• Title/Summary/Keyword: 사용자 스토리

Search Result 352, Processing Time 0.033 seconds

Certificate-based SSO Protocol Complying with Web Standard (웹 표준을 준수하는 인증서기반 통합 인증 프로토콜)

  • Yun, Jong Pil;Kim, Jonghyun;Lee, Kwangsu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1466-1477
    • /
    • 2016
  • Public key infrastructure(PKI), principle technology of the certificate, is a security technology providing functions such as identification, non-repudiation, and anti-forgery of electronic documents on the Internet. Our government and financial organizations use PKI authentication using ActiveX to prevent security accident on the Internet service. However, like ActiveX, plug-in technology is vulnerable to security and inconvenience since it is only serviceable to certain browser. Therefore, the research on HTML5 authentication system has been conducted actively. Recently, domestic bank introduced PKI authentication complying with web standard for the first time. However, it still has inconvenience to register a certification on each website because of same origin policy of web storage. This paper proposes the certificate based SSO protocol that complying with web standard to provide user authentication using certificate on several sites by going around same origin policy and its security proof.

A Novel Auditing System for Dynamic Data Integrity in Cloud Computing (클라우드 컴퓨팅에서 동적 데이터 무결성을 위한 개선된 감사 시스템)

  • Kim, Tae-yeon;Cho, Gi-hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.8
    • /
    • pp.1818-1824
    • /
    • 2015
  • Cloud computing draws attention as an application to provide dynamically scalable infrastructure for application, data and file storage. An untrusted remote server can cause a variety of problems in the field of data protection. It may process intentionally or involuntarily user's data operations(modify, insert, delete) without user's permission. It may provide false information in order to hide his mistakes in the auditing process. Therefore, it is necessary to audit the integrity of data stored in the cloud server. In this paper, we propose a new data auditing system that can verify whether servers had a malicious behavior or not. Performance and security analysis have proven that our scheme is suitable for cloud computing environments in terms of performance and security aspects.

Production of 3D Mongyudowondo with Reinterpretation of Traditional Paintings (전통회화의 재해석을 통한 3차원 몽유도원도 제작)

  • Kim, Jong-Chan;Kim, Jong-Il;Kim, Eung-Kon;Kim, Chee-Yong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.6
    • /
    • pp.1234-1240
    • /
    • 2009
  • Culture is not only a factor of a life worthy of man, but also that of beauty and fluency of life,so it works as a key to show differences in the quality of life. Paying attention to culture, which plays a role to create new things, is a source of high-added value. The term of cultural contents was derived in21C, combining digital skills with art. We are going to reconstruct and develope cultural properties such as remains, pottery, pictures, as a way of restoration for cultural contents with the view of reinterpretation. In this paper, we reinterpreted the pictures which were based on three particular elements in Chosun Dinasty- poetry, handwriting, and picture, and we produced 3D objects after analyzing texts and images in multimedia works applied with source pictures. As a highlighted method of restoration for cultural contents, we produced the work which can be interacted and has three dimensional objects getting out of appreciating of plane images. We presented a method of informing our culture with 3D Mong-yu-do-won-do, which used traditional paintings by being improved user friendliness and accessibility.

A method of Securing Mass Storage for SQL Server by Sharing Network Disks - on the Amazon EC2 Windows Environments - (네트워크 디스크를 공유하여 SQL 서버의 대용량 스토리지 확보 방법 - Amazon EC2 Windows 환경에서 -)

  • Kang, Sungwook;Choi, Jungsun;Choi, Jaeyoung
    • Journal of Internet Computing and Services
    • /
    • v.17 no.2
    • /
    • pp.1-9
    • /
    • 2016
  • Users are provided infrastructure such as CPU, memory, network, and storage as IaaS (Infrastructure as a Service) service on cloud computing environments. However storage instances cannot support the maximum storage capacity that SQL servers can use, because the capacity of instances provided by service providers is usually limited. In this paper, we propose a method of securing mass storage capacity for SQL servers by sharing network disks with limited storage capacity. We confirmed through experiments that it is possible to secure mass storage capacity, which exceeds the maximum storage capacity provided by an instance with Amazon EBS on Amazon EC2 Windows environments, and it is possible to improve the overall performance of the SQL servers by increasing the disk capacity and performance.

An Explorative Study on Development Direction of a Mobile Fitness App Game Associated with Smart Fitness Wear (스마트 피트니스 웨어 연동형 모바일 피트니스 앱 게임의 개발 방향 탐색)

  • Park, Su Youn;Lee, Joo Hyeon
    • Journal of Digital Contents Society
    • /
    • v.19 no.7
    • /
    • pp.1225-1235
    • /
    • 2018
  • In this study, as a part of practical and customized smart contents development planning research related to smart fitness contents associated with smart wear that can monitor physical activity, we investigated the potential needs for smart fitness contents through research. As a result, the potential needs for smart fitness contents is 'accessibility to use', 'inducement of interest', 'diverse story line' were derived at the stage of 'before exercise', 'Real - time voice coaching', 'accurate exercise posture monitoring', and 'personalized exercise prescription' were derived at the stage of 'during exercise'. At the stage of 'after exercise', 'substantial reward system', 'grading system', 'body figure change monitoring' and 'everyday life monitoring' were derived. At the stage of 'connection to the next exercise', 'triggering exercise motivation', 'high sustainability' wear derived.

