• Title/Summary/Keyword: SaaS(Software as Service)

Search Result 89, Processing Time 0.032 seconds

A Study on the Utilization of the SaaS Model UPnP Network in e-Trade (전자무역의 SaaS모형 UPnP 네트워크 활용방안에 관한 연구)

  • Jeong, Boon-Do;Yun, Bong-Ju
    • International Commerce and Information Review
    • /
    • v.14 no.4
    • /
    • pp.563-582
    • /
    • 2012
  • In this paper, UPnP Network SaaS model has been studied. Currently, this model of UPnP Network and the trade mission is being used by outsourcing. From now on, the introduction of new trading systems and existing systems and the commercialization of this model as a UPnP network service connection should work. The future of UPnP network SaaS model will become commercially available software, commercial software can be accessed remotely via the Internet should be. Customer site activities must be managed from a central location. Application software architecture, pricing, partnerships, management should not include the character models. N should be the model. When used in small and medium enterprises have a very high value.

  • PDF

A Method of Service Reuse using Analysis of Process Similarity and Meta Repository (프로세스 유사도 분석과 메타 저장소를 이용한 서비스 재사용 기법)

  • Hwang, Chi-Gon;Yoon, Chang-Pyo;Jung, Kye-Dong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.6
    • /
    • pp.1375-1380
    • /
    • 2014
  • SaaS at a cloud computing is a framework to provide a software as a service. Depending on the difference of the tenant and the use, if the service provider re-establish a service, they are required resources In terms of costs and managerial. So we propose a technique for analysis of software structure using the process algebra to reuse existing software. A process algebra analyze the structure of the software, express in different languages and verify that it can be reused. CCS in a process algebra is useful to convert the business process or XML, by using this, we structure a process as process view and propose meta storage for comparison and management a structured document.

Merits and Demerits of Information Security Education Using SaaS Based Virtual Training Systems (SaaS 기반 가상훈련 시스템을 이용한 정보보호 교육의 장단점)

  • Lee, Hae Young;Park, Hyun Min;Min, GyeongTae;Park, Young Sun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.01a
    • /
    • pp.211-212
    • /
    • 2019
  • 서로 다른 지역에서 서로 다른 과정의 실습 중심의 정보보호 단기 교육을 진행하기 위하여 SaaS 기반 가상훈련 시스템을 사용하였다. 본 논문에서는 SaaS 기반 가상훈련 시스템을 이용한 정보보호 실습 교육의 장단점을 정리한다. 강사 및 수강생들은 교육 과정 중 데스크톱 가상화를 사용하여 실습 환경을 구축하는 시간을 절약할 수 있었다. 또한, 원격 실습 지원, 진행 상황 확인도 가능하였다. 관리자는 강사 및 장소와 무관하게 균등한 실습 교육을 제공할 수 있다는 점이 가장 큰 장점이었다. 향후에는 서버 가상화와 데스크톱 가상화가 결합된 하이브리드 형태의 실습 환경 개발을 고려할 필요가 있다.

  • PDF

Resource Clustering Simulator for Desktop Virtualization Based on Intra Cloud (인트라 클라우드 기반 데스크탑 가상화를 위한 리소스 클러스터링 시뮬레이터)

  • Kim, Hyun-Woo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.1
    • /
    • pp.45-50
    • /
    • 2019
  • With the gradual advancement of IT, passive work processes are automated and the overall quality of life has greatly improved. This is made possible by the formation of an organic topology between a wide variety of real-life smart devices. To serve these diverse smart devices, businesses or users are using the cloud. The services in the cloud are divided into Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). SaaS runs on PaaS, and PaaS runs on IaaS. Since IaaS is the basis of all services, an algorithm is required to operate virtualization resources efficiently. Among them, desktop resource virtualization is used for resource high availability of unused state time of existing desktop PC. Clustering of hierarchical structures is important for high availability of these resources. In addition, it is very important to select a suitable algorithm because many clustering algorithms are mainly used depending on the distribution ratio and environment of the desktop PC. If various attempts are made to find an algorithm suitable for desktop resource virtualization in an operating environment, a great deal of power, time, and manpower will be incurred. Therefore, this paper proposes a resource clustering simulator for cluster selection of desktop virtualization. This provides a clustering simulation to properly select clustering algorithms and apply elements in different environments of desktop PCs.

Design of Integrated Management System for Electronic Library Based on SaaS and Web Standard

  • Lee, Jong-Hoon;Min, Byung-Won;Oh, Yong-Sun
    • International Journal of Contents
    • /
    • v.11 no.1
    • /
    • pp.41-51
    • /
    • 2015
  • Management systems for electronic library have been developed on the basis of Client/Server or ASP framework in domestic market for a long time. Therefore, both service provider and user suffer from their high cost and effort in management, maintenance, and repairing of software as well as hardware. Recently in addition, mobile devices like smartphone and tablet PC are frequently used as terminal devices to access computers through the Internet or other networks, sophisticatedly customized or personalized interface for n-screen service became more important issue these days. In this paper, we propose a new scheme of integrated management system for electronic library based on SaaS and Web Standard. We design and implement the proposed scheme applying Electronic Cabinet Guidelines for Web Standard and Universal Code System. Hosted application management style and software on demand style service models based on SaaS are basically applied to develop the management system. Moreover, a newly improved concept of duplication check algorithm in a hierarchical evaluation process is presented and a personalized interface based on web standard is applied to implement the system. Algorithms of duplication check for journal, volume/number, and paper are hierarchically presented with their logic flows. Total framework of our development obeys the standard feature of Electronic Cabinet Guidelines offered by Korea government so that we can accomplish standard of application software, quality improvement of total software, and reusability extension. Scope of our development includes core services of library automation system such as acquisition, list-up, loan-and-return, and their related services. We focus on interoperation compatibility between elementary sub-systems throughout complex network and structural features. Reanalyzing and standardizing each part of the system under the concept on the cloud of service, we construct an integrated development environment for generating, test, operation, and maintenance. Finally, performance analyses are performed about resource usability of server, memory amount used, and response time of server etc. As a result of measurements fulfilled over 5 times at different test points and using different data, the average response time is about 62.9 seconds for 100 clients, which takes about 0.629 seconds per client on the average. We can expect this result makes it possible to operate the system in real-time level proof. Resource usability and memory occupation are also good and moderate comparing to the conventional systems. As total verification tests, we present a simple proof to obey Electronic Cabinet Guidelines and a record of TTA authentication test for topics about SaaS maturity, performance, and application program features.

