• Title/Summary/Keyword: Middleware Security

Search Result 85, Processing Time 0.027 seconds

A Case Study on the Testing of Middleware software (미들웨어 소프트웨어의 시험사례 연구)

  • Yang, Hae-Sool;Lee, Ha-Yong;Park, Ju-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.7
    • /
    • pp.110-120
    • /
    • 2009
  • Recently raising the recognition and it joins in about software quality evaluation and authentication and the recognition is augmented in about importance of the high quality security which leads a quality investment from the software development enterprise. The quality investor do to become accomplished but substantially from which degree level, quality investment it leads and the verification of software quality improvement does not become accomplished substantially and with without being it does and wants the enterprises where are clear the quality improvement which leads a quality investment does not set the direction where the problem occurs. From the research which it sees international ISO/IEC 9126 where it is standard and in about software test ISO/IEC 12119 where it is a guide it constructed the metric in base and software tentative instance it led and is accumulated and the defect data which it analyzed. result escape it investigated/to analyze quality level and it analyzed is weak from development process part and a defect level and the quality rating instance of Middleware] software and escape a disposal plan it investigated. The research which it sees it leads and it induces it is quantitative/that there is a possibility of being sufficient it sees the quality increase of Middleware software and the demand which is qualitative.

Security Vulnerability Analysis and Discussion for Home Network (홈 네트워크를 위한 보안취약점 분석 및 고찰)

  • Park, SenogJoon;Youn, Hee Yong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.01a
    • /
    • pp.273-276
    • /
    • 2015
  • 홈 네트워크는 가정 내에서 여러 기기들을 유 무선으로 연결 후 네트워크를 구성하여 서로 데이터를 공유한다. 가정 내 기기들은 컴퓨팅 기능이 저하되기 때문에 보안취약점을 이용한 사이버 범죄에 노출되어 있다. 따라서 사이버 범죄 및 개인정보의 유출을 방지하기 위해 유 무선 보안취약점 및 대응방안을 파악할 필요가 있다. 본 논문은 홈 네트워크의 보안 개선을 위해 미들웨어의 보안기능 및 홈 네트워크의 보안취약요인을 분석하고, 보안취약점 개선 방안을 제안한다.

  • PDF

A Design CORBA Security Service for DataBase Security in Ubiquitous Computing (유비쿼터스 환경의 데이터베이스 보안을 위한 CSS 설계)

  • Lee, Dae-Sik;Yun, Dong-Sic;Ahn, Heui-Hak
    • Convergence Security Journal
    • /
    • v.5 no.3
    • /
    • pp.15-22
    • /
    • 2005
  • The spread of Internet and the appear of Downsizing, SI(System Integration) is chaning centralized computing to distributed computing. Also distributed computing is rapidly changing to Ubiquitous computing escape from hard wire connected network. CORBA(Common Object Request Broker Architecture) is a middleware that used for smoothness communication between application program and operation system in a different environment. However distributed computing environment is not safe from the danger, the attack like virus, worm is too intellectual and variety. In this paper, we design a new DB security model and suggest efficiency of it in Ubiquitous environment base on CSS(CORBA Security Service) that present ed from OMG(Object Management Group).

  • PDF

Design and Development of Middleware for Clinical Trial System based on Brain MR Image (뇌 MR 영상기반 임상연구 시스템을 위한 미들웨어 설계 및 개발)

  • Jeon, Woong-Gi;Park, Kyoung-Jong;Lee, Young-Seung;Choi, Hyun-Ju;Jeong, Sang-Wook;Kim, Dong-Eog;Choi, Heung-Kook
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.6
    • /
    • pp.805-813
    • /
    • 2012
  • In this paper, we have designed and developed a middleware for an effectively approaching database to the existed brain disease clinical research system. The brain disease clinical research system was consisted of two parts i.e., a register and an analyzer. Since the register collects the registration data the analyzer yields a statistical data which based on the diverse variables. The middleware has designed to database management and a large data query processing of clients. By separating the function of each feature as a module, the module which was weakened connectivity between functionalities has been implemented the re-use module. And image data module used a new compression method from image to text for an effective management and storage in database. We tested the middleware system using 700 actual clinical medical data. As a result, the total data transmission time was improved maximum 115 times faster than the existing one. Through the improved module structures, it is possible to provide a robust and reliable system operation and enhanced security functionality. In the future, these middleware importances should be increased to the large medical database constructions.

A Study on Location-Based Services Based on Semantic Web

  • Kim, Jong-Woo;Kim, Ju-Yeon;Kim, Chang-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.12
    • /
    • pp.1752-1761
    • /
    • 2007
  • Location-based services are a recent concept that integrates a mobile device's location with other information in order to provide added value to a user. Although Location-based Services provide users with comfortable information, it is a complex task to manage and share heterogeneous and numerous data in decentralized environments. In this paper, we propose the Semantic LBS Model as one of the solution to resolve the problem. The Semantic LBS Model is a LBS middleware model that includes an ontology-based data model for LBS POI information and its processing mechanism based on Semantic Web technologies. Our model enables POI information to be described and retrieved over various domain-specific ontologies based on our proposed POIDL ontology. This mechanism provide rich expressiveness, interoperability, flexibility in describing and using information about POls, and it can enhance POI retrieval services.

