of a mobile x-ray imaging devices, dedicated mobile/general smart devices, PACS, EMR server and authorization server. The software environment was developed based on the .Net Framework for synchronization and monitoring services based on mobile X-ray imaging equipment Windows7 OS. And dedicated a smart device application, we implemented a dynamic access services through JSP and Java SDK is based on the Android OS. PACS and mobile X-ray image devices in hospital, medical information between the dedicated smart devices are based on the DICOM medical image standard information. In addition, EMR information is based on H7. In order to providing dynamic access control service, we classify the context of the patients according to conditions of bio-information such as oxygen saturation, heart rate, BP and body temperature etc. It shows event trace diagrams which divided into two parts like general situation, emergency situation. And, we designed the dynamic approach of the medical care information by authentication method. The authentication Information are contained ID/PWD, the roles, position and working hours, emergency certification codes for emergency patients. General situations of dynamic access control method may have access to medical information by the value of the authentication information. In the case of an emergency, was to have access to medical information by an emergency code, without the authentication information. And, we constructed the medical information integration database scheme that is consist medical information, patient, medical staff and medical image information according to medical information standards.y Finally, we show the usefulness of the dynamic access application service based on the smart devices for execution results of the proposed system according to patient contexts such as general and emergency situation. Especially, the proposed systems are providing effective medical information services with smart devices in emergency situation by dynamic access control methods. As results, we expect the proposed systems to be useful for u-hospital information systems and services.

Weaknesses and Improvement of User Authentication Scheme against Smart-Card Loss Attack (스마트 카드 분실 공격에 안전한 사용자 인증 스킴의 취약점 및 개선방안)

  • Choi, Younsung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.95-101
    • /
    • 2016
  • With the rapid development of Internet and communication network technology, various studies had proceeded to develop the technology of wireless sensor networks. Authentication schemes for user and sensor are critical and important security issue to use wireless sensors legally. First, Das introduce a user authentication scheme using smart card and password for wireless sensor networks, various studies had proceeded. Chem et al. suggested a secure user authentication scheme against smart card loss attack but Chen et al. scheme does not still resolve some security vulnerability such as perfect forward secrecy, session key exposure by gateway node, anonymity, and the password check. To resolve the problems, this paper proposes a security enhanced user authentication using the fuzzy extraction, elliptic curves cryptography and dynamic ID and analyzes the security.

Implementation of a DBA Algorithm with the Maximum Link Bandwidth Allocation in the G-PON (G-PON에서 최대 링크 대역폭까지 할당이 가능한 DBA 알고리즘의 구현)

  • Chung, Hae;Hong, Jung-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.8
    • /
    • pp.1549-1560
    • /
    • 2009
  • In the TDMA PON system, the DBA is essential for ONUs to send data efficiently to the upstream. In this paper, we implement a DBA processor for the G-PON OLT with downstream and upstream rate, 2.5 and 1.25 Gbps, respectively, The processor collects bandwidth request messages from ONUs at every cycle time and allocates properly bandwidth to each Alloc-ID with considering priority and fairness for traffics. In the proposed DBA algorithm, one cycle time consists of multiple G-PON frames ($m{\times}125{\mu}s$) for high link efficiency. In particular, the link efficiency is higher because the algorithm adopts a method that an additional overhead is eliminated when an allocated bandwidth is laid between two G-PON frames for an ONU. This enables that the processor flexibly allocates the bandwidth from zero to the maximum link capacity for an ONU. The proposed DBA processor is implemented with the FPGA and shows bandwidth allocating processes for ONUs with logic analyzer.

Anonymity Certification Technique of a Smart Card base for Personal Information Protection (개인정보보호를 위한 스마트카드 기반의 익명 인증 기법)

  • Lee, Kwang-Hyoung;Park, Jeong-Hyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.12
    • /
    • pp.6071-6080
    • /
    • 2012
  • Regarding the official authentication method which is a strong encrypt method for financial transactions, there has recently been a concern for the problem of storage. As a solution for such problems, this study provides the anonymous authentication method based on the smart card used for such a purpose by utilizing the pseudo ID replacing the user's personal data. Such an anonymous authentication method makes it possible to prevent any inside leakage, intermediary attack, limited re-transmission attack, service-denying attack, directional safety attack and secret inspector attack in regard to the user's personal data. As a result, there would be no concern for the leakage of any personal data. In comparative analysis, after executing the comparison and analysis process through the experiment for the authentication process by using the previously-used smart card, the new one has shown about 10% a high level of efficiency for the encrypt and decrypt process together with excellent features in terms of flexibility in regard to the user's anonymity and tracking ability.