Cloud Security and Privacy: SAAS, PAAS, and IAAS

  • Bokhari Nabil;Jose Javier Martinez Herraiz
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.23-28
    • /
    • 2024
  • The multi-tenancy and high scalability of the cloud have inspired businesses and organizations across various sectors to adopt and deploy cloud computing. Cloud computing provides cost-effective, reliable, and convenient access to pooled resources, including storage, servers, and networking. Cloud service models, SaaS, PaaS, and IaaS, enable organizations, developers, and end users to access resources, develop and deploy applications, and provide access to pooled computing infrastructure. Despite the benefits, cloud service models are vulnerable to multiple security and privacy attacks and threats. The SaaS layer is on top of the PaaS, and the IaaS is the bottom layer of the model. The software is hosted by a platform offered as a service through an infrastructure provided by a cloud computing provider. The Hypertext Transfer Protocol (HTTP) delivers cloud-based apps through a web browser. The stateless nature of HTTP facilitates session hijacking and related attacks. The Open Web Applications Security Project identifies web apps' most critical security risks as SQL injections, cross-site scripting, sensitive data leakage, lack of functional access control, and broken authentication. The systematic literature review reveals that data security, application-level security, and authentication are the primary security threats in the SaaS model. The recommended solutions to enhance security in SaaS include Elliptic-curve cryptography and Identity-based encryption. Integration and security challenges in PaaS and IaaS can be effectively addressed using well-defined APIs, implementing Service Level Agreements (SLAs), and standard syntax for cloud provisioning.

A Design of Interdependent Multi Session Authentication Scheme for Secure Cloud Service (안전한 클라우드 서비스를 위한 상호의존적 다중세션 인증 기법 설계)

  • Song, Jun Ho;Choi, Do Hyun;Park, Jung Oh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.181-196
    • /
    • 2014
  • Cloud computer technology currently provides diverse services based on a comprehensive environment ranging from hardware to solution, network and service. While the target of services has been extended from institutions and corporations to personal infrastructure and issues were made about security problems involved with protection of private information, measures on additional security demands for such service characteristics are insufficient. This paper proposes a multi-session authentication technique based on the characteristics of SaaS (Software as a Service) among cloud services. With no reliable authentication authority, the proposed technique reinforced communication sessions by performing key agreement protocol safe against key exposure and multi-channel session authentication, providing high efficiency of performance through key renewal using optimzied key table. Each formed sessions have resistance against deprivation of individual confirmation and service authority. Suggested confirmation technique that uses these features is expected to provide safe computing service in clouding environment.

A Study of Advanced N-Tier Model for Improving Maintainability of Web Applications in Cloud Environment (클라우드 환경에서 웹 어플리케이션의 유지보수성 향상을 위한 N-계층 모델의 개선에 관한 연구)

  • Kim, In-Kyu;Shin, Joon-Chul
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.4
    • /
    • pp.537-552
    • /
    • 2013
  • Software-as-a-Service (SaaS) has led to paradigm shifts in the information management area by combining it with SOA and Mashup. System developers now have more chances to access various high-quality functions through API opened on the web. But external resources are controlled by service providers so that it raises the component's uncertainty in system management which is related to external resources. In the cloud environment, components related to external resources causes negative effects on system's maintainability by making them dependant on service providers. This study proposes a way to enhance maintainability by using stable external resources. For this work, we suggest the N+1-tier model in which an external resource tier is added to the N-tier model. After that, we analyze how adding an external resource tier affects the decreasing complexity of maintainability and improving maintainability on web application.

A Study on Current Status of Central Government's Cloud-System Adoption (공공기관의 클라우드 도입 배경 및 현황)

  • Yu, Young-Moon
    • Proceedings of Korean Society of Archives and Records Management
    • /
    • 2019.05a
    • /
    • pp.51-54
    • /
    • 2019
  • The transition of the central government system to the cloud-based infrastructure is being conducted as the National Information Resources Service (NIRS, Ministry of the Interior and Safety) attempts government resource integration. In the early days, it was attempted as Infrastructure as a Service (IaaS) for cloud service for HW, but now it is being converted to Software as a Service (SaaS) for ordinary service. General tasks of the system are document creation for government service as well as public records management. To this end, government cloud systems were deployed to central government agencies from 2015 to 2018 and planned to be gradually deployed in 2018. Nowadays, records management is conducted with cloud RMS, the cloud RMS system is distributed to the central government from 2016 to 2018, and the dissemination to local government is scheduled to be carried out considering the adoption of On-Nara system.