• Title/Summary/Keyword: 파일공유

Search Result 505, Processing Time 0.027 seconds

A Study on Software Development and Legal Regulation (소프트웨어 개발과 법적규제)

  • Kim, Hyung-Man
    • Journal of Digital Convergence
    • /
    • v.9 no.5
    • /
    • pp.11-20
    • /
    • 2011
  • Internet users and copyright holder have been at the center of a severe legal dispute because file-sharing soft (P2P) through Napster aggravates the violation of copyright as well as takes on the world. Though it is natural that we should hold users a criminal penalty for the illegal use of various computer programs, I think that if the supply of a computer program is generally within a circle of development act, program developer ought not to hold users criminally liable for the unintended illegal act of users. Two main issues are addressed in this work: (i) the basis and validity of legal responsibility and condemnation that appear in the precedent set as to P2P in America, Japan, and Korea. (ii) the necessity of both scientific technology development and efficient legal regulation of copyright holder. For this purpose, software development and legal regulation are reviewed analyzed from viewpoint of the criminal law.

User Study for Legalization of Pirate Comics Market (만화 온라인 불법복제물 시장의 양성화를 위한 이용자 연구)

  • Hwang, Sun Tae;Jin Jeon, Eun-Young
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.5
    • /
    • pp.550-559
    • /
    • 2015
  • Despite of the long history of comic industry in Korea, self-motivated sound ecosystem is not determinded due to the pirated contents. The file-sharing literature has focused mainly on how pirated contents could be eradicated, with less attention to the effective strategy. This research is focusing more on pirate comic market within the framework of users. The target user is people who pay for using file sharing site. The research methods are a online survey and a written interview. The goal of this research is to analyze the correlation between morality and websites uses, the user convenience of file-sharing site and the main factors for attracting user to legal portal site. According to our results, legal portal sites needs to improve purchasing factors such as diversity of contents, improvement of payment system and offer of a detailed information.

A Design and Implementation of a Wireless Audio Sharing (WASH) System (Wireless Audio Sharing (WASH) 시스템 설계 및 구현)

  • Son, Ji-Yeon;Kim, Myung-Gyu;Yang, Il-Sik;Park, Jun-Seok
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.2
    • /
    • pp.139-148
    • /
    • 2006
  • Recently with the advancement of local wireless communication technologies, digital trends of audio contents and devices are paving the way for new experiences to network-based audio streaming services. In this paper, we present the Wireless Audio Sharing (WASH) technology over Bluetooth and Wireless Local Area Network (WLAN). WASH system provides an audio sharing mechanism over multiple users and also provides stereo audio streaming between Bluetooth-enabled devices and Universal Plug and Play (UPnP) media devices connected to wired/wireless LANs. To achieve these, we extended the Bluetooth audio distribution profile and combined the extended profile with the UPnP AV architecture. With the implementation of this WASH technology, we show some experimental results of the stereo audio streaming in a real environment.

A Design and Implementation of Application Profile Core Ontology (응용프로파일 코어 온톨로지 설계 및 구현)

  • Han, Sung-Kook;Lee, Hyun-Sil
    • Journal of the Korean Society for information Management
    • /
    • v.24 no.3
    • /
    • pp.245-269
    • /
    • 2007
  • The standard metadata systems are very popular for the description of structures and semantics of information resources to realize sharing and exchanging information in global ubiquitous environment. In real application domain, various metadata elements are reused together with mix-and-match manner. An application system using diverse metadata systems is compelled with refinement and interoperability of metadata elements. Application profile is the general approach to resolve the various problems occurred in metadata application systems. This paper proposes Application Profile Core Ontology (APO) that can achieve the goals and functions of application profile, and describes metadata application system based on APO.

Implementation of file Access Control Module Using on Windows XP (윈도우 XP 기반의 파일 정책 모듈 설계 및 구현)

  • 성경
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.6
    • /
    • pp.1204-1211
    • /
    • 2004
  • As the development of information telecommunication technology and thus the information sharing and opening is accelerated, f system is exposed to various threatener and the avrious security incident is rasing its head with social problem. As countermeasure, to protect safely and prepare in the attack for a system from a be latent security threat, various security systems are been using such as IDS, Firewall, VPN etc.. But, expertise or expert is required to handle security system. The module, implemented in this paper, is based on Windows XP, like Linux and Unix, and has effect integrity and non-repudiation for a file.

Design and Implementation of File Access Control Module Based on Multi-Operating System (멀티 운영체제 기반의 파일 접근 제어 모듈 설계 및 구현)

  • Soh, Woo-Young
    • Convergence Security Journal
    • /
    • v.7 no.4
    • /
    • pp.123-131
    • /
    • 2007
  • Recently, various threat and security incident are occurred for unspecified individuals, and this problem increases as the rapid of information sharing through Internet. The using of Information Security System such as IDS, Firewall, VPN etc. makes this problem minimal. However, professional knowledge or skill is needed in that case, normal user can't operate the Information Security System. This paper designs and implements File Access Control Module(FACM) to use easily for normal user against malicious threats and attacks. The FACM can exclude from malicious threats and attacks based on operation system rather than detection of threats and attacks. The FACM is working not only Windows System but also Linux System, and the FACM has effect on access control, integrity and non-repudiation for a file with an access control over files on the each OS that are used by multi-user.

