• Title/Summary/Keyword: 파일 공유

Search Result 506, Processing Time 0.029 seconds

Development of Win32 API Message Authorization System for Windows based Application Provision Service (윈도우 기반 응용프로그램 제공 서비스를 위한 Win32 API 메시지 인가 시스템의 개발)

  • Kim, Young-Ho;Jung, Mi-Na;Won, Yong-Gwan
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.47-54
    • /
    • 2004
  • The growth of computer resource and network speed has increased requests for the use of remotely located computer systems by connecting through computer networks. This phenomenon has hoisted research activities for application service provision that uses server-based remote computing paradigm. The server-based remote computing paradigm has been developed as the ASP (Application Service Provision) model, which provides remote users through application sharing protocol to application programs. Security requirement such as confidentiality, availability, integrity should be satisfied to provide ASP service using centralized computing system. Existing Telnet or FTP service for a remote computing systems have satisfied security requirement by a simple access control to files and/or data. But windows-based centralized computing system is vulnerable to confidentiality, availability, integrity where many users use the same application program installed in the same computer. In other words, the computing system needs detailed security level for each user different from others, such that only authorized user or group of users can run some specific functional commands for the program. In this paper, we propose windows based centralized computing system that sets security policies for each user for the use of instructions of the application programs, and performs access control to the instructions based on the security policies. The system monitors all user messages which are executed through graphical user interface by the users connecting to the system. Ail Instructions, i.e. messages, for the application program are now passed to authorization process that decides if an Instruction is delivered to the application program based on the pre-defined security polices. This system can be used as security clearance for each user for the shared computing resource as well as shared application programs.

Implementation of File Security Module Using on Windows (윈도우즈 기반 파일 보안 모듈 설계 및 구현)

  • Sung Kyung;Yoon Ho-gun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.2 s.34
    • /
    • pp.105-112
    • /
    • 2005
  • As the development of information telecommunication technology and thus the information sharing and opening is accelerated, If system is exposed to various threatener and the avrious security incident is rasing its head with social problem. As countermeasure, to protect safely and prepare in the attack for a system from a be latent security threat, various security systems are been using such as IDS, Firewall, VPN etc.. But, expertise or expert is required to handle security system. The module, implemented in this paper, is based on Windows XP, like Linux and Unix, and has effect integrity and non-repudiation for a file.

  • PDF

A Study of Communications Security by Using Key Generation and File Encryption (파일 암호화와 키 생성을 이용한 통신보안 연구)

  • Lee, Jae-Hyun;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.316-319
    • /
    • 2010
  • File security is typically protected by encryption methods. The development of a network environment, such as the Internet according to the sharing of information between systems become commonplace, while providing convenience to users, individuals or organizations that facilitate access to sensitive information caused by hacking the system to attack the rapidly growing is a trend. This paper is the latest generation file system caused by the hacking attacks on the Sniffing for users using file encryption and key generation, Packet Sniffing Tool IP and data through the analysis are discussed. Through this study, the importance of protecting personal information by imprinting Proactive in the hacking incident, and what users will contribute to increase the level of security awareness.

  • PDF

Development of Open Platform for collecting and classifying animal sounds (동물 소리 수집 및 분류를 위한 오픈 플랫폼 개발)

  • Jung, Seungwon;Kim, Chung-Il;Moon, Jihoon;Hwang, Eenjun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.839-841
    • /
    • 2018
  • 인공지능 기술을 활용하여 동물 소리를 분석하고 그 종을 구별하는 기술은 지역의 야생동물 현황 파악이나 생태계 조사 등에 효과적으로 사용될 수 있다. 인공지능 기술을 활용하기 위해서는 많은 동물 소리 샘플이 필요하지만, 현재 그러한 데이터는 녹음 환경이 고도화되어 있는 상용 DB나 전문가 DB 형태로 존재한다. 이러한 데이터만을 학습한 인공지능의 경우 실제 환경에서 녹음된 동물 소리를 식별하는 데 많은 어려움이 예상된다. 따라서 본 논문에서는 다양한 동물 소리를 수집하기 위해 동물 관련 전문가나 일반 사용자 모두 자유롭게 사용할 수 있는 동물 울음소리 수집과 분류를 위한 오픈 플랫폼을 제안한다. 플랫폼에 업로드된 소리 파일은 인공지능의 학습 데이터로 사용하며, 이 인공지능은 사용자에게 소리 파일을 분석한 결과로 해당 동물종과 그에 대한 다양한 생태정보를 제공하고 부가적으로 지역별 동물 통계 및 소리 파일에서의 소리 구간 추출, 소리 파일 공유 등 다양한 기능을 제공한다.

