• Title/Summary/Keyword: 웹 보안

Search Result 909, Processing Time 0.024 seconds

Information Appliance Control MultiAgentsystem (정보가전 제어 멀티에이전트시스템)

  • 김일연;송준현;김일곤
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2002.11a
    • /
    • pp.363-369
    • /
    • 2002
  • 가정 내에서의 초고속망 이용이 활성화되면서 가정 내에서의 활동은 매우 다양하고 복잡하며 그에 따른 서비스도 여러 가지 형태가 존재한다. 외부 인터넷망과 연동되는 홈 네트워크의 개념이 생기기 전부터 흠 오토메이션, 홈시큐리티 등의 서비스를 제공하기 위한 고립적인 형태의 망과 서비스 제공 시스템이 있었다. 월드 와이드 웹 서비스를 기본으로 한 인터넷의 폭발적인 활성화와 고속 인터넷망의 확산에 따라 가정 내에서 제공되는 서비스를 인터넷과 연계시키려는 시도가 보편화되었고 가정 내에서 사용되는 독립적인 기기들을 인터넷에 연결하여, 외부의 정보를 이용해서 활용하거나, 가전내의 기기들을 외부에서 액세스할 수 있게 되었다. 이렇게 하여 보다 풍부한 서비스를 제공하고, 사용상의 시간적인 제약을 완화할 수 있다. 예들 들어 인터넷상에서 조리법을 전송받아 전자레인지를 작동할 수 있으며, 외부에서 잘못 켜둔 가스밸브를 잠글 수도 있다. 가정 내에서 wrhd되던 이러한 서비스들은 서로 다른 하드웨어와 통신방법을 사용하고 있어, 이러한 서비스를 통합하여 운영, 관리할 수 있도록 하는 흠 서버의 개념이 대두되었다. 외부 인터넷 망과 연계된 흠 오토메이션, 홈 시큐리티등을 제공할 수 있는 기반이 마련되었고, 가정 내에서 독립적으로 제공되던 서비스들을 단일 홈 서버를 통해서 관리하려는 시도가 진행되었다. 그러나 홈 서버는 개발하는 업체의 보유기술에 따라 중심기능은 약간씩 차이를 보이고 있다. 홈 서버 응용 영역은 전문 지식을 소유한 인력과의 연계가 필요하고, 다양한 서비스 영역 행위가 아주 복잡하기 때문에 이들을 연결해 주는 자치 시스템을 필요로 한다. 또한 홈 서버 서비스 영역에서 정보는 각 영역 전문가가 가진 지식의 전달을 필요로 하기 때문에, 지식을 주고받는 멀티 에이전트의 시스템의 활용 영역으로 적당하다. 멀티 에이전트 시스템은 분산된 환경에서 에이전트간에 에이전트 통신 언어를 사용해서 대화를 하기도 하고, 상호 협력하는 에이전트들로 구성된 시스템을 뜻하며 흠 서버처럼 동적이고 고도의 자치성을 요구하는 영역에 적당하다. 멀티 에이전트 플랫폼으로는 FIPA(Foundation for Intelligent Physical Agents)가 제시한 에이전트 표준 플랫폼이 1997년부터 2000년에 이르기까지, 계속적으로 변화, 발전하고 있다. 본 연구는 FIPA에서 제시하는 플랫폼을 기반으로 홈 서버에 정보가전을 제어하는 에이전트를 두고 외부에서 다른 에이전트가 홈 서버에 위치하는 에이전트와의 통신을 통하기 정보가전을 지능적으로 제어하도록 하였다. 정보가전 에이전트는 가정 내 가전제품을 외부에서 제어하기 위한 에이전트이다. 단순한 관리가 아닌 에이전트로 하여금 지능적으로 가전제품 관리를 하게 한다. 정보가전 에이전트는 홈 서버에서 작동하는 에이전트와 PDA에서 작동하는 에이전트로 구성된다. 정보가전 에이전트는 전력량, 수도 사용량 제어와 가전제품 제어 기능과 보안 관련 서비스를 제공한다. 두 에이전트는 FIPA에서 정의된 규격에 맞게 만들어지기 때문에 FIPA명세서를 따르는 다른 에이전트와 자유로운 통신이 가능하다.

