• Title/Summary/Keyword: 시스템 엔티티 구조

Search Result 14, Processing Time 0.03 seconds

A Study Applying to Mutual Authentication Mechanism among Entities in Grid to Structure Secure Active Nodes (액티브 노드 보안을 위한 그리드 상에서의 엔티티 상호 인증 기법 적용에 관한 연구)

  • 이원구;이재광
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.05b
    • /
    • pp.708-711
    • /
    • 2003
  • 본 논문에서는 그리드 환경에서의 엔티티 상호 인증구조와 추가적으로 제안한 인증구조를 고찰하여, 향후 액티브 네트워크 상에서의 액티브 노드간의 상호인증구조를 구축하기 위한 초석을 다지고자 한다. 추가적으로 현재의 그리드 인가 구조에서 초 기반이 아닌 인증서 기반의 사용자 인가 시스템을 제안하였으며, 기존의 ID 매핑 방식의 인가 시스템 대신에 인증서내의 확장 필드에 사용자의 권한 등급을 추가하고, 이를 기반으로 자원에 대한 접근 제한 등급을 결정하도록 하였다.

  • PDF

STEP Entities in Integrated Design System for Tall Buildings (초고층건물의 통합구조설계시스템에서 STEP 엔티티 개발)

  • Song, Hwa-Cheol;Cho, Yong-Soo;Kim, Soo-Hwan
    • Journal of Korean Association for Spatial Structures
    • /
    • v.6 no.2 s.20
    • /
    • pp.77-83
    • /
    • 2006
  • The planning process of complex projects in tall building is characterized by the cooperation of many involved specialists and by a high degree of information exchange. In order to improve the quality of the structural design of tall buildings, information of different involved partners in the planning process has to be integrated. This paper aims to introduce a concept of the integrated structural design for the tall building using STEP(Standard for the Exchange of Product Model Data). In this study, the entities of mass, column shortening, and serviceability evaluation for structural design in tall buildings are proposed.

  • PDF

The Design and Implementation of SGML Document Editing System Using Document Structure Information (문서 구조정보를 이용한 SGML 문서 편집 시스템의 설계 및 구현)

  • Kim, Chang-Su;Jo, In-June;Jung, Hoe-Kyung
    • The Journal of Engineering Research
    • /
    • v.3 no.1
    • /
    • pp.21-27
    • /
    • 1998
  • This paper describes the design and implementation of system for editing SGML document instance using document structure information of SGML DTD. For make use of structure window for logical structure expression of document to SGML document editing without editing mistake of user and easy update the using support to editing process of elements, attributes, entities tools and product document, and valid using SGML parser. Also, in order to support Korean and English text using KS 5601. In this paper, the proposed SGML document editing system is used common controls support of window 95 for window user interface

  • PDF

Off-Line Electronic Payment Scheme using Smart Cards (스마트 카드를 사용한 오프 -라인 전자 지불 기법)

  • Kim, Jeong-Eun;Lee, Hyeong-U;Kim, Tae
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.11
    • /
    • pp.1363-1372
    • /
    • 1999
  • 에이전트 기반 이동 컴퓨팅 환경에서 전자 상거래를 구현하기 위해 가장 필요로 하는 것은 안전한 지불 구조를 제공하는 것이다. 본 연구에서는 불확정 전송 기법 1,2 을 사용한 비대화형 엔티티 인증 기법과 Horster 기법 4,5 을 기반으로 메시지 복원 기능을 제공하는 공정 은닉 서명 기법을 제시한다. 또한 이를 직접 Brands가 제시한 오프-라인 전자 지불 시스템 3,6 에 접목한다. 인증 단계가 비대화형으로 수행되므로 이동 엔티티 인증에 효율적이고, 메시지 복원 기능을 갖고 공개 검증 기능을 제공하는 은닉 서명을 적용하기 때문에 카운터 방식을 사용한 스마트 카드 기반 전자 지불 시스템 6 에 효과적으로 적용할 수 있었다. 전자 화폐에 대해서 신뢰 센터에 의한 공정성 검토 기능을 추가로 제공하므로 전자 지불 시스템의 신뢰성을 향상시킬 수 있다.Abstract The primary requirements for realizing the electronic commerce in agent based mobile computing environments are to implement the compatible secure payment framework. In this paper, we propose both the non-interactive entity authentication scheme that is combined with oblivious transfer protocol 1,2 and the message recovery fair blind signature based on Horster scheme 4,5 . And these techniques are directly applied to the Brand's off-line electronic payment system 3,6 . As the authentication processes are done by non-interactive manner, we can also get efficiency for mobile entity authentication. Additionally, as the used signature scheme provides a message recovery function with publicly verifiable properties, it is efficiently applicable to a counter based off-line electronic payment scheme 6 based on the additional device like smart card. Therefore, we can enhance the reliability of proposed electronic payment system based on the publicly verifiable fairness in its electronic cash by a trusted judge.

