• Title/Summary/Keyword: Open Computing Environment

Search Result 204, Processing Time 0.032 seconds

An efficient ID-based authentication scheme based on the rth -residuosity problem in wireless environment (무선통신 환경에서 사용 가능한 고차잉여류 문제에 기반을 둔 자체 인증방식)

  • 이보영
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.2
    • /
    • pp.73-82
    • /
    • 1999
  • In an open network computing environment a host cannot to identity its users correctly to network services. In order to prevent this thing we present the design of a authentication scheme 솟 using the notion of rth -residuosity problem and discrete logarithm problem which is proposed by S. J. Park et al. The proposed scheme described here is efficient method for mutual authentication without leakage of users identity in mobile communication system that ensure user anonymity and untraceability.

An Open Source Mobile Cloud Service: Geo-spatial Image Filtering Tools Using R (오픈소스 모바일 클라우드 서비스: R 기반 공간영상정보 필터링 사례)

  • Kang, Sanggoo;Lee, Kiwon
    • Spatial Information Research
    • /
    • v.22 no.5
    • /
    • pp.1-8
    • /
    • 2014
  • Globally, mobile, cloud computing or big data are the recent marketable key terms. These trend technologies or paradigm in the ICT (Information Communication Technology) fields exert large influence on the most application fields including geo-spatial applications. Among them, cloud computing, though the early stage in Korea now, plays a important role as a platform for other trend technologies uses. Especially, mobile cloud, an integrated platform with mobile device and cloud computing can be considered as a good solution to overcome well known limitations of mobile applications and to provide more information processing functionalities to mobile users. This work is a case study to design and implement the mobile application system for geo-spatial image filtering processing operated on mobile cloud platform built using OpenStack and various open sources. Filtering processing is carried out using R environment, recently being recognized as one of big data analysis technologies. This approach is expected to be an element linking geo-spatial information for new service model development and the geo-spatial analysis service development using R.

XA and Non-XA Interface Methodology of an X/Open DTP-based Trading System in Finance Industry (X/Open DTP 기반 증권사 트레이딩 시스템에서의 XA/Non-XA 인터페이스 방법)

  • Kim, Yong-Tae;Byun, Chang-Woo;Park, Seog
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.5
    • /
    • pp.498-508
    • /
    • 2003
  • In the field of finance, Trading System of Securities is a very vulnerable application when it faces any small problems just for one minute. Since Trading System changes its environment from mainframes to client/server, its safety becomes the most important factor. Even though most If systems are configured by general guidelines currently, Trading System is an exception that it is configured by specific and rather ad hoc guidelines in order to ensure its safe management. In this thesis, I will prove the validity of specific and ad hoc configuration in the environment of Trading Systems where I use both XA interface system and Non-XA interface to configure its system based on 3-Tier Client/server computing environment through middleware, TP-Monitor, in the X/Open DTP Model. In order to validate the Trading System, I will compare and analyze the error of data of an order and ability to restore using both XA and Non-XA interfaces while testing take-over scenario on the assumption of the system's failure.

Database Security System for Information Protection in Network Environment

  • Jung, Myung-Jin;Lee, Chung-Yung;Bae, Sang-Hyun
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.211-215
    • /
    • 2003
  • Network security should be first considered in a distributed computing environment with frequent information interchange through internet. Clear classification is needed for information users should protect and for information open outside. Basically proper encrypted database system should be constructed for information security, and security policy should be planned for each site. This paper describes access control, user authentication, and User Security and Encryption technology for the construction of database security system from network users. We propose model of network encrypted database security system for combining these elements through the analysis of operational and technological elements. Systematic combination of operational and technological elements with proposed model can construct encrypted database security system secured from unauthorized users in distributed computing environment.

  • PDF

Data Resource Management under Distributed Computing Environment (분산 컴퓨팅 환경하에서의 데이타 자원 관리)

  • 조희경;안중호
    • Proceedings of the Korea Database Society Conference
    • /
    • 1994.09a
    • /
    • pp.105-129
    • /
    • 1994
  • The information system of corporations are facing a new environment expressed by miniaturization, decentralization and Open System. It is therefore of utmost importance for corporations to adapt flexibly th such new environment by providing for corresponding changes to their existing information systems. The objectives of this study are to identify this new environment faced by today′s information system and develop effective methods for data resource management under this new environment. In this study, it is assumed that the new environment faced by information systems can be specified as Distributed Computing Environment, and in order to achieve such system, presents Client/server architecture as its representative computing structure, This study defines Client/server architecture as a computing architecture which specialize the fuctionality of the client system and the server system in order to have an application distribute and perform cooperative processing at the best platform. Furthermore, from among the five structures utilized in Client/server architecture for distribution and cooperative processing of application between server and client this study presents two different data management methods under the Client/server environment; one is "Remote Data Management Method" which uses file server or database server and. the other is "Distributed Data Management Method" using distributed database management system. The result of this study leads to the conclusion that in the client/server environment although distributed application is assumed, the data could become centralized (in the case of file server or database server) or decentralized (in the case of distributed database system) and the data management method through a distributed database system where complete responsibility and powers with respect to control of data used by the user are given not only is it more adaptable to modern flexible corporate environment, but in terms of system operation, it presents a more efficient data management alternative compared to existing data management methods in terms of cutting costs.

