• Title/Summary/Keyword: Management of server system

Search Result 1,340, Processing Time 0.033 seconds

Remote Integrated Management System for applying Efficient Security Policy based on Linux (리눅스 기반의 효율적인 보안 정책 적용을 위한 원격통합관리시스템)

  • 김동환;김현성
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2002.11a
    • /
    • pp.72-81
    • /
    • 2002
  • Management for security product and application is becoming more difficult because they became more specialized. Most of research is focused on combining policies for information security management policy, security standard, and security tools. However, there are no researches for total solution for both application and security policy. Thereby, the purpose of this research is to propose a remote integrated management system based on linux. The system could efficiently manage data update for application and policy update for a server supporting the distinct configuration of each server. By using the remote integrated management system, system manager with poor secure knowledge also could easily manage their system securely.

  • PDF

Development of web-based Simulation System for Finite Element Analysis (웹기반 유한요소해석 시스템 개발)

  • Yoon E. Y.;Kim J.;Kang B. S.
    • Proceedings of the Korean Society for Technology of Plasticity Conference
    • /
    • 2005.10a
    • /
    • pp.384-388
    • /
    • 2005
  • The purpose of this paper is to develop web-based simulation system which can be used anytime, anywhere without expensive hardware and software. In this paper, a web-based simulation system was developed by utilizing finite element analysis and client/server system using visual C++ and ASP. The client/server system consist of two modules, post-processor, management system module. The input data for FEM calculation is transferred to the management system. After that, the result from the simulation can be visualized through the post-processor module. By using this system, small industries and individuals can considerably save the time and expense.

  • PDF

Efficient Authentication and Management System for PLC-based AMR (전력선통신기반 원격검침시스템을 위한 효율적인 기기인증 및 관리체계)

  • Ju, Seong-Ho;Choi, Moon-Seok;Lim, Yong-Hoon;Choi, Jong-Hyup
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.353-354
    • /
    • 2008
  • Security weakness in PLC network can be made up for by authentication and management scheme of PLC modules introduced in this paper. Each PLC module must pass the authentication procedure to work normally in PLC network as soon as being installed in the spot. Based on this scheme, all PLC devices are registered, certified, and managed automatically in central control center - AMR server, authentication server, NMS server, and DB server.

  • PDF

Remote Integrated Management System for Applying Efficient Security Policy based on Linux (리눅스 기반의 효율적인 보안 정책 적용을 위한 원격통합관리시스템)

  • 김동환;김현성
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2002.11a
    • /
    • pp.72-81
    • /
    • 2002
  • Management for security product and application is becoming more difficult because they became more specialized. Most of research is focused on combining policies for information security management policy, security standard, and security tools. However, there are no researches for total solution for both application and security policy. Thereby, the purpose of this research is to propose a remote integrated management system based on linux. The system could efficiently manage data update for application and policy update for a server supporting the distinct configuration of each server. By using the remote integrated management system, system manager with poor secure knowledge also could easily manage their system securely.

  • PDF

Design of Mutual Authentication and Grouping Protocol Based On Network Control Server Applicable to General Purpose (범용적으로 적용 가능한 네트워크제어서버 기반의 상호인증 및 그룹핑 프로토콜 설계)

  • Park, Jungoh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.4
    • /
    • pp.13-23
    • /
    • 2017
  • In order to protect personal information and important information (confidential information, sales information, user information, etc.) in the internal network, companies and organizations apply encryption to the Server-To-Server or Server-To-Client communication section, And are experiencing difficulties due to the increasing number of known attacks and intelligent security attacks. In order to apply the existing S / W encryption technology, it is necessary to modify the application. In the financial sector, "Comprehensive Measures to Prevent the Recurrence of Personal Information Leakage in the Domestic Financial Sector" has been issued, and standard guidelines for financial computing security have been laid out, and it is required to expand the whole area of encryption to the internal network. In addition, even in environments such as U-Health and Smart Grid, which are based on the Internet of Things (IoT) environment, which is increasingly used, security requirements for each collection gateway and secure transmission of the transmitted and received data The requirements of the secure channel for the use of the standard are specified in the standard. Therefore, in this paper, we propose a secure encryption algorithm through mutual authentication and grouping for each node through H / W based Network Control Server (NCS) applicable to internal system and IoT environment provided by enterprises and organizations. We propose a protocol design that can set the channel.

