• Title/Summary/Keyword: 서버/클라이언트 프로그램

Search Result 248, Processing Time 0.027 seconds

A Design and Implementation of Secure Electronic Bidding System (인터넷 기반 전자입찰시스템의 보안 설계 및 구현)

  • 윤선희
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.7
    • /
    • pp.861-870
    • /
    • 2002
  • The area of business applications in the internet are extended enormously in result of fast development of computing and communication technologies, increase of internet use, and use of intranet/extranet in enterprise information system. Widely spread the use of the internet, there are various applications for Business to Business (B to B) or Business to Customer(B to C) model that are based on the intranet or extranet. This paper designed and implemented the Web-based Electronic Bidding System for Business to Business (B to B) model. The technical issues of electronic bidding system in the internet are involved in the connection between web client and server, electronic data interchange for the contract document, and security solution during the bidding and contracting processes. The web-based electronic bidding system in this paper is implemented using Java applet and servlet as a connection interface for web client and sewer, XML/EDI-based documents for a bid and a contract, and bidding server and notary server for enhancing the security using PKI(Public Key Infrastructure)-based public key cryptography, digital signature and Certification Authority (CA).

  • PDF

One-Pass Identification Processing Password (한 단계로 신원확인을 위한 패스워드)

  • Kim Yong-Hun;Cho Beom-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.3
    • /
    • pp.627-632
    • /
    • 2005
  • Almost all network systems provide an authentication mechanism based on user ID and password. In such system, it is easy to obtain the user password using a sniffer program with illegal eavesdropping. The one-time password and challenge-response method are useful authentication schemes that protect the user passwords against eavesdropping. In client/ server environments, the one-time password scheme using time is especially useful because it solves the synchronization problem. It is the stability that is based on Square Root problem, and we would like to suggest OPI(One Pass Identification), enhancing the stability for all of the well-known attacks by now including Free-playing attack, off-line Literal attack, Server and so on. OPI does not need to create the special key to read the password. OPI is very excellent in identifying the approved person within a very short time.

Programming Model for Web-based Mobile Agent (웹을 기반으로 한 자바 이동에이전트 프로그래밍 모델)

  • Song, Sung-Hoon;Won, Yoo-Hun
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.4
    • /
    • pp.225-234
    • /
    • 2002
  • The developers of mobile agent systems are considering integrating the system into the web and the developers of web servers are also considering supporting mobile agents in the future. But they are not clearly suggesting the relationship between web programming which has basically client/server architecture and mobile agent programming which is based on autonomous code mobility. In this paper, firstly, we clarify the method for integrating mobile agent programming into web programming by suggesting the model for mobile agent programming on the web. Secondly, by developing APIs for Java which is widely used for both web programming and mobile agent programming, we made it possible for programmers to use them for programming mobile agent on the web. Thirdly, we show the usefulness of the proposed model by adding and testing modules for execution environment of mobile agents on W3C's Java based web server, Jigsaw.

A Study on Wrapping of Legacy System using a Transaction Adaptor Component (트랜잭션 어댑터 컴포넌트를 이용한 레거시 시스템의 랩핑에 관한 연구)

  • Hwang, Sun-Myung;Kim, Sang-Young;Kim, Jung-Ah;Jin, Young-Tak
    • The KIPS Transactions:PartD
    • /
    • v.11D no.3
    • /
    • pp.605-616
    • /
    • 2004
  • The purpose of CBSD(Component Based Software Development) if to develop software using a reuse component and components assembly. The reused components have to be adapter for satisfaction of requirement specification. This paper represents a component adaption method which reuse previously developed component or legacy system, using an adaptation component called by TA(Transaction Adaptor). The adaptation using TA transmits XML data that is translated into stream type, from a client to on host system. And we introduce RS(Rule Server) which gets some Information from XML data for application program development. Through the Interaction of TA and RS, we can improve effectiveness of component development and maintenance and we can reuse legacy system.

A Study on Applet Control on the Internet Communication using Java Bytecode (자바 바이트 코드를 이용한 인터넷 통신의 애플릿 제어)

  • 김문환;나상동
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.5C
    • /
    • pp.523-531
    • /
    • 2003
  • Java applets are downloaded from web server through internet and executed in Java Virtual Machine of clients'browser. Before execution of java applets, JVM checks bytecode program with bytecode verifier and performs runtime tests with interpreter. However, these tests will not protect against undesirable runtime behavior of java applets, such as denial of service attack, email forging attack, URL spoofing attack, or annoying sound attack. In order to protect malicious applets, a technique used in this paper is java bytecode modification. This technique is used to restrict applet behavior or insert code appropriate to profiling or other monitoring efforts. Java byte modification is divided into two general forms, class-level modification involving subclassing non-final classes and method-level modification used when control over objects from final classes or interface. This paper showed that malicious applets are controlled by java bytecode modification using proxy server. This implementation does not require any changes in the web sever, JVM or web browser.