A Robust and Secure Remote User Authentication Scheme Preserving User Anonymity (사용자 익명성을 보장하는 안전하고 개선된 원격 사용자 인증스킴)

  • Shin, Kwang-Cheul
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.2
    • /
    • pp.81-93
    • /
    • 2013
  • Remote user authentication is a method, in which remote server verifies the legitimacy of a user over an common communication channel. Currently, smart card based remote user authentication schemes have been widely adopted due to their low computational cost and convenient portability for the mutual authentication. 2009 years, Wang et al.'s proposed a dynamic ID-based remote user authentication schemes using smart cards. They presented that their scheme preserves anonymity of user, has the feature of storing password chosen by the server, and protected from several attacks. However, in this paper, I point out that Wang et al.'s scheme has practical vulnerability. I found that their scheme does not provide anonymity of a user during authentication. In addition, the user does not have the right to choose a password. And his scheme is vulnerable to limited replay attacks. In particular, the parameter y to be delivered to the user is ambiguous. To overcome these security faults, I propose an enhanced authentication scheme, which covers all the identified weakness of Wang et al.'s scheme and an efficient user authentication scheme that preserve perfect anonymity to both the outsider and remote server.

Efficient RFID Search Protocols Providing Enhanced User Privacy (강화된 사용자 프라이버시를 보장하는 효율적인 RFID 검색 프로토콜)

  • Lim, Ji-Hwan;Oh, Hee-Kuck;Nyang, Dae-Hun;Lee, Mun-Kyu;Kim, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.347-356
    • /
    • 2009
  • In an RFID search protocol, a reader uses designated query to determine whether a specific tag is in the vicinity of the reader. This fundamental difference makes search protocol more vulnerable to replay attacks than authentication protocols. Due to this, techniques used in existing RFID authentication protocols may not be suitable for RFID search protocols. In this paper, we propose two RFID search protocols, one based on static ID and the other based on dynamic ID, which use counter to prevent replay attacks. Moreover, we propose a security model for RFID search protocols that includes forward/backward traceability, de-synchronization and forgery attack. Based on this model, we analyze security of our protocols and related works.

A Channel Allocation Protocol for Collision Avoidance between Reader in 2.4GHz Multiple Channel Active RFID System (2.4GHz 다중채널 능동형RFID시스템에서 리더간 충돌회피를 위한 채널 할당 프로토콜)

  • Kim, Dong-Hyun;Lee, Chae-Suk;Kim, Jong-deok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.139-142
    • /
    • 2009
  • RFID(Radio Frequency IDentification) technology is an automatic identification method using radio frequencies between RFID reader which collects the information and tag which transmits the information. RFID technology develops passive RFID which transmit the only ID to active RFID which transmit the additional information such as sensing information. However, ISO/IEC 18000-7 as active RFID standard has a problem which cannot use multiple channel. To solve this problem, we use the 2.4GHz bandwidth technology and we propose the dynamic channel allocation method which can efficiently allot a channel. we show the operation of the dynamic channel allocation method through design and implement with CC2500DK of Taxas Instrument.

  • PDF

A Literature Study on Digital Currency and Historical Developments of Money: Dynamic Pattern in Currency, Central Bank Digital Currency and Libra (디지털화폐와 화폐 변천과정에 관한 문헌적 연구: 동적패턴, CBDC, 리브라를 중심으로)

  • Kim, Euiseok
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.2
    • /
    • pp.109-126
    • /
    • 2020
  • This study attempts to find out the characteristics of digital currency and currency transformation through the analytical descriptions of the literature. In the early days of the emergence of new currency, market-oriented autonomous monetary adjustment was made along with various attempts by the private sector, and then government-centered central currency management and coordination were made for the national monopoly of profits and power. Digital currency can be seen as the emergence of a new form of money that will bring about paradigm changes. CBDC can be divided into direct and indirect types. CBDC is expected to require a strategic approach by the government or firm as it will bring about changes in the ecosystem of related industries. Libra is a stablecoin designed to minimize price fluctuations, and if it succeeds in commercializing it, it is expected to bring about revolutionary changes in the financial industry around the world.