• Title/Summary/Keyword: Logging Service

Search Result 33, Processing Time 0.019 seconds

Design and Implementation of Web-Mail Service System using a Virtual Domain (가상도메인을 이용한 웹메일 서비스 시스템의 설계 및 구현)

  • 류언무;황현미;이상철
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.4
    • /
    • pp.69-74
    • /
    • 2003
  • There has been increasing of using Internet as time goes by, and it means that the analysis technique of appetence for the users logging into the internet system has been absolutely advanced. Keeping pace with the intense expansion of information, the mailing system is the one to be very busy on Internet service at the present time. This paper introduces to support users that carry handling account management easier by using virtual domain control on mail server. It also finds out the merit to get more efficient way to control the bunch of mails that classify into mail-box to users in advance.

  • PDF

Design of User Integrated Authentication System in Heterogeneous Distributed Cloud Service Brokerage Environment (이종 분산 클라우드 서비스 브로커리지 환경에서의 사용자 통합 인증 시스템 설계)

  • Lee, Daesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2061-2066
    • /
    • 2016
  • Currently, cloud systems are not interoperable due to low interoperability between cloud systems as operators build up cloud environments with their own way. For example, users of the Google cloud system can not use the Microsoft (Microsoft) cloud system unless they go through an additional log-in process. In order for Google cloud system's users to use MS cloud system services, they must log in to the MS cloud system again after logging out of Google cloud system. In order to solve these problems, Cloud Service Broker(CSB) technology has emerged to resolve the interoperability problem between cloud systems, but many researches and developments are still needed. In this paper, we design an integrated user authentication system, which is a fundamental problem of cloud user interoperability among CSB (Cloud Service Broker) technologies, which is emerging as a service intervention technology of heterogeneous distributed cloud environment.

Development of Mock Control Devices and Data Acquisition Apparatus for Power Tiller Training Simulator

  • Kim, YuYong;Kim, Byounggap;Shin, Seung-yeoub;Kim, Byoungin;Hong, Sunjung
    • Journal of Biosystems Engineering
    • /
    • v.40 no.3
    • /
    • pp.284-288
    • /
    • 2015
  • Training power tiller operators in safe farming is necessary to avoid farming accidents. With the continuing progress in computational technology, driving simulators have become increasingly popular for conducting such training. Purpose: The objective of this study is to develop mock control devices and data acquisition apparatus for a tiller simulator. Methods: Except for the stand and tail wheel adjusting levers, the mock control devices were developed using a tiller handle assay. The data acquisition apparatus was realized using an embedded data-logging device and LabVIEW, the system design software. Results: The control devices of a real handle assay were successfully mimicked by the mock operator control devices, which used sensors for the relevant measurements. The data from the mock devices were acquired and transmitted to the main computer at intervals of 10 ms via Wi-Fi. Conclusions: The developed mock control devices operate similar to real power tillers and can be utilized in power tiller training simulators.

Measurement of Remediation for Compromised User Account of Web Single Sign-On (SSO) (침해된 웹 SSO 계정 보호를 위한 보안 조치 실험 연구)

  • Nam, Ji-Hyun;Choi, Hyoung-Kee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.941-950
    • /
    • 2021
  • Single Sign-On (SSO) service manages user's account passwords from multiple websites so that security in a high level is required. Users who use the SSO service are authenticated through the Identity Provider (IdP) when logging into the website. We present the security requirements that IdP can take in order to minimize the user's risk whose IdP account is compromised. We describe the security threats that arise when the security requirements are not satisfied. Through evaluation, we prove that the attacker's session cannot be canceled even if the user recognizes the attack if the IdP does not satisfy the security requirements.

SSO based Security Management in Cloud Computing Environment

  • Jing, Si Da;Jung, Young-Min;Chung, Mok-Dong
    • Korea Information Processing Society Review
    • /
    • v.17 no.2
    • /
    • pp.18-29
    • /
    • 2010
  • In this paper, we surveyed SSO based security management including the knowledge domain of the area of cloud and its relevant components. Cloud computing refers to the delivery of software and other technology services over the Internet by a service provider. SSO refers to the ability to log on to a single security system once, rather than logging on separately to multiple security systems. Existing SSO solutions in cloud computing environment suggest several methods. SSO-based security Issues illustrate these key items in cloud computing environment such as risks and security vulnerabilities of SSO. SSO supports for multiple and different domains in cloud computing environment.

