• Title/Summary/Keyword: Mobile Server

Search Result 1,299, Processing Time 0.031 seconds

Design and Implementation of Extended Web Map Service Interfaces for Mobile Applications (모바일 응용을 위한 웹 맵 서비스 확장 인터페이스의 설계 및 구현)

  • Jo, Dae-Soo;Oh, Byung-Woo
    • Journal of Korea Spatial Information System Society
    • /
    • v.7 no.3 s.15
    • /
    • pp.93-106
    • /
    • 2005
  • Recently, the web map services with standard interfaces have been developed to a high degree for the purpose of sharing of spatial data through the web. Among the various kinds of works related, the specification for the web map service released by Open Geospatial Consortium (OGC) is the most prominent, and is nearly adopted as international standard (ISO/DIS 19128) in developing the web map servers. The web map server of OGC, however, provides the insufficient capabilities for mobile applications. Unlike the wired applications, the mobile applications would require the map server to minimize of size of data transferred, because the size of data is very important factor in communication cost and the response time of map clients. And the mobile applications require different quality of map according to the screen size of mobile devices. The mobile application, also require some application specific queries. In this paper, We have Proposed the interfaces for mobile web map services (M-WMS) which fully comply with the standard interfaces proposed in OGC. And we have designed and implemented the web map server for mobile map services. This paper has contributed to construction and practical use of the web map servers in mobile applications, such as LBS and telematics.

  • PDF

Mepelyzer : Malicious App Identification Mechanism based on Method & Permission Similarity Analysis of Server-Side Polymorphic Mobile Apps (Mepelyzer : 서버 기반 다형상 모바일 앱에 대한 메소드 및 퍼미션 유사도 기반 악성앱 판별)

  • Lee, Han Seong;Lee, Hyung-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.3
    • /
    • pp.49-61
    • /
    • 2017
  • Recently, convenience and usability are increasing with the development and deployment of various mobile applications on the Android platform. However, important information stored in the smartphone is leaked to the outside without knowing the user since the malicious mobile application is continuously increasing. A variety of mobile vaccines have been developed for the Android platform to detect malicious apps. Recently discovered server-based polymorphic(SSP) malicious mobile apps include obfuscation techniques. Therefore, it is not easy to detect existing mobile vaccines because some other form of malicious app is newly created by using SSP mechanism. In this paper, we analyze the correlation between the similarity of the method in the DEX file constituting the core malicious code and the permission similarity measure through APK de-compiling process for the SSP malicious app. According to the analysis results of DEX method similarity and permission similarity, we could extract the characteristics of SSP malicious apps and found the difference that can be distinguished from the normal app.

A Design of Mobile Web Server Framework for SOAP Transaction and Performance Enhancement in Web2.0 (웹2.0에서 SOAP 처리와 성능 향상을 위한 모바일 웹 서버 프레임워크의 설계)

  • Kim, Yong-Tae;Jeong, Yoon-Su;Park, Gil-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.10
    • /
    • pp.1866-1874
    • /
    • 2008
  • Existing web server lowers the whole capacity of system because of the problem on the processing load of server by closing connection increasing code handshake operation, and remarkable decrease of server capacity if it is the state of overload. Also, there occurs disadvantages of increasing connection tine about client's request and response time because handling of client's multi-requests is not smooth because of thread block and it requests a lot of time and resources for revitalization of thread. Therefore, this paper proposes the extended web server which provides the technique for delay handling and improves the overload of server for better system capacity, communication support, and the unification which is the advantage of web service. And it evaluates the existing system(implemented at Tomcat 5.5) and the proposed mobile web server architecture. The extended server architecture provides excellent exchange condition for system capacity and evaluates improved web server architecture which combines multi-thread with thread pool. The proposed web service architecture in this paper got the better result of improved capacity benefit than the evaluation result of original Tomcat 5.5.

Design of Security Protocol for RFID System using Mobile Reader (이동형 리더를 사용하는 RFID시스템의 보안 프로토콜 설계)

  • Jang, Bong-Im;Kim, Chang-Su;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.954-955
    • /
    • 2012
  • Recently as increasing the use of mobile communication devices the use of mobile readers for recognition tag attached to objects is also increasing. Accordingly, meantime, that gives rise to the vulnerability of RFID systems between reader and tag security issues, as well as security issues between the reader and the back-end server will occur. In this paper between the reader and the back-end server to security vulnerabilities efficient authentication protocol using the hash function is proposed.

