• Title/Summary/Keyword: Service Requirements

Search Result 1,853, Processing Time 0.03 seconds

Design of Access Control Model for Secure EDI Service (안전한 EDI 서비스를 위한 접근제어 모델 설계)

  • Park, Jin-Ho;Chung, Jin-Wook
    • Journal of Digital Contents Society
    • /
    • v.1 no.1
    • /
    • pp.23-37
    • /
    • 2000
  • EDI is basically the concept of computer-to-computer exchange of messages relating to various types of activities or business areas, such as banking, trade, medicine, publishing, etc. Therefore, security, reliability and special functionality will be implicit requirements of EDI systems. We will design access control model to content security of these requirements. Access controls in information systems are responsible for ensuring that all direct access to the entities occur exclusively according to the access modes and rules fixed by security policies. On this paper, security policies for access control model are presented from the viewpoints of identity-based, rule-based, role-based policy. We give a design of access control model for secure EDI service based on the derived access control rules and operations to enforce the defined security policies. The proposed access control model provides integrity, confidentiality and a flow control of EDI messages.

  • PDF

A Study on the Multimedia Communication and Distance Education for Information Society (정보화 사회에 따른 멀티미디어 통신과 원격교육에 관한 연구)

  • 정재영;김석수
    • Journal of the Korea Society of Computer and Information
    • /
    • v.4 no.1
    • /
    • pp.15-20
    • /
    • 1999
  • In this paper, we propose some essential requirements for CBM(Computer Based Multimedia) based distance education. This is a class of multimedia distance education in which the multimedia technique is combined with the distance home education application that is real time collaborative application on cyber-space using the information super highway. Requirements in this paper is observed standard at ITU(International Telecommunication Union). international standardization organization for multimedia communication. And. a structure for integrated home information service on the information super highway is based on IEEE 1394 serial communication and POF(Plastic Optical Fiber) home backbone that is study for application service according to the multimedia based distance home study system.

  • PDF

Adaptive Online Bandwidth Management Algorithms for Multimedia Cellular Networks (멀티미디어 셀룰러 네트워크 상에서의 효율적인 온라인 대역폭 관리기법에 대한 연구)

  • Kim Sung-Wook
    • The KIPS Transactions:PartC
    • /
    • v.13C no.2 s.105
    • /
    • pp.171-176
    • /
    • 2006
  • Bandwidth is an extremely valuable and scarce resource in a wireless network. Therefore, efficient bandwidth management is necessary in order to provide high qualify service to users with different requirements in a multimedia wireless/mobile network. In this paper, we propose an on-line bandwidth reservation algorithm that adjusts bandwidth reservations adaptively based on existing network conditions. The most important contribution of our work is an adaptive algorithm that is able to resolve conflicting performance criteria - bandwidth utilization, call dropping and call blocking probabilities. Our algorithm is quite flexible, is responsive to current traffic conditions in cellular networks, and tries to strike the appropriate performance balance between contradictory requirements for QoS sensitive multimedia services.

Delay-Margin based Traffic Engineering for MPLS-DiffServ Networks

  • Ashour, Mohamed;Le-Ngoc, Tho
    • Journal of Communications and Networks
    • /
    • v.10 no.3
    • /
    • pp.351-361
    • /
    • 2008
  • This paper presents a delay-margin based traffic engineering (TE) approach to provide end-to-end quality of service (QoS) in multi-protocol label switching (MPLS) networks using differentiated services (DiffServ) at the link level. The TE, including delay, class, and route assignments, is formulated as a nonlinear optimization problem reflecting the inter-class and inter-link dependency introduced by DiffServ and end-to-end QoS requirements. Three algorithms are used to provide a solution to the problem: The first two, centralized offline route configuration and link-class delay assignment, operate in the convex areas of the feasible region to consecutively reduce the objective function using a per-link per-class decomposition of the objective function gradient. The third one is a heuristic that promotes/demotes connections at different links in order to deal with concave areas that may be produced by a trunk route usage of more than one class on a given link. Approximations of the three algorithms suitable for on-line distributed TE operation are also derived. Simulation is used to show that proposed approach can increase the number of users while maintaining end-to-end QoS requirements.

Design and Implementation of SOA based S/W Services for Dynamic Behavior of Embedded System (임베디드 시스템의 유기적인 동작을 위한 SOA기반의 S/W서비스 설계와 구현)

  • Park, Won-Kyu;Park, Young-Bum
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.4
    • /
    • pp.29-34
    • /
    • 2010
  • As the nature of the embedded system, it is operated by user specified requirements, the dynamic action(behavior) is needed when the user's requirements change or unexpected situations occur. In this paper, it is proposed that design and implementation of SOA(Service-oriented architecture) based S/W services for dynamic behavior of embedded System. In this proposed technique, the status of embedded system can be checked through Web services, and in the cases of exceptional situations, the required proper actions can be newly updated through Web services. Through this technique, the burden of users concerning exceptional situations can be reduced, and the convenience of use can increased as well.