  • PDF

Run-Time Infrastructure on GRID(RTI-G) (Globus를 이용한 Run-Time Infrastructure 설계 및 구현)

  • 진정훈;이태동;유승훈;장재형;임중호;정창성
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.370-372
    • /
    • 2003
  • 본 논문은 GRID 상에서 HLA(High Level Architecture)를 기반으로 한 분산 객체 지향 simulation을 위한 네트워크 하부구조인 Run-Time Infrastructure (이하 RTI)의 디자인과 구현에 관해 기술한다. RTI는 지리적으로 떨어진 응용 프로그램간의 정보 교환 외에도, 접속 사양에 정의된 다양한 서비스를 제공하는 middleware이다. GRID는 전세계에 펼쳐져 있는 자원들에 대한 관리와 접근, 사용을 위한 다양한 기능과 안전하고 편리한 security를 보장한다. 본 논문에서는 globus toolkit에서 지원하는 security와 자원 접근 방법을 사용해서 RTI에 보안과 자원의 동적 할당을 부여해서 RTI를 이용한 simulation에 뛰어난 상호 연동 능력과 대규모의 프로젝트를 위한 광범위한 자원을 보다 안전하고 효율적으로 사용할 수 있도록 하는 환경을 구현하였다.

  • PDF

OPEN LBS PLATFORM ARCHITECTURE

  • Choi, Hae-Ock
    • Proceedings of the KSRS Conference
    • /
    • 2002.10a
    • /
    • pp.854-859
    • /
    • 2002
  • Location Based Services, or LBS refers to value-added service by processing information utilizing mobile user location. With the rapidly increasing wireless internet subscribers and world LBS market, the various location based applications are introduced such as buddy finder, proximity and security services. As the killer application of the wireless internet, the LBS has preconsidered technology about location determination technology, LBS middleware server for various application, and diverse contents processing technology. This paper describes the open architecture for LBS platform ensuring interoperability among the wireless networks and various location-based application services and the functional requirements for the LBS platform. The LBS platform in a narrow sense provides a standard interfaces for location management and network management for location services as follows, positioning (location acquisition through network or/and handset), location managing, location based functions, profile management, authentication and security, location based billing, information roaming between carriers and the system monitoring independent to specific network or ISP/CPs(Content Providers).

  • PDF

A Security Description Assistance in Web Services (웹서비스에서 보안 설정 지원)

  • Hung, Pham Phuoc;Nasridinov, Aziz;Byun, Jeong-Yong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.956-959
    • /
    • 2011
  • When SOAP message in Web Services has sensitive and important data, it is necessary to protect the message from XML rewriting attacks. These attacks create a foundation for typical faults in SOAP message and make it vulnerable to use in Web Service environment. Currently, Web Services middleware offers limited functions to detect these faults and possibly fix them. In this paper, we propose a Security Description Assistance which identifies and fixes typical faults in SOAP messages. Our system adapts simulation-based approach, which allows system to self-optimize its performance in different conditions and thus improve the reliability of Web Services.

Design of Access Control System based RBAC for Home Network Services (홈 네트워크 서비스를 위한 RBAC 기반의 접근제어 시스템의 설계)

  • Kim, Do-Woo;Kim, Geon-Woo;Lee, Jun-Ho;Han, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.833-836
    • /
    • 2005
  • Compared to corporation and government networks, home devices and services connected in a home networks has security threats because of the use of various wired and wireless network, middleware and protocol in digital home environment, a restricted system resource of home information appliances and the users who do not care about security. So security is critical element to provide secure services in a home network environments. In this paper we design the access control system based on RBAC to offer secure home network services.

  • PDF

Filtering and Intrusion Detection Approach for Secured Reconfigurable Mobile Systems

  • Idriss, Rim;Loukil, Adlen;Khalgui, Mohamed;Li, Zhiwu;Al-Ahmari, Abdulrahman
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.5
    • /
    • pp.2051-2066
    • /
    • 2017
  • This paper deals with reconfigurable secured mobile systems where the reconfigurability has the potential of providing a required adaptability to change the system requirements. The reconfiguration scenario is presented as a run-time automatic operation which allows security mechanisms and the addition-removal-update of software tasks. In particular, there is a definite requirement for filtering and intrusion detection mechanisms that will use fewer resources and also that will improve the security on the secured mobile devices. Filtering methods are used to control incoming traffic and messages, whereas, detection methods are used to detect malware events. Nevertheless, when different reconfiguration scenarios are applied at run-time, new security threats will be emerged against those systems which need to support multiple security objectives: Confidentiality, integrity and availability. We propose in this paper a new approach that efficiently detects threats after reconfigurable scenarios and which is based on filtering and intrusion detection methods. The paper's contribution is applied to Android where the evaluation results demonstrate the effectiveness of the proposed middleware in order to detect the malicious events on reconfigurable secured mobile systems and the feasibility of running and executing such a system with the proposed solutions.