• 제목/요약/키워드: Application deployment

검색결과 306건 처리시간 0.024초

안전한 모바일 클라우드 컴퓨팅을 위한 ID 관리 시스템 (A Secure Identity Management System for Secure Mobile Cloud Computing)

  • ;이경현
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2014년도 추계학술발표대회
    • /
    • pp.516-519
    • /
    • 2014
  • Cloud computing is an up-and-coming paradigm shift transforming computing models from a technology to a utility. However, security concerns related to privacy, confidentiality and trust are among the issues that threaten the wide deployment of cloud computing. With the advancement of ubiquitous mobile-based clients, the ubiquity of the model suggests a higher integration in our day to day life and this leads to a rise in security issues. To strengthen the access control of cloud resources, most organizations are acquiring Identity Management Systems (IDM). This paper presents one of the most popular IDM systems, specifically OAuth, working in the scope of Mobile Cloud Computing which has many weaknesses in its protocol flow. OAuth is a Delegated Authorization protocol, and not an Authentication protocol and this is where the problem lies. This could lead to very poor security decisions around authentication when the basic OAuth flow is adhered to. OAuth provides an access token to a client, so that it can access a protected resource, based on the permission of the resource owner. Many researchers have opted to implement OpenlD alongside OAuth so as to solve this problem. But OpenlD similarly has several security flows. This paper presents scenarios of how insecure implementations of OAuth can be abused maliciously. We incorporate an authentication protocol to verify the identities before authorization is carried out.

ASP 서비스의 전략개발방법론에 관한 연구: 기업 네트워크화 사례 (A Study on Methodology for Strategy Development of ASP Service: A Case Study of Small Company Informatization)

  • 홍종의;이윤미;서의호
    • Asia pacific journal of information systems
    • /
    • 제16권3호
    • /
    • pp.177-192
    • /
    • 2006
  • Following the idea of "what you measure is what you get," this paper discusses the necessity to improve the plan and management of Application Service Provider (ASP) service based on performance evaluation. The Balanced Scorecard (BSC) has been used as a tool for suggesting the measures that can evaluate performance of a company by considering both financial and non-financial perspectives. The current BSC does not provide techniques to formally define, verify, implement and analyze the performance measures of ASP. Therefore, we developed a methodology for strategy development of ASP service by analyzing the BSC performance measures. This methodology provides a strategy for improving ASP service. The methodology proposed in this paper provide executives with core parts for achieving vision as well as the corresponding interpretation model for developing strategy. The methodology consists of the following two phases: BSC and Importance-Performance Analysis (IPA) phase. The methodology is illustrated through a case study in each phase. The case study shows practical deployment of our methodology.

헬스캐어 시스템에서의 사물 인터넷 통신을 위한 보안 문제 분석 (Analyses of Security Issues for Internet of Things in Healthcare Application)

  • 신윤구;김한규;김수진;김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2014년도 추계학술대회
    • /
    • pp.699-700
    • /
    • 2014
  • The use of Radio Frequency Identification technology (RFID) in medical context enables not only drug identification, but also a rapid and precise identification of patients, physicians, nurses or any other healthcare giver. The combination of RFID tag identification with structured and secured Internet of Things (IoT) solutions enables ubiquitous and easy access to medical related records, while providing control and security to all interactions. This paper defines a basic security architecture, easily deployable on mobile platforms, which would allow to establish and manage a medication prescription service in mobility context making use of electronic Personal Health Records. This security architecture is aimed to be used with a mobile e-health application (m-health) through a simple and intuitive interface, supported by RFID technology. This architecture, able to support secured and authenticated interactions, will enable an easy deployment of m-health applications. The special case of drug administration and ubiquitous medication control system, along with the corresponding Internet of Things context, is presented.

  • PDF

A PLANNING MODEL FOR APARTMENT DEVELOPMENT PROJECT REFLECTING CLIENT REQRUIREMENTS

  • Yoo-Shin Kim;Ye-Keun Oh;Jae-Jun Kim
    • 국제학술발표논문집
    • /
    • The 1th International Conference on Construction Engineering and Project Management
    • /
    • pp.774-779
    • /
    • 2005
  • Client requirements is a concept with increasing interest in relation to several outcomes of companies, and in particular, in the event of apartment project that takes large share in the domestic construction industry, diverse angle of survey is performed to discover the client requirements and reflect them to the project to improve the quality. For this purpose, it is required to learn the client requirements and apply it in the apartment project, and the QFD (Quality Function Deployment) linked ROQ (Return On Quality) is a technique used in the manufacturing that surveys the client requirements to improve the customer satisfaction, and apply it to the quality improvement program to improve the profitability in this process. In this study, through the application of the ROQ process, the plan to improve the apartment quality management is presented. For this purpose, the consumer interview survey, FGI (focus group interview) survey and the client requirements are analyzed, and thereafter, through the interview with the specialist, the quality improvement program that enables the application to the product development of new apartment product is established. Through this process, the new apartment quality management improvement plan is presented.

