• Title/Summary/Keyword: Information Exchange Requirements

Search Result 152, Processing Time 0.022 seconds

A Hierarchical Context Dissemination Framework for Managing Federated Clouds

  • Famaey, Jeroen;Latre, Steven;Strassner, John;Turck, Filip De
    • Journal of Communications and Networks
    • /
    • v.13 no.6
    • /
    • pp.567-582
    • /
    • 2011
  • The growing popularity of the Internet has caused the size and complexity of communications and computing systems to greatly increase in recent years. To alleviate this increased management complexity, novel autonomic management architectures have emerged, in which many automated components manage the network's resources in a distributed fashion. However, in order to achieve effective collaboration between these management components, they need to be able to efficiently exchange information in a timely fashion. In this article, we propose a context dissemination framework that addresses this problem. To achieve scalability, the management components are structured in a hierarchy. The framework facilitates the aggregation and translation of information as it is propagated through the hierarchy. Additionally, by way of semantics, context is filtered based on meaning and is disseminated intelligently according to dynamically changing context requirements. This significantly reduces the exchange of superfluous context and thus further increases scalability. The large size of modern federated cloud computing infrastructures, makes the presented context dissemination framework ideally suited to improve their management efficiency and scalability. The specific context requirements for the management of a cloud data center are identified, and our context dissemination approach is applied to it. Additionally, an extensive evaluation of the framework in a large-scale cloud data center scenario was performed in order to characterize the benefits of our approach, in terms of scalability and reasoning time.

Design and Implementation of Mechanism for Effectively Exchanging Cybersecurity Information between Independent Security Management Domains (독립적인 보안관리 도메인간 효과적인 사이버보안정보 교환 방법의 설계 및 구현)

  • An, Gae-Il;Seo, Dae-Hee;Lim, Sun-Hee;Kim, Jong-Hyun;Seo, Dong-Il;Cho, Hyun-Sook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1489-1497
    • /
    • 2011
  • As a way for defending against cyber security threats, there has been a research on cybersecurity information exchange between security management domains in order to raise security performance of the whole network. One of the hottest issues in exchanging cybersecurity information between security management domains is that the requirements of those domains on information sharing are different with each other because each is autonomous domain. This paper proposes a mechanism for effective cybersecurity Information exchange between independent security management domains, which can satisfy their requirements on information sharing through sharing policy and sharing policy control protocol, proposed in this paper. In this paper we have developed an integrated security control system that supports the proposed mechanism. Through the system the performance of the proposed mechanism is measured and evaluated.

Secure Authenticated key Exchange Protocol using Signcryption Scheme (Signcryption을 이용한 안전한 인증된 키 교환 프로토콜 연구)

  • Kim Rack-Hyun;Youm Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.4
    • /
    • pp.139-146
    • /
    • 2006
  • A Signcryption proposed by Yuliang Zheng in 1997 is a hybrid public key primitive that combines a digital signature and a encryption. It provides more efficient method than a straightforward composition of an signature scheme with a encryption scheme. In a mobile communication environment, the authenticated key agreement protocol should be designed to have lower computational complexity and memory requirements. The password-based authenticated key exchange protocol is to authenticate a client and a server using an easily memorable password. This paper proposes an secure Authenticated Key Exchange protocol using Signcryption scheme. In Addition we also show that it is secure and a more efficient that other exiting authenticated key exchange protocol.

Study for Design of Analysis Tool for Improvement of Requirements Reliability and Satisfaction (요구사항 정의의 신뢰성과 만족도 향상을 위한 분석 도구 설계에 관한 연구)

  • Lee, Eun-Ser
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.12
    • /
    • pp.537-542
    • /
    • 2015
  • Project success is depend on requirement analysis for in the software engineering. Requirements error have a effect in the whole system. As a result, the customer satisfaction will deteriorate. Therefore, we are need to tool that stakeholder's opinion exchange and modify for a accurate analysis in the requirement phase. In this paper, we are design that tool of the stakeholder's opinion exchange.

Stakeholder Survey on the Incentive Program to Promote the Adoption of Health Information Exchange (진료정보교류 인센티브사업에 대한 이해관계자 조사연구)

  • Park, Hayoung;Ock, Minsu;Park, Jong Son;Lee, Hye Rin;Kim, Soomin;Lee, Sang-il
    • Journal of Information Technology Services
    • /
    • v.16 no.3
    • /
    • pp.17-45
    • /
    • 2017
  • Health Information Exchange (HIE) is expected to improve the quality and efficiency of care by allowing providers online access to healthcare information generated by other providers at the point of care. However, the adoption of the technology in Korea has been slow since its pilot program in 2007~2010 at Seoul National University Bundang Hospital. The objective of this study was to survey stakeholders on the incentive program for the facilitation of HIE adoption. We surveyed 39 experts representing 6 categories of stakeholders-provider, insurer, government, information service firms, customers, and medical informatics experts for the interviews. Interview questions included program objectives, program participation requirements, incentive payment method, and administrative burden for program participation. Experts indicated that the quality of care was the most important value the program should aim to achieve through the HIE adoption. They suggested that the requirements and administrative burden for participation should be kept at minimum to recruit a large number of providers to the program, which is an indicator of program success. Experts were divided on the payment method whether the incentive should be paid as a part of the fee payment scheme operated by the National Health Insurance (NHI) or should be a payment made independent of the NHI. The source of the divide was conflict of interest among stakeholders as to who pays for the program, and the insurer and consumer groups were against the NHI taking the financial burden. It appeared to be the most significant factor for the successful program launching to resolve the gap in perceptions about benefits of the technology among stakeholders and to win the willingness to pay for the program.

