• Title/Summary/Keyword: Legacy Systems

Search Result 338, Processing Time 0.025 seconds

A Mutual P3P Methodology for Privacy Preserving Context-Aware Systems Development (프라이버시 보호 상황인식 시스템 개발을 위한 쌍방향 P3P 방법론)

  • Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.18 no.1
    • /
    • pp.145-162
    • /
    • 2008
  • One of the big concerns in e-society is privacy issue. In special, in developing robust ubiquitous smart space and corresponding services, user profile and preference are collected by the service providers. Privacy issue would be more critical in context-aware services simply because most of the context data themselves are private information: user's current location, current schedule, friends nearby and even her/his health data. To realize the potential of ubiquitous smart space, the systems embedded in the space should corporate personal privacy preferences. When the users invoke a set of services, they are asked to allow the service providers or smart space to make use of personal information which is related to privacy concerns. For this reason, the users unhappily provide the personal information or even deny to get served. On the other side, service provider needs personal information as rich as possible with minimal personal information to discern royal and trustworthy customers and those who are not. It would be desirable to enlarge the allowable personal information complying with the service provider's request, whereas minimizing service provider's requiring personal information which is not allowed to be submitted and user's submitting information which is of no value to the service provider. In special, if any personal information required by the service provider is not allowed, service will not be provided to the user. P3P (Platform for Privacy Preferences) has been regarded as one of the promising alternatives to preserve the personal information in the course of electronic transactions. However, P3P mainly focuses on preserving the buyers' personal information. From time to time, the service provider's business data should be protected from the unintended usage from the buyers. Moreover, even though the user's privacy preference could depend on the context happened to the user, legacy P3P does not handle the contextual change of privacy preferences. Hence, the purpose of this paper is to propose a mutual P3P-based negotiation mechanism. To do so, service provider's privacy concern is considered as well as the users'. User's privacy policy on the service provider's information also should be informed to the service providers before the service begins. Second, privacy policy is contextually designed according to the user's current context because the nomadic user's privacy concern structure may be altered contextually. Hence, the methodology includes mutual privacy policy and personalization. Overall framework of the mechanism and new code of ethics is described in section 2. Pervasive platform for mutual P3P considers user type and context field, which involves current activity, location, social context, objects nearby and physical environments. Our mutual P3P includes the privacy preference not only for the buyers but also the sellers, that is, service providers. Negotiation methodology for mutual P3P is proposed in section 3. Based on the fact that privacy concern occurs when there are needs for information access and at the same time those for information hiding. Our mechanism was implemented based on an actual shopping mall to increase the feasibility of the idea proposed in this paper. A shopping service is assumed as a context-aware service, and data groups for the service are enumerated. The privacy policy for each data group is represented as APPEL format. To examine the performance of the example service, in section 4, simulation approach is adopted in this paper. For the simulation, five data elements are considered: $\cdot$ UserID $\cdot$ User preference $\cdot$ Phone number $\cdot$ Home address $\cdot$ Product information $\cdot$ Service profile. For the negotiation, reputation is selected as a strategic value. Then the following cases are compared: $\cdot$ Legacy P3P is considered $\cdot$ Mutual P3P is considered without strategic value $\cdot$ Mutual P3P is considered with strategic value. The simulation results show that mutual P3P outperforms legacy P3P. Moreover, we could conclude that when mutual P3P is considered with strategic value, performance was better than that of mutual P3P is considered without strategic value in terms of service safety.

The Organization of the Archival Systems and Their Transformations in the first period of the Soviet UnionAn Essay for Reconstruction on the Classification System of Government-General of Chosun (소련 초기의 기록관리제도와 그 변화)

  • Cho, Ho-Yeon
    • The Korean Journal of Archival Studies
    • /
    • no.10
    • /
    • pp.324-370
    • /
    • 2004
  • This paper aims to research the historical development of the archival systems in the Soviet Union from 1917 to the 1920's. The Russian revolution was the turning point not only for the political and social changes but for the archival administration in Russia, as it provided the new Soviet regime with the chances to reorganize the archival institutions under Bolshevik rule. However, we must not forget the fact that the Russian Archival Workers' Union had taken part in the organization of the archival systems together with the Bolshevik revolutionaries. The Soviet government intended to transform the decentralized and poorly organized archival systems in the prerevolutionary years into the centralized and bureaucratized ones. In this meaning, the decree signed be V. I. Lenin on 1 June 1918 was estimated as the real basis for the Soviet archival centralization. Lenin's archival decree of 1918 encompassed the entire national documentary legacy, which was gradually extended to all types and categories of manuscripts and archival records by successive legislation. The concept of state proprietorship of all documentary records was designated "Single State Archival Fond"(Edinyi Gosudarstvennyi arkhivnyi fond), which was renamed as "Archival Fond of the Russian Federation" after the collapse of the USSR. The independent state administrative agency, that is, "Main Administration of Archival Affairs"(Glavnoe upravlenie arkhivnym delom) was charged with the management of the entire "Single State Archival Fond". While the Soviet Union reorganized its archival systems in the twenties, the archival institutions became under the severe control of the government. For example, M. N. Pokrovskii, the well-known Marxist historian and the political leader, headed the organizational work of archives in the Soviet Union, which resulted in the exclusion of the prerevolutionary specialists from the archival field in the Soviet Union. However, the discussions over the concept of "the Archival Fond" by B. I. Anfilov helped to develop the archival theories in the USSR in the twenties. In conclusion, the Soviet Union, having emphasized the centralization of the archives, developed its archival systems from the early period, which were the basis of the systematic archival institutions in Russia.