  • PDF

Location Management Strategy Based on Working Set for Personal Communications Network (PCN 환경을 위한 Working Set 기반의 위치 관리 기법)

  • Im, Seong-Bin;Eom, Yeong-Ik
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.4
    • /
    • pp.1279-1289
    • /
    • 2000
  • Recently, research activities for combining portable computer technology and wireless communication technology are in progress to realize mobile computing environment that designed to support mobile hosts in the existing network environments. For PCN environments, the location management strategies are particularly emphasized among various strategies necessary for the mobile computing environment. Location management strategy for PCN environment, which is mostly based on the IS-41 standards brings an issue that additional network traffics are generated to deliver updata messages to home location server whenever a mobile host changes its location server. In this paper, we propose an innovative updata strategy and a search strategy that resolves the problem shown in the IS-41 scheme for HLR/VLR structure of CDMA environments. Also, this paper presents the performance comparison of proposed scheme and scheme used in IS-41 obtained from a simulation. The simulation was conducted based on the number of messages, the rate of database accesses, and the number of hops visited when the location management scheme is executed.

  • PDF

A Generic Framework for Reliable Mobile Client-Server System in Mobile Database Environments (모바일 데이터베이스 환경의 신뢰성 보장 모바일 클라이언트-서버 프레임워크)

  • Joo, Hae-Jong;Hong, Suk-Joo;Park, Young-Bae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.35-38
    • /
    • 2005
  • 본 논문은 모바일 클라이언트-서버(Mobile Client-Server) 환경에서 모바일 데이터베이스 시스템 특성상 가질 수 있는 무선 네트워크의 약한 연결성 및 접속성 단절로 인한 데이터베이스 비축(Database Hoarding)과 관련된 문제, 공유 데이터(Shared Data)의 일관성(Consistency) 유지 문제, 그리고 로그(Log) 최적화 문제를 해결하기 위한 모바일 질의 처리 시스템(MQPS : Mobile Query Processing System)을 포함하는 새로운 모바일 클라이언트-서버 시스템을 제안하는데 목적이 있다.

  • PDF

A Performance Comparison of the Mobile Agent Model with the Client-server Model under Security Conditions

  • Jeong, Ki-Moon;Han, Seung-Wan;Lim, Hyeong-Seok
    • Proceedings of the IEEK Conference
    • /
    • 2000.07b
    • /
    • pp.977-981
    • /
    • 2000
  • The traditional client-server model RPC and mobile agents have been used for interprocess communication between processes in different hosts. The performances of two mechanisme were analyzed in the literature [4, 6, 9]. But the security services which extensively affect the performance of systems because of low speed have not been considered. We propose two performance models considering the security services for the RPC and the mobile agent Through the analysis of the models, we show that the execution time of the mobile agent takes less than the RPC In the environment considering security services.

  • PDF

Interworking between PPP CHAP and RADIUS Authentication Server on GPRS Network (GPRS 망에서 PPP CHAP과 RADIUS 인증 서버 연계 방안)

  • 박정현;이상호
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.5
    • /
    • pp.567-577
    • /
    • 2003
  • We usually applied PPP CHAP (Point-to-Point Protocol Challenge Handshake Authentication Protocol) when the visited ISP subscriber accesses to authentication server in own home ISP network and IP Assignment for remote Internet service. But PPP CHAP doesn't support in case of visited ISP subscriber in GPRS network accesses to authentication server in own home ISP network for wireless Internet service. We suggest solution this problem with PPP CHAP improvement. For this we propose the modified PPP CHAP message format, PCO Message format at MT, and interworking message and format between GGSN and RADIUS in home ISP network for wireless internet service of mobile ISP subscriber at GPRS network in this paper. We also show authentication results when visited mobile ISP subscriber via PPP CHAP at GPRS network accesses the RADIUS server in home ISP network.

Mobile Cloud Computing-based Agent Application Model (모바일 클라우드 기반 에이전트 모델)

  • Ahn, Kwang-Min;Lee, Bong-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.608-611
    • /
    • 2012
  • In this paper, a mobile cloud-based agent model is proposed in order to overcome the resource constraints and the difficulties of installing a variety of complex applications in mobile devices. The proposed software architecture overcomes the disadvantages of mobile devices and maximizes usage of cloud services by implementing the function of mobile agent concept. The significant portion of the cloud services is run in the cloud server and the client application implemented in the mobile device can call and control appropriate service from the cloud server. Thus, the inherent weakness of the mobile can be overcome by executing the target applications on cloud nodes.

  • PDF

A New Optimistic Concurrency Control Method for Mobile Transactions (이동 트랜잭션을 위한 새로운 낙관적 동시성 제어 방법)

  • Kim, Chi-Yeon;Bae, Seok-Chan
    • The KIPS Transactions:PartD
    • /
    • v.10D no.3
    • /
    • pp.439-446
    • /
    • 2003
  • A crucial limitation in environments where data is broadcast to very large client populations is the low bandwidth available for clients to communicate with servers. Many advanced applications are developed in mobile computing environments, but conventional concurrency controls are not suitable because of the low bandwidth of wireless network. In this paper, we propose a new optimistic concurrency control protocol for mobile transactions. In this protocol, mobile read-only transactions can be completed locally at the clients without additional communication, only mobile update transactions are sent to the server for global validation. Our protocol reduces unnecessary aborts occurred in the previous study using only conflict information. In addition to, our algorithm can detect and resolve non-serializable execution using by data table maintained in a server.