  • PDF

A Method to Manage Local Storage Capacity Using Data Locality Mechanism (데이터 지역성 메커니즘을 이용한 지역 스토리지 용량 관리 방법)

  • Kim, Baul;Ku, Mino;Min, Dugki
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.324-327
    • /
    • 2013
  • Recently, due to evolving cloud computing technology, we can easily and transparently utilize both local computing resource and remote computing resource in real life. Especially, enhancing smart device technologies and network infrastructures promote an increase of needs to share files between local smart devices and cloud storages. However, since smart devices have a limited storage space, storing files on cloud storage causes a starvation problem of local storage. It means that users can face a storage-lack problem even a cloud storage service provide a huge file storing space. In this research, we propose a method to manage files between smart devices and cloud storages. Our approach calculate file usage pattern based on recently used date, and then this approach determines local files being migrated. As a result, our approach is sufficient for handling data synchronization between big data storage farm and local thin client which contains limited storage space.

  • PDF

Android Application Call Relationship Analysis Based on DEX and ELF Binary Reverse Engineering (DEX와 ELF 바이너리 역공학 기반 안드로이드 어플리케이션 호출 관계 분석에 대한 연구)

  • Ahn, Jinung;Park, Jungsoo;Nguyen-Vu, Long;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.45-55
    • /
    • 2019
  • DEX file and share objects (also known as the SO file) are important components that define the behaviors of an Android application. DEX file is implemented in Java code, whereas SO file under ELF file format is implemented in native code(C/C++). The two layers - Java and native can communicate with each other at runtime. Malicious applications have become more and more prevalent in mobile world, they are equipped with different evasion techniques to avoid being detected by anti-malware product. To avoid static analysis, some applications may perform malicious behavior in native code that is difficult to analyze. Existing researches fail to extract the call relationship which includes both Java code and native code, or can not analyze multi-DEX application. In this study, we design and implement a system that effectively extracts the call relationship between Java code and native code by analyzing DEX file and SO file of Android application.

A Study on Pieces Selection Technique in BitTorrent (BitTorrent에서 Pieces Selection 기법에 대한 연구)

  • Kim, Dong-Jin;Yoon, Ji-Yean;Moon, Il-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.286-288
    • /
    • 2012
  • 파일 공유를 위해 널리 사용되는 BitTorrent는 대표적인 P2P 프로토콜이다. BitTorrent는 전송을 요구한 클라이언트가 작은 단위로 쪼개진 하나의 파일을 다수의 클라이언트들로부터 받는 방식으로 기존의 일대일 P2P 전송방식에 대비하여 빠른 다운로드 속도를 낼 수 있다. 이러한 다운로드 성능을 발휘하기위해 다수의 조각으로 분리 된 파일 조각을 선택하는 Pieces Selection 기법은 매우 중요하다. 이에 본 논문에서는 BitTorrent에서 활용되는 네 가지의 Pieces Selection 기법에 대해 알아보고, 성능 개선을 위한 새로운 기법을 제안한다.

  • PDF

Design and Implementation of Global Buffer Manager for SAN Shared File (SAN 환경에서의 공유파일 시스템을 위한 광역 버퍼관리기의 설계 및 구현)

  • 이경록;김은경;정병수
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.79-81
    • /
    • 2002
  • 최근에는 ATM, Fast Switched LAN, Fiber Channel과 같은 고속의 네트워크의 발달로 인해 분산 환경의 네트워크 파일 시스템에서 디스크를 접근하는 속도보다 원격지 클라이언트의 메모리를 접근하는 속도가 현저하게 증가되었다. 실제로 이와 같은 고속 네트워크 환경을 기반으로 하여 각 서버와 저장 장치를 분리하여 대용량 데이터를 관리하는 SAN(Storage Area Network)과 같은 새로운 네트워크 저장 시스템이 출연하고 있다. 본 논문에서는 이와 같은 새로운 분산 네트워크 파일 저장 시스템 환경에서 필수적으로 고려되어야 하는 광역 버퍼관리기를 설계 및 구현하였다. 본 논문에서 구현된 광역 버퍼 관리기는 크게 데이터 룩업과 버퍼리스트 관리 부분으로 나누어 구성되어 있으며, 이를 위한 적절한 자죠 구조와 시스템 내에 있는 각 호스트간의 버퍼블록정보 유지를 위한 방안 및 기존 운영체제의 커널내 버퍼 관리기와 통합하는 방안을 제시한다.

  • PDF