• Title/Summary/Keyword: IT 기반의 서비스 환경

Search Result 2,372, Processing Time 0.036 seconds

2006년도 TTA 사업 추진내용 및 방향 (표준화부문)

  • Jin, Byeong-Mun
    • TTA Journal
    • /
    • s.103
    • /
    • pp.26-30
    • /
    • 2006
  • IT 기술의 발전과 기술융합의 진전으로 다양한 기술간 표준 경쟁이 치열하게 일어나고 있으며, 이에 따라 이제 표준은 국가경쟁력과 기업의 흥망을 좌우하는 열쇠가 되고 있다. TTA는 이러한 환경변화에 부응하여 IT분야의 표준화 전략수립, 표준의 제개정 및 표준적합성 시험·인증 등「IT 표준화 One-stop 서비스」를 제공하고 있으며, 이를 기반으로 국제표준 선점을 통해 우리나라 정보통신 산업의 성장동력 기반을 구축해 나가고 있다.

  • PDF

JARSIO:Java Remote Service Invocation for OSGI Frameworkto Enhance Inter-Operations of Services on OSGi (OSGi 서비스의 효과적인 외부연동을 위한 자바원격서비스호출 프레임워크)

  • Choi, Jae-Hyun;Park, Jae-Won;Lee, Nam-Yong
    • The KIPS Transactions:PartD
    • /
    • v.16D no.6
    • /
    • pp.935-944
    • /
    • 2009
  • Recently, many researches focus on Ubiquitous Network which comprised various networks for effective service provision. In particular, OSGi proposed by OSGi Alliance is preferred for core infrastructure to establish Ubiquitous Network as it supports integration and inter-operation among various service environments, and dynamic configuration of services. However, OSGi is limited to be used only within local service framework, since OSGi specification does not have any considerations for inter-operations between internal and external services. Thus, in this paper we propose JARSIO(JAva Remote Service Invocation for OSGi) framework which enables the inter-operations of dynamic internal OSGi services and other external services. The proposed framework is based on the TCP/IP protocol, and provides effective mechanisms for the inter-operations of the services.

Reinforcement Learning Approach for Resource Allocation in Cloud Computing (클라우드 컴퓨팅 환경에서 강화학습기반 자원할당 기법)

  • Choi, Yeongho;Lim, Yujin;Park, Jaesung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.4
    • /
    • pp.653-658
    • /
    • 2015
  • Cloud service is one of major challenges in IT industries. In cloud environment, service providers predict dynamic user demands and provision resources to guarantee the QoS to cloud users. The conventional prediction models guarantee the QoS to cloud user, but don't guarantee profit of service providers. In this paper, we propose a new resource allocation mechanism using Q-learning algorithm to provide the QoS to cloud user and guarantee profit of service providers. To evaluate the performance of our mechanism, we compare the total expense and the VM provisioning delay with the conventional techniques with real data.

A Situation Information Model based on Ontology in IoT Environment (IoT 환경에서 온톨로지 기반의 상황정보 모델)

  • Kim, Eunhoe;Suh, Yuhwa
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.5
    • /
    • pp.380-388
    • /
    • 2017
  • The services of the IoT environment should constantly collect situation information, and perform appropriate actions according to the situation. Therefore, there is a need for a method that can express collected situation information. In this paper, we propose a situation information model based on ontology for IoT environment. Since the proposed model is ontology based, it supports semantic interoperability. We also build an upper-level ontology to model common situation information of various IoT domains. It is easy to understand and use because it expresses situation information consistently by expressing person, environment, and thing constituting IoT environment as class and defining properties indicating the situation. In addition, since the situation information need to reflect dynamic situation, it has a feature to model the creation time and the life time of the situation information so as to judge the validity of the information. The proposed ontology model is described using OWL, and the service can be described based on the constructed ontology.

A step-by-step service encryption model based on routing pattern in case of IP spoofing attacks on clustering environment (클러스터링 환경에 대한 IP 스푸핑 공격 발생시 라우팅 패턴에 기반한 단계별 서비스 암호화 모델)

  • Baek, Yong-Jin;Jeong, Won-Chang;Hong, Suk-Won;Park, Jae-Hung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.6
    • /
    • pp.580-586
    • /
    • 2017
  • The establishment of big data service environment requires both cloud-based network technology and clustering technology to improve the efficiency of information access. These cloud-based networks and clustering environments can provide variety of valuable information in real-time, which can be an intensive target of attackers attempting illegal access. In particular, attackers attempting IP spoofing can analyze information of mutual trust hosts constituting clustering, and attempt to attack directly to system existing in the cluster. Therefore, it is necessary to detect and respond to illegal attacks quickly, and it is demanded that the security policy is stronger than the security system that is constructed and operated in the existing single system. In this paper, we investigate routing pattern changes and use them as detection information to enable active correspondence and efficient information service in illegal attacks at this network environment. In addition, through the step-by -step encryption based on the routing information generated during the detection process, it is possible to manage the stable service information without frequent disconnection of the information service for resetting.