  • PDF

A Study on Message-Driven POJO(MDP) by Developing an Asynchronous Logging Service (비동기식 로그서비스 구현을 통한 Message-Driven POJO(MDP) 기술연구)

  • Jang Eui-Jin;Baeg Jong Hyun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11b
    • /
    • pp.982-984
    • /
    • 2005
  • 효과적인 어플리케이션 로그처리는 어플리케이션 개발 및 운영 시에 매우 중요한 요소 중에 하나이다. 파일이나 콘솔을 이용하여 동기식으로 처리되는 일반적인 로그 서비스는 동시에 대량의 로그를 처리해야 할 경우 시스템에 많은 부하를 주게 되는 문제점이 있다. 이를 해결하기 위해서는 클라이언트가 지연 없이 로그를 남길 수 있는 비동기식 로그서비스가 필요하다. 이 논문에서는 비동기식 로그서비스 구현을 통해서 Message-Driven POJO(MDP) 구현 기술을 소개하고 최근에 소개된 EJB 3.0 Message Driven Bean(MDB) 기술과 비교 분석해 보도록 한다.

  • PDF

Implementation of Mobile Cliented-Server System for Real-Time Processing (실시간 처리 기반의 모바일 클라이언트-서버 시스템 구현)

  • Joo, Hae-Jong;Hong, Bong-Wha
    • The Journal of Information Technology
    • /
    • v.9 no.4
    • /
    • pp.35-47
    • /
    • 2006
  • Many researches are going on with regard to issues and problems related to mobile database systems, which are caused by the weak connectivity of wireless networks, the mobility and the portability of mobile clients. Mobile computing satisfies user's demands for convenience and performance to use information at any time and in any place, but it has many problems to be solved in the aspect of data management. The purpose of our study is to Implement Real-Time Mobile Query Processing System(MQPS) to solve problems related to database hoarding, the maintenance of shared dataconsistency and the optimization of logging, which are caused by the weak connectivity and disconnection of wireless networks inherent in mobile database systems under mobile client server environments. In addition, we proved the superiority of the proposed MQPS by comparing its performance to the C I S(Client-Intercept-Srever) model.

  • PDF

A Content-based Load Balancing Algorithm for Metadata Servers in Cluster File System (클러스터 파일 시스템의 메타데이터 서버를 위한 내용 기반 부하 분산 알고리즘)

  • Jang Jun-Ho;Han Sae-Young;Park Sung-Yong
    • The KIPS Transactions:PartA
    • /
    • v.13A no.4 s.101
    • /
    • pp.323-334
    • /
    • 2006
  • A metadata service is one of the important factors to affect the performance of cluster file systems. We propose a content-based load balancing algorithm that dynamically distributes client requests to appropriate metadata servers based on the types of metadata operations. By replicating metadatas and logging update messages in each server, rather than moving metadatas across servers, we significantly reduced the response time and evenly distributed client's requests among metadata servers.

Research on Registry Analysis based Malware Detection Method (Registry 분석을 통한 악성코드 감염여부 탐지 방법 연구)

  • Hong, Sunghyuck
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.5
    • /
    • pp.37-43
    • /
    • 2017
  • A registry is a hierarchy database which is designed to store information necessary for operating system and application programs in Windows operating system, and it is involved in all activities such as booting, logging, service execution, application execution, and user behavior. Digital forensic is widely used. In recent years, malicious codes have penetrated into systems in a way that is not recognized by the user, and valuable information is leaked or stolen, causing financial damages. Therefore, this study proposes a method to detect malicious code by using a shareware application without using expensive digital forensic program, so as to analysis hacking methods and prevent hacking damage in advance.

An Efficient Log Data Processing Architecture for Internet Cloud Environments

  • Kim, Julie;Bahn, Hyokyung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.1
    • /
    • pp.33-41
    • /
    • 2016
  • Big data management is becoming an increasingly important issue in both industry and academia of information science community today. One of the important categories of big data generated from software systems is log data. Log data is generally used for better services in various service providers and can also be used to improve system reliability. In this paper, we propose a novel big data management architecture specialized for log data. The proposed architecture provides a scalable log management system that consists of client and server side modules for efficient handling of log data. To support large and simultaneous log data from multiple clients, we adopt the Hadoop infrastructure in the server-side file system for storing and managing log data efficiently. We implement the proposed architecture to support various client environments and validate the efficiency through measurement studies. The results show that the proposed architecture performs better than the existing logging architecture by 42.8% on average. All components of the proposed architecture are implemented based on open source software and the developed prototypes are now publicly available.