A Design and Implementation of Two-Phase Server Login Authentication System based on XML-Signature Extension (XML-Signature 확장을 통한 2단계 서버 로그인 인증 시스템의 설계 및 구현)

  • Kim, Yong-Hwa;Kim, Jin-Sung;Kim, Yong-Sung
    • The KIPS Transactions:PartC
    • /
    • v.14C no.4
    • /
    • pp.321-330
    • /
    • 2007
  • This paper proposes a two-phase server login authentication system by XML-Signature schema extension to protect server's information resources opened on network which offer various web contents. A proposed system requests and publishes XML-based certificate through on-line, registers certificate extension information provided by CA(Certification Authority) to XCMS(XML Certificate Management Server), and performs prior authentication using user's certificate password. Then, it requests certificate extension information added by user besides user's certificate password and certificate extension information registered in XCMS by using SOAP message, and performs posterior authentication by comparing these certificate extension information. As a result, a proposed system is a security reinforced system compared with existing systems.

A Design Problem of a System Working at Both Primary Service and Secondary Service (주서비스와 보조서비스를 갖는 시스템 설계)

  • Kim, Sung-Chul
    • Korean Management Science Review
    • /
    • v.28 no.3
    • /
    • pp.15-29
    • /
    • 2011
  • In this paper, we consider a system working at both primary service and secondary service. A server can switch between the primary service and the secondary service or it can be assigned to secondary service as a dedicated server. A service policy is characterized by the number of servers dedicated to the secondary service and a rule for switching the remaining servers between two services. The primary service system is modelled as a Markovian queueing system and the throughput is a function of the number of servers, buffer capacity, and service policy. And the secondary service system has a service level requirement strategically determined to perform the service assigned. There is a revenue obtained from throughput and costs due to servers and buffers. We study the problem of simultaneously determining the optimal total number of servers, buffers, and service policy to maximize profit of the system subject to both an expected customer waiting time constraint of the primary service and a service level constraint of the secondary service and develop an algorithm which can be successfully applied with the small number of computations.

A Design and Implementation of Web-based Traffic Monitoring System for Management of Small-scale PC-room (소규모 실습실 관리를 위한 웹기반 트래픽 모니터링 시스템의 설계 및 구현)

  • Lee Kang-ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.4 s.32
    • /
    • pp.127-131
    • /
    • 2004
  • In this paper, I propose the web-based network traffic monitoring system to monitor computers running MS Windows in the small-scale PC-room. The system can support network and system operation, management, expansion, and design using network analysis and diagnosis to a network administrator. The whole system consists of two parts: analysis server for collection and analysis of the network information. and supports real-time monitoring of network traffic, and the web-based interface system. a client system shows user a graphical data that analyzed a returned result from the server. This system implements web-based technology using java and contributes to enhance the effectiveness of network administrator's management activities in PC-room by controlling and monitoring.

  • PDF

Issues in Next Generation Streaming Server Design

  • Won, Youjip
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2001.11a
    • /
    • pp.335-354
    • /
    • 2001
  • .Next Generation Multimedia Streaming Technology Massive Scale Support $\rightarrow$ Clustered Solution Adaptive to Heterogeneous Network daptive to Heterogeneous Terminal Capability Presentation Technique .SMART Server Architecture .HERMES File System .Clustered Solution . High Speed Storage Interconnect .' Content Partitioning . Load Management . Support for Heterogeniety . Adaptive End to End Streaming Transport: Unicast vs. Multicast '. Scalable Encoding

  • PDF

Load Balance System for the SFC Based DLP solution (SFC 기반 DLP 솔루션을 위한 부하분산 시스템)

  • Song, Wang-Eun;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.4
    • /
    • pp.451-453
    • /
    • 2016
  • In this paper, we propose a Load Balance System for SFC based on DLP solution. SFC based on DLP solution does not distribute to the user data and each DLP server manages all traffic generated by the user device. When using existing algorithms such as the Load Balance Round Robin, Least Connection does not consider the resource usage of DLP server so traffic is not efficiently distributed due to different user traffic usage. It causes system failure and overload of the DLP server. Therefore, we propose the architecture of a Load Balance system for SFC based on DLP solution to perform the Load Balance based on the resource usage of DLP server through a LBM server in this paper.