• Title/Summary/Keyword: Session

Search Result 3,098, Processing Time 0.029 seconds

Real-time Context Service Model Based on RFID for u-Conference (u-Conference를 위한 RFID 기반의 실시간 상황 서비스 모델)

  • Kang, Min-Sung;Kim, Do-Hyeun;Lee, Kwang-Man
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.2 no.2
    • /
    • pp.95-100
    • /
    • 2007
  • Recently ubiquitous application services are developed plentifully using RFID techniques in the field of distribution and security industries. However, except these field the applications using RFID are not mature yet. In this study, we proposed a real-time context service model of the u-conference based on the real-time contextual information acquired from conference and exposition. With collection of real-time contextual information for u-conference, the model can provide a lot of information services on the state of session attendee, doorway control, affairs, user certification, presentation progress etc. For the verification of proposed real-time context service model of u-conference, we design and implement the conference progress state service included the state of session attendee, user certification and presentation progress etc. This service provides the presentation state information included the current presenter, the paper list, the number of session attendee, the schedule and place of each session using the collecting RFID tag and the related information.

  • PDF

Dynamic Session Key based Pairwise Key Management Scheme for Wireless Sensor Networks

  • Premamayudu, B;Rao, Koduganti Venkata;Varma, P. Suresh
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5596-5615
    • /
    • 2016
  • Security is one of the major challenges in the Wireless Sensor Networks (WSNs). WSNs are more vulnerable to adversarial activities. All cryptographic security services indirectly depend on key management. Symmetric key management is the best key establishment process for WSNs due to the resource constraints of the sensors. In this paper, we proposed dynamic session key establishment scheme based on randomly generated nonce value and sensor node identity, in which each sensor node is equipped with session key on expire basis. The proposed scheme is compare with five popular existing key management systems. Our scheme is simulated in OMNET++ with MixiM and presented experimental results. The analytical study and experimental results show the superiority of the proposed scheme over the existing schemes in terms of energy, storage, resilience and communication overhead.

Pre-Parent Education Program developing Model(session4 : Becoming parents through the experience of pregnancy and childbirth) Applied to HALS(Hypermedia-Aided Learning System) (HALS(Hypermedia-Aided Learning System)를 적용한 예비부모 교육프로그램(session 4 : 임산과 출산을 통한 부모됨)의 개발 모형)

  • 고선주
    • Journal of the Korean Home Economics Association
    • /
    • v.36 no.12
    • /
    • pp.25-41
    • /
    • 1998
  • HALS(Hypermedia-Aided Learning System) is very useful computer networking educational system in high information society, and was developed by Kyungwon University. This system has three characteristics; 1) face to face learning, 2) ultra high speed information networing, 3) web based hypermedia courseware. So, the purpose of this study is to try the application to pre-parent eucational program(session 4 : becoming parents through the experience of pregnancy and childbirth). For this purpose it is described the definition and characteristics of HALS. Next, it is represented the model of pre-parent educational program applied to HALS and the pictures of the session 4 (initial window, help function window, etc).

  • PDF

A Session Management Toolkit for Synchronous Groupware Using Shared Objects (공유객체를 기반으로 한 그룹웨어 세션관리 툴킷)

  • 이경옥;양재헌
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10b
    • /
    • pp.218-220
    • /
    • 2000
  • 그룹웨어는 시.공간적으로 떨어져 있는 사용자들이 공동작업을 수행할 수 있도록 만들어진 어플리케이션이다. 따라서 싱글 유저 어플리케이션과 비교하여 사용자간 데이터 공유 지원, 통신 지원, 사용자 관리 등 추가적으로 구현해야 될 사항이 많다. 이 논문에서는 이러한 그룹웨어 어플리케이션 개발에 편의를 제공하고자 그룹웨어 어플리케이션이 공통적으로 개발하여야 하는 루틴을 라이브러리로 시스템 차원에서 지원해 주는 툴킷, SessionKit을 개발하여 소개한다. SessionKit은 자바로 구현된 순수 객체 모델 기반의 툴킷으로 일반 객체와 공유 객체 사이에 사용 방법상의 차이를 없앰으로써 메시지 전달 방식에 의한 데이터 공유에 비해 개발자에게 한 단계 높은 abstraction을 제공한다. 또한 일반적으로 그룹웨어 어플리케이션이 어플리케이션 단위로 데이터를 공유하는데 반해 SessionKit 시스템은 개별 객체를 그 공유 단위로 함으로써 서로 다른 어플리케이션 간에도 정보 공유가 가능하도록 한다.

