• Title/Summary/Keyword: IT 기반의 서비스 환경

Search Result 2,372, Processing Time 0.042 seconds

Development Methodology of Enterprise Applications based on the ISIS (ISIS 기반의 엔터프라이즈 어플리케이션 개발방법)

  • Jo, Eun-Hwan;Lee, Jong-Kook;Lee, Min-Soo;Chang, Young-Chul;Lee, Bong
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2010.05a
    • /
    • pp.529-535
    • /
    • 2010
  • 오늘날의 엔터프라이즈 IT 환경은 비즈니스 요구사항이 빠르게 변하면서 기존 시스템들의 민첩한 대응이 어렵고, 비즈니스 프로세스가 점점 복잡해지면서 시스템 개발 및 제어가 힘든 상황이다. 이 때문에 관리비용은 점점 증가하고 시스템의 수명주기가 단축되면서 전체적인 개발생산성이 낮아지고 있다. 최근 이와 같은 소프트웨어 개발문제를 극복하기 위해서 XP(eXtreme Programming)와 SCRUM 같은 애자일(agile) 방법론이 등장하게 되었고, 점차 대규모의 엔터프라이즈 어플리케이션 개발에 적용할 필요성이 대두되고 있다. 따라서 본 논문에서는 엔터프라이즈 어플리케이션의 개발생산성을 향상시키고 수명주기를 연장시키는데 효과적인 ISIS(Integrated System of Independent Sub-systems) 개발방법을 제안하고자 한다.

  • PDF

A Study on the Architecture of an Electronic Governance System built on the USN Infrastructure (USN 인프라 기반의 전자거버넌스시스템 구조에 관한 연구)

  • Han, Jae-Il
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2006.05a
    • /
    • pp.267-272
    • /
    • 2006
  • 일반적으로 거버넌스는 사회가 스스로를 이끌어나가는 과정을 의미하며, 전자거버넌스시스템(electronic governance system)은 이러한 거버넌스 지원을 위한 차세대 전자정부시스템을 의미한다. 전자거버넌스시스템은 주로 정부기관의 기능 강화에 초점을 두고 있는 전자정부시스템과 달리 능동적인 시민참여에 중점을 두고 있으므로 이에 부수되는 정보공유, 보안, 프라이버시, 구성원 사이의 상호 신뢰형성 등의 문제를 해결하여야 한다. 현재 거버넌스 관점에서 행정에 대한 시민참여가 활발하게 논의되고 거버넌스에 대한 이론 및 실증적 연구는 활발히 연구되고 있으나, 전자거버넌스시스템의 개발에 대한 연구는 매우 미약한 실정이다. USN(Ubiquitous Sensor Network)은 유비쿼터스 컴퓨팅 환경의 중요한 한 축으로써 많은 응용 잠재성을 내포하고 있으며, IT839 전략에 따라 국내 USN 인프라스트럭쳐에 대한 활발한 연구${\cdot}$개발 및 시험사업이 진헹되고 있다. 본 논문은 이러한 USN 인프라스트럭쳐를 활용하여 구성원 사이의 신뢰형성을 도울 수 있는 전자거버넌스시스템의 구조에 대하여 논한다.

  • PDF

A Cloud Workflow Model Based on the Information Control Net (정보제어넷 기반 클라우드 워크플로우 모델)

  • Sun, Kai;Ahn, Hyun;Kim, Kwanghoon Pio
    • Journal of Internet Computing and Services
    • /
    • v.19 no.3
    • /
    • pp.25-33
    • /
    • 2018
  • This paper proposes a cloud workflow model theoretically supported by the information control net modeling methodology as a cloud workflow modeling methodology that is mandatory in implementing realtime enterprise workflow management systems running with cloud computing environments. The eventual goal of the cloud workflow model proposed in this paper is to support those cloud workflow architectures reflecting the types of cloud deployment models such as private, community, public, and hybrid cloud deployment models. Moreover, the proposed model is a mathematical graph model that is extended from the information control net modeling methodology used in conventional enterprise workflow modeling, and it aims to theoretically couple this methodology with the cloud deployment models. Finally, this paper tries to verify the feasibility of the proposed model by building a possible cloud workflow architecture and its cloud workflow services on a realtime enterpeise cloud workflow management system.

An Efficient User Authentication Scheme with Mobile Device in Wireless Network Environment (무선 네트워크 환경에서 모바일 디바이스 기반 효율적인 사용자 인증 기법)

  • Shin, Soobok;Yeh, Hongjin;Kim, Kangseok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.169-179
    • /
    • 2013
  • Recently, with rapid advances of mobile devices such as smart phone and wireless networking, a number of services using mobile device based wireless network have been explosively increasing. From the viewpoint of security, because wireless network is more vulnerable than wired network, strong security is required in wireless network. On the contrary, the security for mobile devices has to be efficient due to the restrictions of battery powered mobile device such as low computation, low memory space and high communication cost. Therefore, in this paper, we propose an efficient authentication scheme with mobile devices in wireless network environment. The proposed scheme satisfies security requirements for the service using mobile device and it is suitable in wireless network environment.

A Study on Realization of Speech Recognition System based on VoiceXML for Railroad Reservation Service (철도예약서비스를 위한 VoiceXML 기반의 음성인식 구현에 관한 연구)

  • Kim, Beom-Seung;Kim, Soon-Hyob
    • Journal of the Korean Society for Railway
    • /
    • v.14 no.2
    • /
    • pp.130-136
    • /
    • 2011
  • This paper suggests realization method for real-time speech recognition using VoiceXML in telephony environment based on SIP for Railroad Reservation Service. In this method, voice signal incoming through PSTN or Internet is treated as dialog using VoiceXML and the transferred voice signal is processed by Speech Recognition System, and the output is returned to dialog of VoiceXML which is transferred to users. VASR system is constituted of dialog server which processes dialog, APP server for processing voice signal, and Speech Recognition System to process speech recognition. This realizes transfer method to Speech Recognition System in which voice signal is recorded using Record Tag function of VoiceXML to process voice signal in telephony environment and it is played in real time.