  • PDF

A refinement of customer satisfactory factors in multimedia contentware evaluation process - focused on company website design - (멀티미디어 컨텐트웨어 상품에 대한 소비자 감성 평가 요소(문화성 인자)추출에 관한 연구 - 기업 웹사이트를 중심으로 -)

  • 이종호;김명석;이현이;김태균
    • Archives of design research
    • /
    • v.11 no.1
    • /
    • pp.291-302
    • /
    • 1998
  • This paper covers the development process of multimedia evaluation system, especially focused on customer satisfactory factors while customers navigating net-based Interactive multimedia system. Customers usually experience new level of interaction cased by newly developed web-based technology In ordinary multimedia system. However, if it gives customers satisfactory experience is a matter of question. To find out the relationship between customer satisfaction and interactivity factors exposed by multimedia system, a model has been developed which describes the structure of web-based multimedia system and its relation to customer satisfactory factors. Five different experiments, including 'semantic differential', 'focus group interview', and 'expert review', has been conducted and four customer satisfactory factors were identified. Those are 'customery value', 'structural perfectness', 'visual perfectness', and 'contemporaneity'. With these factors and newly delveoped evaluation system, 7 different web-site has been evaluated and analyzed at the end of this report.

  • PDF

Password-Based Authentication Protocol for Remote Access using Public Key Cryptography (공개키 암호 기법을 이용한 패스워드 기반의 원거리 사용자 인증 프로토콜)

  • 최은정;김찬오;송주석
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.75-81
    • /
    • 2003
  • User authentication, including confidentiality, integrity over untrusted networks, is an important part of security for systems that allow remote access. Using human-memorable Password for remote user authentication is not easy due to the low entropy of the password, which constrained by the memory of the user. This paper presents a new password authentication and key agreement protocol suitable for authenticating users and exchanging keys over an insecure channel. The new protocol resists the dictionary attack and offers perfect forward secrecy, which means that revealing the password to an attacher does not help him obtain the session keys of past sessions against future compromises. Additionally user passwords are stored in a form that is not plaintext-equivalent to the password itself, so an attacker who captures the password database cannot use it directly to compromise security and gain immediate access to the server. It does not have to resort to a PKI or trusted third party such as a key server or arbitrator So no keys and certificates stored on the users computer. Further desirable properties are to minimize setup time by keeping the number of flows and the computation time. This is very useful in application which secure password authentication is required such as home banking through web, SSL, SET, IPSEC, telnet, ftp, and user mobile situation.

A Study on Establishing Online Document Communication System by Means of Intranet Web Site (ODCS(Online Document Communication System)인트라넷 웹사이트 구축과정 및 사용자 효과 연구)

  • 양초산
    • Archives of design research
    • /
    • v.17 no.3
    • /
    • pp.167-178
    • /
    • 2004
  • The purpose of this treatise is to show merits and method of establishing Lotte department store design division Online Documents Communication System through illustration of examples of intranet in which internet environment convenient to use for its openness is applied for establishing Design Online Documents Communication System for fundamentals of organization. In this connection merits and effect attainable from establishing Design Outline Documents Communication System of the enterprise as found were as follows: Firstly, it brought about reduction in workload of staffs through sharing various existing resources. It reduced redundant works and enables speedy handling of works. Secondly, it was possible to exchange viewpoints and share information by pertinent parties. Thirdly, by expediting information exchange and communication among persons in charge it was possible to improve work efficiency. Fourthly, it was possible to build and operate such system at relatively low cost on the basis of web browser. Without using any other significant instrument or equipment but by linking it to business network and using existing computer system operation was possible. Fifthly, by common sharing of work exclusive to design room through on-line it was possible to improve professionalism and convenience in data preservation. Through this treatise and survey and study on process for establishing intranet it was possible to find that there were sharing work, improving work efficiency, reducing workload, saving cost and expediting communication to a significant degree.

  • PDF

The Sequential Effects of WebCam Wireless Moritoring Service on Customer Loyalty (웹캠 무선원격 모니터링 서비스가 고객충성도에 미치는 영향에 관한 연구)

  • Ryu, In-Soo;Chae, Myung-Sin
    • Journal of Internet Computing and Services
    • /
    • v.10 no.6
    • /
    • pp.51-79
    • /
    • 2009
  • Today the service industry is growing, and differentiated services for marketing and service quality is emerging as a serious problem. Until now, the WebCam is used for observation, and the negative aspects, such as from a human rights issue has become. Discipline and Punish is not to use a webcam to customer satisfaction research is needed. Therefore, wireless monitoring in WebCam service quality of the service reconfiguration and service quality factors for the configuration of the customer's preference regarding how research was recognized. Configuration of the service quality factors WebCam service customer satisfaction and customer loyalty was to identify factors that affect. These services to study the correlation between the quality variables WebCam provides wireless monitoring services for the preschool and children, a survey of the house. Configuring a wireless monitoring service quality in order to research the factors WebCam video quality and transmission speed, mobility and portability, convenience, visibility, reliability, and the interaction of the castle set. Severely and video quality and transmission speed, visibility, reliability, customer satisfaction, the interaction factors are said. Inclination to participate in social issues, innovation, digital devices that use a skilled, depending on the difference in the service quality has been confirmed. However, the age and quality of service awareness and job types showed a low correlation, and the marketing of these results will be discussed and how that can be used.