Development of an Efficient DTD about Students' XML Documents and Implementation of a System Generating XML Document (학생 정보 XML 파일의 효율적 활용을 위한 DTD 개발 및 XML 문서 표현 시스템 구현)

  • Lee, Eun-Kyung;Kim, Jong-Jin;Kim, Jong-Hoon
    • Journal of The Korean Association of Information Education
    • /
    • v.6 no.1
    • /
    • pp.30-41
    • /
    • 2002
  • The purpose of this thesis is to develop a standard for drawing up DTD files and making them about information of students easily. By projecting DTD and embodying a file generator which can generate XML files about information of students, we can have good effects as follows. We can share information about the management of students to correspond to big changes of circumstance in education of school caused by the advent of computers and webs. Teachers can lesson their work and have a chance to devote themselves to teaching. DTD for making XML files about information of students was designed on the basis of the spirit of the 7th school curriculum. We can give and receive same kinds of information about students from school to school.

  • PDF

A Framework for the IFC Interoperability Test Method to Support BIM (BIM 지원을 위한 IFC모델 호환성 검사 방법에 관한 기초 연구)

  • Kang, Hoon-Sig;Lee, Ghang;Shin, Yun-Ah
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2008.11a
    • /
    • pp.674-677
    • /
    • 2008
  • The Architecture, engineering, & construction (AEC) industry domains have grown more complex and larger, BIM is a digital representation of a building to facilitate the exchange and development of construction information integration and interoperability. Industry Foundation Classes (IFCs), under development by International Alliance for Interoperability (IAI), represent the part of buildings or elements of a process. IFC has been adopted as a central information repository in order to deliver integrated building information. Other BIM software could open the IFC file, recognize standard objects such as walls, window, and doors as building components. The IFC standard is generally agreed to be of high quality and is widely implemented in software. However, sometimes, information distortion or information toss occurrs during information exchang. The IAI Model Support Group (IAI-MSG) offers the opportunity to certify IFC-compliant applications based on a structuralized approach. However, IFC interoperability error also have occurred by using certificated tools. As project participants exchange BIM information by using BIM software they will need a reliable and efficient exchange of information. In this paper, previous interoperability tests were analyzed, and we propose a new concept in interoperability test.

  • PDF

Instagram Users Behavior Analysis in a Digital Forensic Perspective (디지털 포렌식 관점에서의 인스타그램 사용자 행위 분석)

  • Seo, Seunghee;Kim, Yeog;Lee, Changhoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.407-416
    • /
    • 2018
  • Instagram is a Social Network Service(SNS) that has recently become popular among people of all ages and it makes people to construct social relations and share hobbies, daily routines, and useful information. However, since the uploaded information can be accessed by arbitrary users and it is easily shared with others, frauds, stalking, misrepresentation, impersonation, an infringement of copyright and malware distribution are reported. For this reason, it is necessary to analyze Instagram from a view of digital forensics but the research involved is very insufficient. So in this paper, We performed reverse engineering and dynamic analysis of Instagram from a view of digital forensics in the Android environment. As a result, we checked three database files that contain user behavior analysis data such as chat content, chat targets, posted photos, and cookie information. And we found the path to save 4 files and the xml file to save various data. Also we propose ways to use the above results in digital forensics.