Development of Embedded RFID R/W System Using PXA255 ARM Chip (PXA255 ARM칩을 활용한 임베디드 RFID R/W 시스템 개발)

  • Hwang, G.H.;Jang, W.T.;Sim, H.J.
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.43 no.6 s.312
    • /
    • pp.61-67
    • /
    • 2006
  • In this paper it was introduced that embedded RFID Reader /Writer system including PXA255 ARM chip which enables the Tag signal to be used by data and video processing via IEEE 802.11 communication protocol. Embedded RFID R/W middle ware was developed which transmit the searched result in the data base using the received Tag signal via IEEE 802.11 communication protocol. Developed embedded RFID R/W system was composed of three parts - PXA255 ARM chid (Core Part) 13.56 MHz RFID Reader /Writer, wireless LAN for data communication with server and TFT-LCD terminal. Once this system receives the Tag signal through the serial port, it transmits the data through the wireless LAN to the server and it displays the received image data which was processed by the server onto the TFT-LCD screen. Embedded RFID R/W Middle ware transmits the received Tag signal from RFID R/W to the embedded system, which activates the socket program to connect to the window server via IEEE 802.11 communication protocol and transmits the Tag signal. Window server program searches the Database using this Tag information and displays the result on to the TFT-LCD window in the embedded system via IEEE 802.11 protocol.

Internet Monitoring of Wind-Photovoltaic Hybrid Generation System (풍력-태양광 복합발전 시스템의 인터넷 모니터링)

  • Yang, Si-Chang;Moon, Chae-Joo;Chang, Young-Hak;Soh, Soon-Yeol;Chung, Ji-Hyun;Kim, Eui-Sun
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.20 no.4
    • /
    • pp.43-48
    • /
    • 2006
  • Recently, many researchers have shown great interest in wind-photovoltaic hybrid generation system which promotes electric power supply safely and progress of energy usage efficiently with complementary cooperation of a wind generation system and photovoltaic generation system. To use this hybrid generation system stably and effectively, we established a system which can acquire, analyse and save data and monitored remotely using internet. We constructed the signal conditioning circuit and used many kinds of converters to measure physical quantities such as wind velocity, intensity of illumination and temperature as well as many kinds of voltage and current for AC and DC. we acquired data from computer with data acquisition board, developed server program and client program which can download data that is monitored and saved in realtime at remote place. We analysed the measured data in relation to many conditions such as time and weather conditions.

Design and Implementation of a Session Handler Module for SyncML Data Synchronization Clients (SyncML 자료 동기화 클라이언트를 위한 세션 핸들러 모듈의 설계 및 구현)

  • Ha Byoung-Hoon;Park KeeHyun;Ju HongTaek;Woo Jongjung
    • The KIPS Transactions:PartC
    • /
    • v.12C no.5 s.101
    • /
    • pp.741-748
    • /
    • 2005
  • SyncML is an open standard data synchronization protocol proposed by OMA(Open Mobile Alliance). In this paper, a Session Handler module, one of major modules for developing SyncML data synchronization clients, and a client User Setup program are designed and implemented. The Session Handier Module controls communication sessions, generates header parts of messages exchanged, and determines the legitimacy of incoming messages. In order to justify normal operations of the Session Handler module and the client User Setup program implemented In this paper, they are ported to a Zaurus PDA, which runs on LINUX operating system. In addition, data synchronization operations are performed between the PDA and a Synthesis sever, whose SyncML data synchronization operation is certificated by OMA, Wireless Internet International Standard Forum.

The Design and Implementation of Web-Based Integrated Genome Analysis Tools (웹 기반 통합 유전체 분석 시스템의 설계 및 구현)

  • 최범순;이경희;권해룡;조완섭;이충세;김영창
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.3
    • /
    • pp.408-417
    • /
    • 2004
  • Genome analysis process requires several steps of various software analysis tools. We propose WGAT(Web-based Genome Analysis Tool), which combines several tools for gene analysis and provides a graphic user interface for users. Software tools related to gene analysis are based on Linux or Unix oriented program, which is difficult to install and use for biologists. Furthermore, files generated from gene analysis frequently require manual transformation for next step input file. Web-based tools which are recently developed process orily one sequence at a time. So it needs many repetitive processes to analyze large size data file. WGAT is developed to support Web-based genome analysis for easy use as well as fast service for users. Whole genome data analysis can be done by running WGAT on Linux server and giving sequence data files with various options. Therefore many steps of the analysis can be done automatically by the system. Simulation shows that WGAT method gives 20 times faster analysis when sequence segment is one thousand.

  • PDF

A Study on Efficient Distributed Data Processing POS System of PKI Based (PKI 기반의 효율적인 분산처리 Point of sales 시스템에 관한 연구)

  • Park Gil-Cheol;Kim Seok-Soo;Kang Min-Gyun
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.5
    • /
    • pp.43-50
    • /
    • 2005
  • POS system that become that is supply net administration and computerization fetters of customer management that become point in istribution network constructed database and use XML-Encryption that is certificate techniques of PKI and standard of security for security that is XML's shortcoming and design distributed processing POS system using XML for data integration by introduction of Ubiquitous concept. This POS system has four advantages. First, Because there is no server, need not to attempt authentication and data transmission every time. Second, can integrate data base by XML and improve portability of program itself. Third, XML data in data transmission because transmit data after encryption data safe .Fourth, After encode whenever process data for data breakup anger of POS system client program and elevation of the processing speed, transmit at because gathering data at data transmission.

  • PDF