  • PDF

Real Estate Asset NFT Tokenization and FT Asset Portfolio Management (부동산 유동화 NFT와 FT 분할 거래 시스템 설계 및 구현)

  • Young-Gun Kim;Seong-Whan Kim
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.9
    • /
    • pp.419-430
    • /
    • 2023
  • Currently, NFTs have no dominant application except for the proof of ownership for digital content, and it also have small liquidity problem, which makes their price difficult to predict. Real estate usually has very high barriers to investment due to its high pricing. Real estate can be converted into NFTs and also divided into small value fungible tokens (FTs), and it can increase the the volume of the investor community due to more liquidity and better accessibility. In this document, we implement and design a system that allows ordinary users can invest on high priced real estate utilizing Black Litterman (BL) model-based Portfolio investment interface. To this end, we target a set of real estates pegged as collateral and issue NFT for the collateral using blockchain. We use oracle to get the current real estate information and to monitor varying real estate prices. After tokenizing real estate into NFTs, we divide the NFTs into easily accessible price FTs, thereby, we can lower prices and provide large liquidity with price volatility limited. In addition, we also implemented BL based asset portfolio interface for effective portfolio composition for investing in multiple of real estates with small investments. Using BL model, investors can fix the asset portfolio. We implemented the whole system using Solidity smart contracts on Flask web framework with public data portals as oracle interfaces.

A Study on Open Source Version and License Detection Tool (오픈소스 버전 및 라이선스 탐지 도구에 관한 연구)

  • Ki-Hwan Kim;Seong-Cheol Yoon;Su-Hyun Kim;Im-Yeong Lee
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.7
    • /
    • pp.299-310
    • /
    • 2024
  • Software is expensive, labor-intensive, and time-consuming to develop. To solve this problem, many organizations turn to publicly available open source, but they often do so without knowing exactly what they're getting into. Older versions of open source have various security vulnerabilities, and even when newer versions are released, many users are still using them, exposing themselves to security threats. Additionally, compliance with licenses is essential when using open source, but many users overlook this, leading to copyright issues. To solve this problem, you need a tool that analyzes open source versions, vulnerabilities, and license information. Traditional Blackduck provide a wealth of open source information when you request the source code, but it's a heavy lift to build the environment. In addition, Fossology extracts the licenses of open source, but does not provide detailed information such as versions because it does not have its own database. To solve these problems, this paper proposes a version and license detection tool that identifies the open source of a user's source code by measuring the source code similarity, and then detects the version and license. The proposed method improves the accuracy of similarity over existing source code similarity measurement programs such as MOSS, and provides users with information about licenses, versions, and vulnerabilities by analyzing each file in the corresponding open source in a web-based lightweight platform environment. This solves capacity issues such as BlackDuck and the lack of open source details such as Fossology.

Multi-Category Sentiment Analysis for Social Opinion Related to Artificial Intelligence on Social Media (소셜 미디어 상에서의 인공지능 관련 사회적 여론에 대한 다 범주 감성 분석)

  • Lee, Sang Won;Choi, Chang Wook;Kim, Dong Sung;Yeo, Woon Young;Kim, Jong Woo
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.4
    • /
    • pp.51-66
    • /
    • 2018
  • As AI (Artificial Intelligence) technologies have been swiftly evolved, a lot of products and services are under development in various fields for better users' experience. On this technology advance, negative effects of AI technologies also have been discussed actively while there exists positive expectation on them at the same time. For instance, many social issues such as trolley dilemma and system security issues are being debated, whereas autonomous vehicles based on artificial intelligence have had attention in terms of stability increase. Therefore, it needs to check and analyse major social issues on artificial intelligence for their development and societal acceptance. In this paper, multi-categorical sentiment analysis is conducted over online public opinion on artificial intelligence after identifying the trending topics related to artificial intelligence for two years from January 2016 to December 2017, which include the event, match between Lee Sedol and AlphaGo. Using the largest web portal in South Korea, online news, news headlines and news comments were crawled. Considering the importance of trending topics, online public opinion was analysed into seven multiple sentimental categories comprised of anger, dislike, fear, happiness, neutrality, sadness, and surprise by topics, not only two simple positive or negative sentiment. As a result, it was found that the top sentiment is "happiness" in most events and yet sentiments on each keyword are different. In addition, when the research period was divided into four periods, the first half of 2016, the second half of the year, the first half of 2017, and the second half of the year, it is confirmed that the sentiment of 'anger' decreases as goes by time. Based on the results of this analysis, it is possible to grasp various topics and trends currently discussed on artificial intelligence, and it can be used to prepare countermeasures. We hope that we can improve to measure public opinion more precisely in the future by integrating empathy level of news comments.