A Traceback-Based Authentication Model for Active Phishing Site Detection for Service Users (서비스 사용자의 능동적 피싱 사이트 탐지를 위한 트레이스 백 기반 인증 모델)

  • Baek Yong Jin;Kim Hyun Ju
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.19-25
    • /
    • 2023
  • The current network environment provides a real-time interactive service from an initial one-way information prov ision service. Depending on the form of web-based information sharing, it is possible to provide various knowledge a nd services between users. However, in this web-based real-time information sharing environment, cases of damage by illegal attackers who exploit network vulnerabilities are increasing rapidly. In particular, for attackers who attempt a phishing attack, a link to the corresponding web page is induced after actively generating a forged web page to a user who needs a specific web page service. In this paper, we analyze whether users directly and actively forge a sp ecific site rather than a passive server-based detection method. For this purpose, it is possible to prevent leakage of important personal information of general users by detecting a disguised webpage of an attacker who induces illegal webpage access using traceback information

UI Implementation of an Active Document Based ASLM System (능동문서를 기반으로 하는 SLA 관리 시스템 UI 구현)

  • Lee, Gwang-Il;Kim, Sang-Rak;Bae, Jae-Hak J.;Jang, Gil-Sang
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06b
    • /
    • pp.242-244
    • /
    • 2011
  • 최근 SOA와 클라우드 컴퓨팅 기반의 IT 서비스가 증가함에 따라 정보처리 분야에서 SLA(Service Level Agreement)가 주목을 받고 있다. 통상의 SLA는 종이에 자연언어로 표현되는 것이어서 SLA 체결, SLA 관리나 SLA 기반 정보처리의 자동화가 제한된다. 오늘날과 같은 SOA, 온 디맨드 서비스, 유틸리티 컴퓨팅, 클라우드 컴퓨팅 환경에서는 서비스를 통합 자동관리할 수 있는 기술이 필요하다. 본 논문에서는 능동문서 기반의 ASLM(Active Service Level Managenment)의 계약체결 사용자 인터페이스(UI: User Interface)를 구현하여 일반 문서의 경우와 비교하여 보았다. 그 결과 ASLM의 UI가 SLA 체결, SLA 유지보수 자동화, 그리고 사용자의 편의성에서 SLA 기반의 계약업무 처리에 보다 효과적임을 알 수 있었다.

A Framework for Dynamic Growing of Web Service Applications based on ESB and Agent (웹 서비스 애플리케이션의 동적 성장을 위한 ESB와 에이전트 기반 프레임워크)

  • Lee, Chang-Ho;Kim, Jin-Han;Lee, Jae-Jeong;Lee, Byung-Jeong
    • The KIPS Transactions:PartA
    • /
    • v.14A no.7
    • /
    • pp.409-420
    • /
    • 2007
  • Software adaptation may be required to interact between heterogeneous platforms and to react to rapid change of environment in ubiquitous computing. Web service provides a way to use heterogeneous and distributed services or resources to utilize and organize them. But it is not easy to retrieve appropriate services when we search services because web service lacks of semantic information. Semantic web service provides additional information of services, but it does not support a method to match them in various ways. We can adapt and extend web applications by using web service, but a method for management and administration is still needed. Therefore in this paper, we propose a framework for dynamic growing of web service applications based on ESB(Enterprise Service Bus) and agent and provide a prototype to show its usefulness.

A Study on Authentication Technique based on OSGi Service Platform (OSGi 서비스 플랫폼 기반의 인증 기법에 관한 연구)

  • I, Chang-Uk;Hong, Won-Gi;Chang, Hoon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.387-395
    • /
    • 2009
  • The establishment of security architecture is essential because security vulnerabilities occur such as user's unjustifiable connection for the opened gateway and access to resources without permission in OSGi service platform environment. In this paper, it proposes a authentication technique for an Automatic user authentication which is used the Symmetric Key and the Service bundle authentication to consider the constraints of the hardware in the OSGi service platform environment. Typically, the type of entering a password is used for the user authentication mechanism however OSGi platform environment studies not entering the password but using MAC address and encrypted identifier of the automatic user authentication mechanism because the devices are limited in their input. In this paper, the Symmetric Key is used for bundle authentication mechanism. Therefore operation becomes quick and secure authentication process has been successfully completed by using the time data and a ticket which contains a license. Based on these two different authentication mechanisms, it could eliminate the constraints of resources and improve the convenience of users and administrators. Also it shows an effect from omitting the waiting time to enter a password and reducing operations which need for authentication in the OSGi service platform environment.

A Study on the Healthcare Monitoring System based USN Middleware (USN 미들웨어 기반의 헬스 케어 모니터링 시스템에 대한 연구)

  • Kim, Yei-Chang;Kang, Hae-Sung
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2009.11a
    • /
    • pp.467-472
    • /
    • 2009
  • USN은 하드웨어와 유 무선 통신기술이 서로 네트워크로 연결되어 사물이나 환경의 정보를 획득하고 가공해 유용한 정보로 창출하는 것을 목표로 하고 있으며, 그 중 u-Healthcare는 의료 서비스 질 향상이라는 필요성에 의해 이슈가 되고 있다. 본 논문에서는 이 기종 센서 네트워크에서 획득한 데이터를 추상화하고 상황에 맞는 서비스를 제공하는 지능형 미들웨어를 설계하였다. 설계된 미들웨어를 사회적 이슈가 되고 있는 IT의료 분야에 적용해서 헬스 케어 모니터링 시스템을 구현했다. 센서를 통해 온도, 습도, 조도, 심박 수, 체온을 측정해서 실시간으로 관리하고 모니터링 하는 기능을 지원한다. 또한, 실시간으로 전달되는 바이오 정보를 통합 관리하는 부분에 초점을 맞추어 연구를 진행했다.

  • PDF