XML-Based Network Management for IP Networks

  • Choi, Mi-Jung;Hong, James W.;Ju, Hong-Taek
    • ETRI Journal
    • /
    • v.25 no.6
    • /
    • pp.445-463
    • /
    • 2003
  • XML-based network management, which applies XML technologies to network management, has been proposed as an alternative to existing network management. The use of XML in network management offers many advantages. However, most existing network devices are already embedded with simple network management protocol (SNMP) agents and managed by SNMP managers. For integrated network management, we present the architectures of an XML-based manager, an XML-based agent, and an XML/SNMP gateway for legacy SNMP agents. We describe our experience of developing an XML-based network management system (XNMS), XML-based agent, and an XML/SNMP gateway. We also verify the effectiveness of our XML-based agent and XML/SNMP gateway through performance tests. Our experience with developing XNMS and XML-based agents can be used as a guideline for development of XML-based management systems that fully take advantage of the strengths of XML technologies.

  • PDF

An Implementation of Web-based XML/EDI System (웹 기반 XML/EDI 시스템 설계 및 구현)

  • 구태회;변광준;황인준
    • The Journal of Society for e-Business Studies
    • /
    • v.6 no.1
    • /
    • pp.83-99
    • /
    • 2001
  • The EDI system supports the working environment which can exchange the standardized document through the each agreed communication method. Traditional EDI system is complicated to be implemented and needed high cost te using the system because of the specific VAN(Value Added Network). This Paper proposes the XML/EDI system using the web-based distributed object and proposed the component 'AnySchema', as it makes be able to use legacy Database for EDI user. This XML/EDI system exchanges the XML documents through the Internet, so proposed low cost to support the system. Also, by using the XML document, it doesn't need EDI specific software and easy to exchange data between different systems. This system is implemented by using Java, as platform-independent.

  • PDF

An Index-Based Context-Aware Energy Management System in Ubiquitous Smart Space (유비쿼터스 지능 공간에서의 지수 기반 상황인지 에너지경영 시스템)

  • Kwon, Ohyung;Lee, Yonnim
    • Knowledge Management Research
    • /
    • v.9 no.4
    • /
    • pp.51-63
    • /
    • 2008
  • Effective energy consumption now becomes one of the area of knowledge management which potentially gives global impact. It is considerable for the energy management to optimize the usage of energy, rather than decreasing energy consumption at any cases. To resolve these challenges, an intelligent and personalized system which helps the individuals control their own behaviors in an optimal and timely manner is needed. So far, however, since the legacy energy management systems are nation-wide or organizational, individual-level energy management is nearly impossible. Moreover, most estimating methods of energy consumption are based on forecasting techniques which tend to risky or analysis models which may not be provided in a timely manner. Hence, the purpose of this paper is to propose a novel individual-level energy management system which aims to realize timely and personalized energy management based on context-aware computing approach. To do so, an index model for energy consumption is proposed with a corresponding service framework.

  • PDF

U-Blogging의 개념 및 프레임워크

  • Gwon, O-Byeong;Lee, Nam-Yeon;Choe, Yun-Hyeong
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2007.05a
    • /
    • pp.138-144
    • /
    • 2007
  • Nowadays blogging is emerging as a new way of making a human-to-human relationship by offering personal information and opinion to others or by receiving any responses from them. The blogging activity would be also useful when they are in a movement surrounding lots of objects which are potentially interesting to them. However, immediate response from the objects is not available using legacy blogging systems. This paper, hence, aims to propose a methodology which allows the users to communicate with the objects to get useful information or get served immediately. Our approach is to let the objects act as bloggers, having their own blogs and communicating with each other and even with human.