Empirical Analysis on Bitcoin Price Change by Consumer, Industry and Macro-Economy Variables (비트코인 가격 변화에 관한 실증분석: 소비자, 산업, 그리고 거시변수를 중심으로)

  • Lee, Junsik;Kim, Keon-Woo;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.2
    • /
    • pp.195-220
    • /
    • 2018
  • In this study, we conducted an empirical analysis of the factors that affect the change of Bitcoin Closing Price. Previous studies have focused on the security of the block chain system, the economic ripple effects caused by the cryptocurrency, legal implications and the acceptance to consumer about cryptocurrency. In various area, cryptocurrency was studied and many researcher and people including government, regardless of country, try to utilize cryptocurrency and applicate to its technology. Despite of rapid and dramatic change of cryptocurrencies' price and growth of its effects, empirical study of the factors affecting the price change of cryptocurrency was lack. There were only a few limited studies, business reports and short working paper. Therefore, it is necessary to determine what factors effect on the change of closing Bitcoin price. For analysis, hypotheses were constructed from three dimensions of consumer, industry, and macroeconomics for analysis, and time series data were collected for variables of each dimension. Consumer variables consist of search traffic of Bitcoin, search traffic of bitcoin ban, search traffic of ransomware and search traffic of war. Industry variables were composed GPU vendors' stock price and memory vendors' stock price. Macro-economy variables were contemplated such as U.S. dollar index futures, FOMC policy interest rates, WTI crude oil price. Using above variables, we did times series regression analysis to find relationship between those variables and change of Bitcoin Closing Price. Before the regression analysis to confirm the relationship between change of Bitcoin Closing Price and the other variables, we performed the Unit-root test to verifying the stationary of time series data to avoid spurious regression. Then, using a stationary data, we did the regression analysis. As a result of the analysis, we found that the change of Bitcoin Closing Price has negative effects with search traffic of 'Bitcoin Ban' and US dollar index futures, while change of GPU vendors' stock price and change of WTI crude oil price showed positive effects. In case of 'Bitcoin Ban', it is directly determining the maintenance or abolition of Bitcoin trade, that's why consumer reacted sensitively and effected on change of Bitcoin Closing Price. GPU is raw material of Bitcoin mining. Generally, increasing of companies' stock price means the growth of the sales of those companies' products and services. GPU's demands increases are indirectly reflected to the GPU vendors' stock price. Making an interpretation, a rise in prices of GPU has put a crimp on the mining of Bitcoin. Consequently, GPU vendors' stock price effects on change of Bitcoin Closing Price. And we confirmed U.S. dollar index futures moved in the opposite direction with change of Bitcoin Closing Price. It moved like Gold. Gold was considered as a safe asset to consumers and it means consumer think that Bitcoin is a safe asset. On the other hand, WTI oil price went Bitcoin Closing Price's way. It implies that Bitcoin are regarded to investment asset like raw materials market's product. The variables that were not significant in the analysis were search traffic of bitcoin, search traffic of ransomware, search traffic of war, memory vendor's stock price, FOMC policy interest rates. In search traffic of bitcoin, we judged that interest in Bitcoin did not lead to purchase of Bitcoin. It means search traffic of Bitcoin didn't reflect all of Bitcoin's demand. So, it implies there are some factors that regulate and mediate the Bitcoin purchase. In search traffic of ransomware, it is hard to say concern of ransomware determined the whole Bitcoin demand. Because only a few people damaged by ransomware and the percentage of hackers requiring Bitcoins was low. Also, its information security problem is events not continuous issues. Search traffic of war was not significant. Like stock market, generally it has negative in relation to war, but exceptional case like Gulf war, it moves stakeholders' profits and environment. We think that this is the same case. In memory vendor stock price, this is because memory vendors' flagship products were not VRAM which is essential for Bitcoin supply. In FOMC policy interest rates, when the interest rate is low, the surplus capital is invested in securities such as stocks. But Bitcoin' price fluctuation was large so it is not recognized as an attractive commodity to the consumers. In addition, unlike the stock market, Bitcoin doesn't have any safety policy such as Circuit breakers and Sidecar. Through this study, we verified what factors effect on change of Bitcoin Closing Price, and interpreted why such change happened. In addition, establishing the characteristics of Bitcoin as a safe asset and investment asset, we provide a guide how consumer, financial institution and government organization approach to the cryptocurrency. Moreover, corroborating the factors affecting change of Bitcoin Closing Price, researcher will get some clue and qualification which factors have to be considered in hereafter cryptocurrency study.