Fast and Secure Handoff Mechanism for Mobile IPv6 based on IEEE 802.11 (IEEE 802.11 기반의 고속의 안전한 Mobile IPv6 핸드오프 메커니즘)

  • Kang, Hyun-Sun;Park, Chang-Seop
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.2
    • /
    • pp.205-215
    • /
    • 2010
  • It is necessary to provide a fast and secure handover for seamless real-time multimedia services based on IEEE 802.11. In this paper, we propose FMIPv6 handoff protocol integrating L2/L3 layer based on IEEE 802.11 WLAN environment. In that, we propose a hierarchical key management scheme and authentication mechanism for protecting the handover signaling messages. The number of connections with AAA server is minimized for the fast handover. It is also compared and analyzed the handover cost with previous method.

FinDID : A DID service supporting the standard service scheme for the financial sector

  • Lee, Young-Eun;Kim, Hye-Won;Lee, Myung-Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.5
    • /
    • pp.127-138
    • /
    • 2022
  • In this paper, we present FinDID (Financial Decentralized IDentity), a blockchain-based DID(Decentralized IDentity) service that can flexibly control personal information or credentials through a systematic verification method while complying with the standard service scheme of decentralized identity for the financial sector. DID is an identity management system used in a decentralized environment without a specific certification authority, and as a technology that allows users to control their own information, it can realize self-sovereignty over users' own personal information. Through FinDID, users receive credentials that authenticate their various personal information from the issuer, select only the claims required by the target financial service using their personal electronic wallet, create presentations from credentials. Then they submit it to the financial service, leading to their qualification from the service. FinDID consists of electronic wallet, credential issuer, credential storage, DID service including DID management contract and credential management contract, and financial services using this service scheme. The DID service manages each user's DID and supports all verification processes of the associated identity management scheme.

Ontology-based Semantic Searching Web Service and Integration with PDM (온톨로지 기반 의미검색 웹 서비스와 PDM과의 통합)

  • Hahm, Gyeong-June;Suh, Hyo-Won;Yang, Young-Soon;Choi, Young
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.21 no.6
    • /
    • pp.579-587
    • /
    • 2008
  • In collaborative environment, since each agent generally uses different words for the same meaning, there is an obstacle for information sharing. In collaborative product development environment, each agent has different words for representing same product information. As a result, it is hard to share product information in this situation. For solving this problem, semantic-based product information is needed. In this paper, a ontology-based semantic searching system which is able to interact with legacy PDM systems is proposed for product information sharing in collaborative environment Product ontology is represented with OWL format, and the product ontology is processed by Pellet reasoning engine for semantic searching. The system is implemented as a web service which can be integrated with other systems. This paper also introduces the approach with which a PDM system provides a function of semantic search with this search system.

A Study on optimizing application development for SmartPhone OS (스마트폰 OS를 위한 최적화 어플리케이션 개발에 관한 연구)

  • Lee, So-Haeng
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.963-966
    • /
    • 2010
  • 개인용 휴대전화는 다양한 형태로 발전 되어 왔다. 그 동안 국내 통신 시장은 피쳐폰이라고 불리는 단순 전화, 문자 위주의 서비스만을 제공하는 하드웨어 기반의 서비스가 대부분이었다. 몇 년 전부터 PDA와 전화 기능을 기반으로 한 하드웨어가 출시되기 시작하였으나 사용 및 운영의 불편함으로 인해 수요의 폭을 넓히지 못 하였고, 2007년 Apple사의 iPhone 출시를 기점으로 전 세계적으로 다양한 형태의 스마트 폰이 출시되기 시작하였다. 또한 휴대폰 공급 업자들이 제공하는 일방적인 서비스에 만족하지 않고 사용자가 원하는 방향에 필요한 컨텐츠를 다양하게 제공할 수 있는 소프트웨어 마켓의 등장으로 스마트 폰은 그 사용자 층이 매년 큰 폭으로 확대되고 있다. 최근 스마트폰은 글로벌 경기 침체 속에서도 13%대의 성장률(2009년 3/4분기)를 보이며 세계 휴대폰 시장의 중심으로 자리 잡고 있다. 또 사용자의 요구를 충족 시키기 위해서는 다양한 플랫폼의 개발자가 양성 되고 있으며 다양한 어플리케이션을 제공하기 위해 노력하고 있다. 본 논문에서는 다양한 플렛폼 기반의 개발 환경을 소개하고 향후 개발자들이 접목할 수 있는 개발 도구 및 응용 방법을 비교 분석함으로써 스마트폰을 기반으로 한 최적화 어플리케이션의 개발을 촉진 시키고자 한다.

  • PDF

A Study on Integration Security Management Model in Cloud Environment (클라우드 환경에서의 통합 보안관제 모델 연구)

  • Byun, Yun Sang;Kwak, Jin
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.407-415
    • /
    • 2013
  • Recently, Interest variety of IT services and computing resources are increasing. As a result, the interest in the security of cloud environments is also increasing. Cloud environment is stored that to provide services to a large amount of IT resources on the Cloud. Therefore, Cloud is integrity of the stored data and resources that such as data leakage, forgery, etc. security incidents that the ability to quickly process is required. However, the existing developed various solutions or studies without considering their cloud environment for development and research to graft in a cloud environment because it has been difficult. Therefore, we proposed wire-wireless integrated Security management Model in cloud environment.