  • PDF

A Research on the Integrating Legacy Systems into Web Services (레거시 시스템을 웹 서비스에 통합하기 위한 연구)

  • Kim, Dong-Uk;Kuk, Seung-Hak;Kim, Hyeon-Soo;Lee, Jai-Kyung;Park, Seong-Whan
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06b
    • /
    • pp.75-80
    • /
    • 2008
  • 업무 프로세스의 개선 및 효율성 증가를 위해 시스템간의 연동을 웹서비스(Web Services)화하여 시스템 간의 프로세스 및 데이터 연계를 목적으로 하는 통합의 연구가 활발히 진행되고있다. 본 논문에서는 이기종간의 레거시 시스템을 SOA(Service Oriented Architecture)기반의 웹 서비스와 통합하여 구매/유지보수 비용을 절감하고 신뢰성, 보안성 및 상호 운용성 향상 등의 비즈니스 프로세스의 가치를 향상시키기 위한 방안에 대해 소개한다. 레거시 시스템을 웹서비스와 통합 시 고려해야 하는 비 기능적인 요소를 OASIS, W3C, WS-I등의 단체에서 정해진 웹서비스 명세 표준에 근거하여 선정하고, 이를 준수한 통합 방안 및 구현사례를 제시한다.

  • PDF

Implementation of Light-weight I/O Stack for NVMe-over-Fabrics

  • Ahn, Sungyong
    • International journal of advanced smart convergence
    • /
    • v.9 no.3
    • /
    • pp.253-259
    • /
    • 2020
  • Most of today's large-scale cloud systems and enterprise data centers are distributing resources to improve scalability and resource utilization. NVMe-over-Fabric protocol allows submitting NVMe commands to a remote NVMe SSD through RDMA (Remote Direct Memory Access) network. It is attracting attention recently because it is possible to construct a disaggregation storage system with low latency through the protocol. However, the current I/O stack of NVMe-over-Fabric has an inefficient structure for maintaining compatibility with the traditional I/O stack. Therefore, in this paper, we propose a new mechanism to reduce I/O latency and CPU overhead by modifying I/O path of NVMe-over-Fabric to pass through legacy block layer. According to the performance evaluation results, the proposed mechanism is able to reduce the I/O latency and CPU overhead by up to 22% and 24% compared to the existing NVMe-over-Fabrics protocol, respectively.

A Study of the Legacy Proxy Peer based on P2P Virtual Home Platform (P2P 가상홈 플랫폼 기반의 레가시 프락시 피어에 관한 연구)

  • Lee, Sang-Bong;Hwang, Tae-In;Oh, Byeong-Thaek;Kang, Shin-Yuk;Park, Ho-Jin
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.2 no.1
    • /
    • pp.60-65
    • /
    • 2007
  • 본 논문은 P2P 기반의 가상홈 미들웨어를 탑재할 수 없는 장치(이하 레가시 디바이스)를 P2P 인프라에 참여시키기 위한 방법에 관한 것으로, P2P 인프라와 레가시 디바이스 사이에 중계역할을 담당하는 레가시 프락시에 대한 연구이다. 가상홈 플랫폼은 기기 간 Seamless 연결을 제공하는 가상공간을 구성하여 언제 어디서나 P2P 방식으로 기기 간 서비스 및 콘텐츠를 용이하게 검색하고 공유하기 위한 기술로 JXTA 스펙을 따르고 있다. 레가시 프락시는 가상홈 미들웨어에 레가시 컨텐츠 공유 서비스, 가상홈 연계 서비스 및 레가시 디바이스 원격 제어 서비스를 추가한 것으로, 가상홈 인프라에 있는 임의의 피어가 레가시 디바이스의 컨텐츠 및 서비스를 이용하고 원격제어 할 수 있도록 해 준다.

  • PDF

Preventing Fast Wear-out of Flash Cache with An Admission Control Policy

  • Lee, Eunji;Bahn, Hyokyung
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.15 no.5
    • /
    • pp.546-553
    • /
    • 2015
  • Recently, flash cache is widely adopted as the performance accelerator of legacy storage systems. Unlike other cache media, flash cache should be carefully managed as it has peculiar characteristics such as long write latency and limited P/E cycles. In particular, we make two prominent observations that can be utilized in managing flash cache. First, a serious worn-out problem happens when the working-set of a system is beyond the capacity of flash cache due to excessively frequent cache replacement. Second, more than 50% of data has no hit in flash cache as it is a second level cache. Based on these observations, we propose a cache admission control policy that does not cache data when it is first accessed, and inserts it into the cache only after its second access occurs within a certain time window. This allows the filtering of data disruptive to flash cache in terms of endurance and performance. With this policy, we prolong the lifetime of flash cache 2.3 times without any performance degradations.