  • PDF

Review on Energy Efficient Clustering based Routing Protocol

  • Kanu Patel;Hardik Modi
    • International Journal of Computer Science & Network Security
    • /
    • 제23권10호
    • /
    • pp.169-178
    • /
    • 2023
  • Wireless sensor network is wieldy use for IoT application. The sensor node consider as physical device in IoT architecture. This all sensor node are operated with battery so the power consumption is very high during the data communication and low during the sensing the environment. Without proper planning of data communication the network might be dead very early so primary objective of the cluster based routing protocol is to enhance the battery life and run the application for longer time. In this paper we have comprehensive of twenty research paper related with clustering based routing protocol. We have taken basic information, network simulation parameters and performance parameters for the comparison. In particular, we have taken clustering manner, node deployment, scalability, data aggregation, power consumption and implementation cost many more points for the comparison of all 20 protocol. Along with basic information we also consider the network simulation parameters like number of nodes, simulation time, simulator name, initial energy and communication range as well energy consumption, throughput, network lifetime, packet delivery ration, jitter and fault tolerance parameters about the performance parameters. Finally we have summarize the technical aspect and few common parameter must be fulfill or consider for the design energy efficient cluster based routing protocol.

EPON의 무선네트워크 적용 및 핸드오버 알고리즘 (Application of EPON to Wireless Network and Handover Algorithm)

  • 조원국;정준회;박재욱;최병철;박영일
    • 한국통신학회논문지
    • /
    • 제32권7A호
    • /
    • pp.666-671
    • /
    • 2007
  • 차세대 무선망의 인프라 구조로써 현재 광가입자망에 적용되고 있는 EPON의 사용을 제안하였다. 제안된 구조는 광파이버 설치비용을 크게 줄일 수 있고, 그룹 셀 개념을 도입하여 핸드오버 지연시간의 주 발생원인 3계층 핸드오버의 발생 횟수를 대폭 줄일 수 있다. 본 연구에서는 EPON의 특성을 활용한 2계층 Fast 핸드오버 알고리즘을 제안하였고, 이 때 핸드오버에 큰 영향을 미치는 제어신호의 지연시간을 시뮬레이션을 통해 평가하였다.

Camera-Module for Mobile-Phone View Point from Module Assembly Maker

  • Muraishi, Hiroaki
    • 한국마이크로전자및패키징학회:학술대회논문집
    • /
    • 한국마이크로전자및패키징학회 2006년도 ISMP 2006
    • /
    • pp.37-45
    • /
    • 2006
  • The mobile-phone which Camera was put on was released at the end of 2000 and dramatically puts up the deployment ratio because not only simple Camera but also a function that the photograph which I took is dispatched was added. It is the force that demand in this year presses 600,000,000 sale of a mobile-phone is estimated to be 960,000,000 of them in 2006, and to be able to include two errands with a support model after 3G. A person of entry to a camera-module appear much. In addition, the various kinds of products open markedly which a product comes to be known widely in the world, and the application range has opened widely, and considered QCDT come to be key issues for answer to market demand. By manufacturing industry, there is peculiar culture to each industry, camera-module is the composition the various industries. The construction of true Supply-chain becomes unavoidable to make a good product. I describe the point that the situation of each supply-chain and the direction for the future by the view point of module assembly maker.

  • PDF

A Modified-AHP Method of Productivity Analysis for Deployment of Innovative Construction Tools on Construction Site

  • Kwon, Soonwook;Lee, Gaeyoung;Ahn, Dooyong;Park, Hee-Sung
    • Journal of Construction Engineering and Project Management
    • /
    • 제4권1호
    • /
    • pp.45-50
    • /
    • 2014
  • Productivity analysis is the most important and significant method for evaluating management and engineering performance during whole project stage. However, it is very difficult in developing qualitative index to construction industry comparing to other industries. Therefore, analytical hierarchy process (AHP) is one of the methods for overcoming these limitations by checking consistency index using duality comparison. In this study, it is scraped up an application plan and selection for innovative tools by analyzing survey results on tool users and site managers with respect to using Modified-AHP performance measurement method.

A Forwarding Scheme for (m,k)-firm Streams Based on Local Decision in Wireless Sensor Networks

  • Li, Bijun;Kim, Ki-Il
    • Journal of information and communication convergence engineering
    • /
    • 제9권6호
    • /
    • pp.775-779
    • /
    • 2011
  • As the technology of multimedia sensor networks is desired in large numbers of applications nowadays, real-time service becomes one of the most important research challenges. Even though lots of related works have been conducted to meet this requirement in several ways, the specific traffic model for real-time has not been taken yet. Thus, it causes lack of adaptability of those approaches in real deployment. To solve this problem, in this paper, we model the application via (m,k)-firm streams which have weakly hard real-time property. And then, a novel forwarding scheme based on modified DBP (Distance-Based Priority) is proposed by considering local-DBP and stream DBP together. Local-DBP can contribute to identify the detailed causes of unsatisfied quality, that is, network congestion or wireless link failure. Simulation results reveal that (m,k)-firm is a good traffic model for multimedia sensor networks and the proposed scheme can contribute to guarantee real-time requirement well.

Analyses of Security, Privacy Issues and Challenges for RFID System

  • Kim, Jung-Tae
    • Journal of information and communication convergence engineering
    • /
    • 제9권6호
    • /
    • pp.701-705
    • /
    • 2011
  • RFID is a widely adopted in the field of identification technology these days. Radio Frequency IDentification (RFID) has wide applications in many areas including manufacturing, healthcare, and transportation. Because limited resource RFID tags are used, various risks could threaten their abilities to provide essential services to users. A number of RFID protocols have done by researcher in order to protect against some malicious attacks and threat. Existing RFID protocols are able to resolve a number of security and privacy issues, but still unable to overcome other security & privacy related issues. In this paper, we analyses security schemes and vulnerability in RFID application. Considering this RFID security issues, we survey the security threats and open problems related to issues by means of information security and privacy. Neither a symmetric nor an asymmetric cryptographic deployment is necessarily used with light weighted algorithm in the future.