Data Modeling Methods for Performance Enhancement (성능 향상을 위한 데이터 모델링 방법)

  • 김수연;이상호;서의호
    • Journal of Intelligence and Information Systems
    • /
    • v.4 no.2
    • /
    • pp.85-102
    • /
    • 1998
  • 현재의 시스템 개발 프로젝트에서 대부분의 기업은 관계형 데이터베이스를 목표 환경으로 채택하고 있지만 설계자들은 기존의 파일 시스템이나 계층형 데이터베이스의 설계 방식을 관계형 데이터베이스 설계 시에도 그대로 적용하려는 경향이 있다. 또한 모델링 시 시스템 특성과는 무관한 업무 중심의 엔티티 관계도를 작성함으로써 구현 시에 모델을 상당 부분 변경하거나 추가해야 하는 오버헤드가 발생하기도 한다. 관계형 데이터베이스의 경우 구조를 어떻게 설계하느냐에 따라 효율의 차이가 크게 나타나므로 성능 향상을 위한 데이터 모델링 기법이 중요한 이슈로 등장하게 되었다. 본 논문에서는 관계형 데이터베이스 성능과 관련하여 이미 연구되고 실험된 내용을 여러 문헌과 자료를 참고하여 조사하였다. 성능 항상을 위한 모델링 기법들을 테이블, 릴레이션쉽, 인덱스 등의 객체별로 분류하여 정리하였고, 조사된 내용 중에서 몇 가지를 선택하여 Oracle DBMS 환경에서 실제로 실험을 실시하였다. 대용량 테이블에 대한 질의를 수행하여 소요되는 시간을 측정하고 그 결과를 분석하였다. 실험을 통해 검증된 결과를 토대로 제안되는 모델링 방법을 제시한다.

  • PDF

Study of Document Distribution System Architecture for Digital Secret Document Leakage Prevention (전자기밀문서 유출봉쇄 유통시스템 구조 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.143-158
    • /
    • 2010
  • The illegal leakage of enterprise digital confidential information will threaten the enterprise with bankruptcy. Today since most small-and-medium companies have no capability to fight against illegally compromising their critically confidential documents in spite of knowing the leakage of them, strongly safe distribution system of the digital confidential documents should be designed so in secure as to prevent any malicious intent of embezzlement from accessing the critical information. Current DRM-based protection system is not always perfect to protect the digital secrets, even seems to leave the secrets open. Therefore our study has analyzed the illegal leakage paths that hackers attack against and the vulnerability of the current protection systems. As result, we study the group communication based system architecture satisfying the security conditions to make even legitimate working employee keep out of the confidential documents, without performance degradation. The main idea of this architecture is to stay every secrets in encrypted form; to isolate the encrypted documents from the crypto-key; to associate every entity with one activity and to authenticate every entity with DSA-based public key system; multiple authentication method make hackers too busy to get a privilege to access the secrets with too many puzzle pieces. This paper deal with the basic architectural structure for the above issues.

5G Radio Access Network Architecture for Mobile Augmented Reality Service (모바일 증강현실 서비스 구현을 위한 5G 무선 액세스 네트워크 구조)

  • Cho, Hyoungjun;Chung, Jong-Moon
    • Journal of Internet Computing and Services
    • /
    • v.18 no.4
    • /
    • pp.27-34
    • /
    • 2017
  • In this paper, the analysis of mobile augmented reality service using 5G network are provided. First of all, the introduction and required performance of mobile augmented reality(MAr) service are provided. After that, 5G network key features, target performance, and network architecture are analyzed. At the end, the additional network entity and functions for the realization of mobile augmented reality service are proposed. The mobile augmented reality service time. At the end, the service delay in existing LTE system and proposed 5G MAr system by using real device and network parameters.

Development of Heterarchical Control System through Automated Plant Monitoring (공장모니터링을 통한 수평구조 공장제어시스템의 개발)

  • Lee, Seok-Hee;Bae, Yong-Hwan
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.14 no.1
    • /
    • pp.108-118
    • /
    • 1997
  • The heterarchical structure provides a more attractive solution to the conventional hierarchical structure as the density and level of distrubution of computing resources in manufacturing system expands. Tracing the evolution of control structures for automated manufacturing systems, this paper discusses the design principles for heterarchical system to reduce complexity, increase extendability, flexible configurability and suggests a good example of real-time adaptation using the concept of intelligent agent of manufac- turing entities and fault diagmosis system.

  • PDF

Design of No-human-in-the-Loop Battleship Warfare M&S System applied to the Korea Yellow Sea Warfare Case using Agent-based Modeling (에이전트 기반의 인간 미개입형 함정전투 M&S 시스템 설계 및 서해교전 사례연구)

  • Chi, Sung-Do;You, Yong-Jun;Jung, Chan-Ho;Lee, Jang-Se;Kim, Jae-Ick
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.2
    • /
    • pp.49-61
    • /
    • 2008
  • Most battleship warfare M&S systems run relatively slow and the simulation results are often unfair since the system should interact with human operators(controller and/or gamer). To deal with these problems, we have proposed the agent-based battleship warfare M&S system which interact with multiple agent systems instead of human operators. Agent-based M&S system may be able to efficiently support the analysis of effectiveness and/or the operational tactics development of given warfare by providing autonomous reasoning capabilities without the intervention of human controller. To do this, the paper propose the design concept and methodology using the advanced modeling and simulation framework as well as autonomous agent design principle. Several simulation tests performed on the battleship warfare case study on Korea Yellow sea will illustrate our techniques.

  • PDF

Design of a Hierarchical Dimension of the Bill of Materials Type (자재소요명세서 유형 계층차원의 설계)

  • Jang Se-Hyeon;Yu Han-Ju;Choi In-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.4 s.42
    • /
    • pp.243-250
    • /
    • 2006
  • A recursive relationship is a relationship among entities of the same class. N : M recursive relationships can be used to represent bills of materials. A bill of materials is a special data structure that occurs frequently in manufacturing applications. This data structure is a hierarchy. Most business dimensions have a hierarchical structure. In this study, a design of a hierarchical dimension of the bill of materials type is carried out. As with other N : M relationships, an intersection table that shows pairs of related rows is created, and this table is transformed into a dimension in the OLAP(OnLine Analytical Processing) model. This transformation consists of two tasks: (1)replacing the first column of the intersection table with the lowest level of the dimension: and (2)replacing the second column of the table with the only upper level of the dimension. A case multidimensional information system using the hierarchical dimension is also developed.

  • PDF