A Study on Copyright Infringement over Online Streaming Services by Reconstructing Web Cache (웹 브라우저 캐시 재조립을 통한 온라인 스트리밍 서비스 상의 저작권 침해 가능성에 관한 연구)

  • Lim, Yirang;Chung, Hyunji;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.559-572
    • /
    • 2020
  • As internet technology advances, users can share content online, and many sharing services exist. According to a recently published digital forensic study, when playing an online streaming service, you can restore the played video by reconstructing the Chrome cache file left on local device such as a PC. This can be seen as evidence that the user watched illegal video content. From a different point of view, copyright infringement occurs when a malicious user restores video stream and share it to another site. In this paper, we selected 23 online streaming services that are widely used both at home and abroad. After streaming videos, we tested whether we can recover original video using cache files stored on the PC or not. As a result, the paper found that in most sites we can restore the original video by reconstructing cache files. Furthermore, this study also discussed methodologies for preventing copyright infringement in online streaming service.

Design and Implementation of a Blockchain System for Storing BIM Files in a Distributed Network Environment

  • Seo, Jungwon;Ko, Deokyoon;Park, Sooyong;Kim, Seong-jin;Kim, Bum-Soo;Kim, Do Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.159-168
    • /
    • 2021
  • Building Information Modeling (BIM) data is a digitized construction design by worldwide construction design stands rules. Some research are being conducted to utilize blockchain for safe sharing and trade of BIM data, but there is no way to store BIM data directly in the blockchain due to the size of BIM data and technical limitation of the blockchain. In this paper, we propose a method of storing BIM data by combining a distributed file system and a blockchain. We propose two network overlays for storing BIM data, and we also propose generating the Level of Detail (LOD)-based merkle tree for efficient verification of BIM data. In addition, this paper proposes a system design for distributed storage of BIM data by using blockchain besu client and IPFS client. Our system design has a result that the processing speed stably increased despite the increase in data size.

Performance Improvement of Parallel Processing System through Runtime Adaptation (실행시간 적응에 의한 병렬처리시스템의 성능개선)

  • Park, Dae-Yeon;Han, Jae-Seon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.7
    • /
    • pp.752-765
    • /
    • 1999
  • 대부분 병렬처리 시스템에서 성능 파라미터는 복잡하고 프로그램의 수행 시 예견할 수 없게 변하기 때문에 컴파일러가 프로그램 수행에 대한 최적의 성능 파라미터들을 컴파일 시에 결정하기가 힘들다. 본 논문은 병렬 처리 시스템의 프로그램 수행 시, 변화하는 시스템 성능 상태에 따라 전체 성능이 최적화로 적응하는 적응 수행 방식을 제안한다. 본 논문에서는 이 적응 수행 방식 중에 적응 프로그램 수행을 위한 이론적인 방법론 및 구현 방법에 대해 제안하고 적응 제어 수행을 위해 프로그램의 데이타 공유 단위에 대한 적응방식(적응 입도 방식)을 사용한다. 적응 프로그램 수행 방식은 프로그램 수행 시 하드웨어와 컴파일러의 도움으로 프로그램 자신이 최적의 성능을 얻을 수 있도록 적응하는 방식이다. 적응 제어 수행을 위해 수행 시에 병렬 분산 공유 메모리 시스템에서 프로세서 간 공유될 수 있은 데이타의 공유 상태에 따라 공유 데이타의 크기를 변화시키는 적응 입도 방식을 적용했다. 적응 입도 방식은 기존의 공유 메모리 시스템의 공유 데이타 단위의 통신 방식에 대단위 데이타의 전송 방식을 사용자의 입장에 투명하게 통합한 방식이다. 시뮬레이션 결과에 의하면 적응 입도 방식에 의해서 하드웨어 분산 공유 메모리 시스템보다 43%까지 성능이 개선되었다. Abstract On parallel machines, in which performance parameters change dynamically in complex and unpredictable ways, it is difficult for compilers to predict the optimal values of the parameters at compile time. Furthermore, these optimal values may change as the program executes. This paper addresses this problem by proposing adaptive execution that makes the program or control execution adapt in response to changes in machine conditions. Adaptive program execution makes it possible for programs to adapt themselves through the collaboration of the hardware and the compiler. For adaptive control execution, we applied the adaptive scheme to the granularity of sharing adaptive granularity. Adaptive granularity is a communication scheme that effectively and transparently integrates bulk transfer into the shared memory paradigm, with a varying granularity depending on the sharing behavior. Simulation results show that adaptive granularity improves performance up to 43% over the hardware implementation of distributed shared memory systems.