The Design of Integrated system for the cloud-based medical Information sharing

  • Lee, Kwang-Cheol;Hwang, Chigon;Lee, Seong Ro;Lee, Jong-Yong;Jung, Kye-Dong
    • International journal of advanced smart convergence
    • /
    • v.4 no.2
    • /
    • pp.145-153
    • /
    • 2015
  • Development of IT technology, in combination with the medical area, a number of developments have been made of the digital advanced medical devices, also increased interest in health, sharing of medical information has become increasingly necessary. Standardization for medical information sharing to satisfy these requirements have been studied. However, the medical information system is to build a system independent hospital itself, is difficult to share and exchange medical data with other medical institutions. In this paper, we provide a medical cloud system that can share medical information. Use DBaaS of cloud services. And is an international standard to have a HL7 share information by forming a meta-schema, each of the data transfer, the format of the document oriented data solves the heterogeneity between hospitals. Extracts the required field name of examination information, to exchange information with each of the local information and mapping. Health diagnostic information in the present study and diagnosis through accurate information sharing and exchange is possible ongoing management.

Implementation of an E-Book Exchange Server based on Open E-Book Fourm (Open E-Book 포럼에 기반한 전자책 교환 서버 구현)

  • Kim, Jeong-Won
    • The KIPS Transactions:PartA
    • /
    • v.10A no.4
    • /
    • pp.405-410
    • /
    • 2003
  • In this paper, we have designed and implemented an E-Book Exchange System which is based on the Open E-Book Exchange protocol of Open E-book forum. The ebook is described digital contents composed of variable media and should require secured ebook server for copyright guarantee. Also, contents manufactures, circulation company, and user must access the ebook contents easily. So, Linux-based ebook server and reader can satisfy this requirements. Therefore, this research has developed Linux-based ebook server and reader which is cost-effective.

Capturing Information Exchange Process among Structural Engineering Software Applications for BIM Deployment Using IDM (BIM 적용을 위한 구조설계 엔지니어링 소프트웨어 간 정보교환 프로세스 분석 및 표준문서화)

  • Kim, Jae-Woo;Lim, Jae-In;You, Seok-Joon;Kwon, Soon-Wook;Chin, Sang-Yoon;Choi, Cheol-Ho
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 2008.04a
    • /
    • pp.464-469
    • /
    • 2008
  • Information Delivery Manual (IDM) is a documentation format for capturing the information requirements among various AEC project tasks and their software uses. The authors analyzed the structural engineering and analysis domain and were able to define its process model definition and the information flow required for the process by following the methodology stated in the IDM format. The authors believe that The manual has its potentials for further enhancements for IFC-based process integration by transferring it into a information model schema, which can be later referenced by the software applications to automatically determine which data need to be exchanged.

  • PDF

Authenticated Key Exchange Protocol for the Secure and Efficient (안전하고 효율적으로 인증된 키 교환 프로토콜)

  • Park, Jong-Min;Park, Byung-Jun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.8
    • /
    • pp.1843-1848
    • /
    • 2010
  • The Key exchange protocols are very crucial tools to provide the secure communication in the broadband satellite access network. They should be required to satisfy various requirements such as security, Key confirmation, and Key freshness. In this paper, we propose Two authenticated key exchange protocols Two Pass EKE-E(Encrypted Key Exchange-Efficient) and Two Pass EKE-S(Encrypted Key Exchange-Secure) are introduced. A basic idea of the protocols is that a password can be represented by modular addition N, and the number of possible modular addition N representing the password is $2^N$ The Two Pass EKE-E is secure against the attacks including main-in-the-middle attack and off-line dictionary attack, and the performance is excellent so as beyond to comparison with other authenticated key exchange protocols. The Two Pass EKE-S is a slight modification of the Two Pass EKE-E. The Two Pass EKE-S provides computational in feasibility for learning the password without having performed off line dictionary attack while preserving the performance of the Two Pass EKE-E.

Joint Relay Selection and Power Allocation for Two-way Relay Channels with Asymmetric Traffic Requirements

  • Lou, Sijia;Yang, Longxiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.8
    • /
    • pp.1955-1971
    • /
    • 2013
  • This paper studies relay selection and power allocation for amplify-and-forward (AF) based two-way relay networks (TWRN) with asymmetric traffic requirements (ATR). A joint relay selection and power allocation algorithm is proposed to decrease the outage probability of TWRN with ATR. In this algorithm, two sources exchange information with the help of the relay during two time slots. We first calculate the optimal power allocation parameters based on instantaneous channel state information (CSI), and then derive a tight lower bound of outage probability. Furthermore, we propose a simplified relay selection criterion, which can be easily calculated as harmonic mean of instantaneous channel gains, according to the outage probability expressions. Simulation results verified the theoretical analyses we presented. It is shown that the outage probability of our algorithm improves 3-4dB comparing with that of other existing algorithms, and the lower bound is tight comparing with actual value for the entire signal-to-noise ratio (SNR) region.