  • PDF

Design and Implementation of Mobile Web Map Service (모바일을 위한 웹지도 서비스의 설계 및 구현)

  • Choi, Jae-Young;Chung, Yeong-Jee
    • Journal of Internet Computing and Services
    • /
    • v.6 no.5
    • /
    • pp.97-110
    • /
    • 2005
  • Recently, many WMS(Web Map Services) and POI(Point of Interest) services come to be in service on the Internet using Web GIS(Geographic Information System) as Information Technology and computer H/W are evolved faster in its speed, network bandwidth and features. The Web GIS is, however, limited and constrained on the specification of its system configuration, the service class provided and the presentation methodology of a map. As the mobile Internet becomes popular in mobile service, Web GIS service on mobile environment is strongly required and to be provided by location based WMS(Web Map Service) on a mobile client such as PDA with location information of the user. In this paper, we made an effort to design and implement a GIS computing environment by thin client for mobile web map service. For implementing the thin client GIS computing environment. we were using NGII's(National Geographic Information Institute's) DXF map, representing the map by SVG(Scalable Vector Graphics) recommended by OGC(OpenGis Consortium), and adapting standard XML web service to provide the thin client GIS service on PDA by applying the location information of the user in realtime with GPS on mobile environment.

  • PDF

Addressing User Requirements in Open Source Software: The Role of Online Forums

  • Raza, Arif;Capretz, Luiz Fernando
    • Journal of Computing Science and Engineering
    • /
    • v.8 no.1
    • /
    • pp.57-63
    • /
    • 2014
  • User satisfaction has always been important in the success of software, regardless of whether it is closed and proprietary or open source software (OSS). OSS users are geographically distributed and include technical as well as novice users. However, it is generally believed that if OSS was more usable, its popularity would increase tremendously. Hence, users and their requirements need to be addressed in the priorities of an OSS environment. Online public forums are a major medium of communication for the OSS community. The research model of this work studies the relationship between user requirements in open source software and online public forums. To conduct this research, we used a dataset consisting of 100 open source software projects in different categories. The results show that online forums play a significant role in identifying user requirements and addressing their requests in open source software.

Development of an Integrated IaaS+PaaS Environment for Providing Cloud Computing Service in a BIM Platform for Harbor Facilities (항만 BIM 플랫폼의 클라우드 서비스를 위한 IaaS+PaaS 통합 환경 개발)

  • Moon, Hyoun-Seok;Hyun, Keun-Ju;Kim, Won-Sik
    • Journal of KIBIM
    • /
    • v.9 no.4
    • /
    • pp.62-74
    • /
    • 2019
  • Because the existing BIM platform is based on user services, the focus is on the development of SaaS (Software as a Service), which provides business services online. However, since a harbor is a security facility, the harbor BIM platform is preferably provided in a private form, rather than relying on the infrastructure environment provided by external cloud providers. Therefore, this study analyzes and reviews the main functions to be provided as SaaS services of the harbor BIM platform. The goal is to build a cloud-based harbor BIM platform that can provide this service to users. To this end, we built IaaS (Infrastructure as a Service) environment of the harbor BIM platform based on the open source Open Stack and integrate and develop PaaS environment with Open Shift applied with IaaS. We applied the GPU to the harbor BIM platform to verify the performance of the harbor BIM platform, and found that the rendering and loading times are improved. In particular, it is expected to reduce the cost of introduction and provide it as the basic cloud environment of similar BIM platform for infrastructure facilities.

The Construction and Utilization of Cloud Computing Environment with Openstack (Openstack을 이용한 Cloud Computing 환경 구축 및 활용)

  • Kim, YoungHoon;Ji, Hoyoung;Moon, BongKyo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.60-63
    • /
    • 2017
  • Cloud Computing 환경은 사용자로 하여금 네트워크를 통하여 운영플랫폼, 저장매체 등이 운영 가능한 컴퓨터 자원을 신속하게 이용할 수 있는 컴퓨팅 환경이다. 이 환경을 이용하여 사용자들에게 가상의 컴퓨팅 공간을 만들어 resource를 사용하게 만들어주는 Iaas(Infrastructure as a Service)가 급증하고 있다. OpenStack은 Cloud Computing 환경을 이용하여 사용자로 하여금 *aaS제공을 가능하게 해주는 오픈소스 소프트웨어 프로젝트이다. 이 연구는 Openstack을 활용하여 Cloud환경을 구축하고, 이를 활용 하는 방안에 대한 연구이다. GitLab를 이용한 GitLab Service Launching을 시도하고, Hadoop을 통하여 Cloud 환경을 활용한 분산처리 시스템을 구현, Cloud의 활용 방안을 탐구한다.