The Simplified V2V Communication Authentication Service for Privacy Protection (프라이버시 보호를 위한 V2V 통신 인증 서비스의 간략화)

  • Park, Sung-Su;Han, Keun-hee;Kim, Keecheon
    • Journal of Internet of Things and Convergence
    • /
    • v.2 no.1
    • /
    • pp.35-40
    • /
    • 2016
  • One of the next generation of automotive V2V communication technology is a core technology for next-generation ITS as a technique used for communications between the vehicle. Looking at the existing V2V communication using the pseudonym certificate authentication service structure to meet the security requirements for privacy protection. Since the issuance of multiple certificates when needed authority in issuing and managing to use the pseudonym certificate issued once and it takes a lot of time. In this paper, we present the method utilizing a vehicle ID to meet the security requirements for the privacy protection without the use of a pseudonym certificate.

Scheduling Tasks for a Time Sharing Computer System with a Single Processor

  • 차동완
    • Communications of the Korean Institute of Information Scientists and Engineers
    • /
    • v.5 no.1
    • /
    • pp.04-10
    • /
    • 1987
  • We consider a time sharing computer system with a single processor where tasks ofK different types arrive at the system according to independent time homogeneous Poisson processes from outside. A task, after given a quantum for processing, leaves the system, or changes the type and rejoins the system according to specified probabilitycs. While many existing priority time sharing models determine the priorities of tasks strictly by their service time requirements, this paper develops a new scheduling rule wherein the importances or urgencies in addition to the service time requirements of tasks are counted, by inposing an appropriate reward structure on the system. Also presented is the algorithm through which to determine the rankings of K types according to this new scheduling rule.

Interbed Networks in la Patient Monitoring System (환자 모니터링 시스템에서의 통신 방식(II): 인터베드 통신망)

  • 박승훈;우응제;김경수;최근호;김승태
    • Journal of Biomedical Engineering Research
    • /
    • v.18 no.4
    • /
    • pp.381-388
    • /
    • 1997
  • In this paper, we present the design and implementation of the interbed network communication protocol, which links patient monitors, central stations, DB servers, and clinical workstations together in a patient monitoring system. We describe the requirements to be met thor real-time patient monitoring, propose 2 services Patient Locator Service(PL:7) and Remote Patient Monitoring Service( RPMS). PLS provides the information about how many patients are currently being monitored and where they are located, while RPMS allows the doctors to monitor their patients'vital sign in real-time. The messages for the services, their formats and exchange scheme are also presented with a whole picture of how they are implemented. We adopted the object-oriented programming paradigm in all the analysis and design processes. In the experiment performed in a real clinical setting, the services turned out to meet all the requirements needed for real-time patient monitoring.

  • PDF

Development of the Home Location Register/Authentication Center in the CDMA Mobile System

  • Lim, Sun-Bae;Shin, Kyeong-Suk;Kim, Hyun-Gon
    • ETRI Journal
    • /
    • v.19 no.3
    • /
    • pp.186-201
    • /
    • 1997
  • In this paper, a home location register (HLR) for CDMA mobile communication system (CMS) is introduced. It stores the mobile station (MS) subscribers locations and supplementary service information. Call processing procedures for HLR are developed to receive and store subscriber's location coming from mobile exchange (MX) during the location registration, and to transfer subscriber's location and supplementary service information to the MX during the mobile-terminated call setup. For fast call processing by increasing database access speed, a memory-resident database management system is devised. For Easy and secure HLR operation, administration and maintenance functions and overload control mechanisms are implemented. Designed HLR hardware platform is expandable and flexible enough to reallocated software blocks to any subsystems within the platform. It is configurable according to the size of subscribers. An authentication center (AC) is developed on the same platform. It screens the qualified MS from the unqualified. The calls to and from the unqualified MS are rejected in CMS. To authenticate the MS, the AC generates a new authentication parameter called "AUTHR" using shared secret data (SSD) and compared it with the other AUTHR received from the MS. The MC also generates and stores seed keys called "A-keys" which are used to generate SSDs. The HLR requirements, the AC requirements, software architecture, hardware platform, and test results are discussed.

  • PDF

Adaptive Convergence Security Policy and Management Technology of Home Network (홈 네트워크에서의 적응적 통합 보안 정책 및 관리 기술)

  • Lee, Sang-Joon;Kim, Yi-Kang;Ryu, Seung-Wan;Park, You-Jin;Cho, Choong-Ho
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.34 no.4
    • /
    • pp.72-81
    • /
    • 2011
  • In this paper, we propose adaptive convergence security policies and management technologies to improve security assurance in the home networking environment. Many security issues may arise in the home networking environment. Examples of such security issues include the user privacy, the service security, the integrated networking security, the middleware security and the device failure. All these security issues, however, should be fulfilled in phase due to many difficulties including deployment cost and technical complexity. For instance, fundamental security requirements such as authentication, access control and prevention of crime and disaster should be addressed first. Then, supplementary security policies and diverse security management technologies should be fulfilled. In this paper, we classify these requirements into three categories, a service authentication, a user authentication and a device authentication, and propose security policies and management technologies for each requirement. Since the home gateway is responsible for interconnection of many home devices and external network access, a variety of context information could be collected from such devices.