Development of the Maintenance System for Gate Bridge (배수갑문 노후도 감시시스템 구축연구)

  • Kim, Kwan-Ho;Cho, Young-Kweon;Kim, Myeong-Won
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2008.04a
    • /
    • pp.1025-1028
    • /
    • 2008
  • Using of maintenance system for gate bridge algorism, We made out algorism and engine for prediction of life cycle by neutralization, freezing-thawing and damage from sea wind. To objective of this system, user can use easily with maintenance system for gate bridge. Also, to improve of maintenance efficiency, web-program made out by superannuated evaluation and analysis of field exposure data. To develope web-program, we framing structure design of database, which is adapted to method of maintenance, repair, and reinforcing

  • PDF

Study on Face recognition algorithm using the eye detection (눈 검출을 이용한 얼굴인식 알고리즘에 관한 연구)

  • Park, Byung-Joon;Kim, Ki-young;Kim, Sun-jib
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.6
    • /
    • pp.491-496
    • /
    • 2015
  • Cloud computing has emerged with promise to decrease the cost of server additional cost and expanding the data storage and ease for computer resource sharing and apply the new technologies. However, Cloud computing also raises many new security concerns due to the new structure of the cloud service models. Therefore, the secure user authentication is required when the user is using cloud computing. This paper, we propose the enhanced AdaBoost algorithm for access cloud security zone. The AdaBoost algorithm despite the disadvantage of not detect a face inclined at least 20, is widely used because of speed and responsibility. In the experimental results confirm that a face inclined at least 20 degrees tilted face was recognized. Using the FEI Face Database that can be used in research to obtain a result of 98% success rate of the algorithm perform. The 2% failed rate is due to eye detection error which is the people wearing glasses in the picture.

Lambda Architecture Used Apache Kudu and Impala (Apache Kudu와 Impala를 활용한 Lambda Architecture 설계)

  • Hwang, Yun-Young;Lee, Pil-Won;Shin, Yong-Tae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.9
    • /
    • pp.207-212
    • /
    • 2020
  • The amount of data has increased significantly due to advances in technology, and various big data processing platforms are emerging, to handle it. Among them, the most widely used platform is Hadoop developed by the Apache Software Foundation, and Hadoop is also used in the IoT field. However, the existing Hadoop-based IoT sensor data collection and analysis environment has a problem of overloading the name node due to HDFS' Small File, which is Hadoop's core project, and it is impossible to update or delete the imported data. This paper uses Apache Kudu and Impala to design Lambda Architecture. The proposed Architecture classifies IoT sensor data into Cold-Data and Hot-Data, stores it in storage according to each personality, and uses Batch-View created through Batch and Real-time View generated through Apache Kudu and Impala to solve problems in the existing Hadoop-based IoT sensor data collection analysis environment and shorten the time users access to the analyzed data.

Design and Implementation of Education Contents for Prevention of Child Sexual Violence (아동 성폭력 예방을 위한 교육 콘텐츠의 설계 및 구현)

  • Kim, Hee-joo;Shin, Hye-won;Lee, yoon-ji;Won, Hye-mi;Park, Su e;Park, Jung Kyu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.179-181
    • /
    • 2017
  • In this paper, we propose the contents of the visual content of the child's own boundaries and implement the contents based on active learning using touch method. The images consist of four modules, each of which consists of content developments, learning concepts, and learning content. The notion of sexual violence is also aimed at fostering awareness that sexual violence is also an extension of the child's safety. Moreover, the learning content of a learning game improves learning outcomes by receiving a 'compliment' if the game succeeds and receives a 'reward' on the game.

  • PDF

Performance Evaluation of SSD Cache Based on DM-Cache (DM-Cache를 이용해 구현한 SSD 캐시의 성능 평가)

  • Lee, Jaemyoun;Kang, Kyungtae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.11
    • /
    • pp.409-418
    • /
    • 2014
  • The amount of data located in storage servers has dramatically increased with the growth in cloud and social networking services. Storage systems with very large capacities may suffer from poor reliability and long latency, problems which can be addressed by the use of a hybrid disk, in which mechanical and flash memory storage are combined. The Linux-based SSD(solid-state disk) uses a caching technique based on the DM-cache utility. We assess the limitations of DM-cache by evaluating its performance in diverse environments, and identify problems with the caching policy that it operates in response to various commands. This policy is effective in reducing latency when Linux is running in native mode; but when Linux is installed as a guest operating systems on a virtual machine, the overhead incurred by caching actually reduces performance.