  • PDF

Security Measures by Diagnosing Vulnerabilities in Web Applications

  • Kim, Hee Wan
    • International journal of advanced smart convergence
    • /
    • v.10 no.4
    • /
    • pp.22-29
    • /
    • 2021
  • For web application vulnerability diagnosis, from the development stage to the operation stage, it is possible to stably operate the web only when there is a policy that is commonly applied to each task through diagnosis of vulnerabilities, removal of vulnerabilities, and rapid recovery from web page damage. KISA presents 28 evaluation items for technical vulnerability analysis of major information and communication infrastructure. In this paper, we diagnose the vulnerabilities in the automobile goods shopping mall website and suggest security measures according to the vulnerabilities. As a result of diagnosing 28 items, major vulnerabilities were found in three items: cross-site scripting, cross-site request tampering, and insufficient session expiration. Cookie values were exposed on the bulletin board, and personal information was exposed in the parameter values related to passwords when personal information was edited. Also, since the session end time is not set, it was confirmed that session reuse is always possible. By suggesting security measures according to these vulnerabilities, the discovered security threats were eliminated, and it was possible to prevent breaches in web applications and secure the stability of web services.

Impaired Avoidance Learning and Increased hsp70 mRNA Expression in Pentylenetetrazol-treated Zebrafish

  • Kim, Yeon-Hwa;Lee, Yun-Kyoung;Lee, Han-Sol;Jung, Min-Whan;Lee, Chang-Joong
    • Animal cells and systems
    • /
    • v.13 no.3
    • /
    • pp.275-281
    • /
    • 2009
  • The effects of pentylenetetrazol (PTZ), a GABA receptor antagonist, were studied on passive avoidance learning and expression of heat shock protein 70 (hsp70), neuroglobin, and fatty acid binding protein-7 (fabp-7) genes. Zebrafish were trained to stay in a dark compartment to avoid a weight dropping in an acryl shuttle box with a central sliding door. In two training sessions of 2 h interval, each consisting of 3 trials, the crossing time was significantly increased from $43.2{\pm}14.4s$ to $149.3{\pm}38.5s$ in the first training session and remained $116.1{\pm}36.0s$ s in the first trial of the second training session in the control. In zebrafish treated with PTZ before the first training session, the crossing time was significantly increased neither in the first nor in the second training session. However, the increased crossing time was maintained in the second training session when 10 mM PTZ was treated three times for 10 min at 30 min intervals between the first and second training session. Quantitative real-time PCR showed that expression level of hsp70 mRNA increased two to eight fold over that of control in the brain at 0-24 h after termination of PTZ treatment. No change in expression of neuroglobin and fabp-7 mRNA was shown in PTZ-treated zebrafish. Our studies suggest that PTZ impairs learning ability in avoidance response and also modifies expression of genes related to the neuroprotection.

A Session Key Establishment Scheme in Mobile Ad-Hoc Networks (이동 애드혹 네트워크에서 세션 키 설정 방안)

  • 왕기철;정병호;조기환
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.4
    • /
    • pp.353-362
    • /
    • 2004
  • Mobile Ad-Hoc network tends to expose scarce computing resources and various security threats because all traffics are carried in air along with no central management authority. To provide secure communication and save communication overhead, a scheme is inevitable to serurely establish session keys. However, most of key establishment methods for Ad-Hoc network focus on the distribution of a group key to all hosts and/or the efficient public key management. In this paper, a secure and efficient scheme is proposed to establish a session key between two Ad-Hoc nodes. The proposed scheme makes use of the secret sharing mechanism and the Diffie-Hellman key exchange method. For secure intra-cluster communication, each member node establishes session keys with its clusterhead, after mutual authentication using the secret shares. For inter-cluster communication, each node establishes session keys with its correspondent node using the public key and Diffie-Hellman key exchange method. The simulation results prove that the proposed scheme is more secure and efficient than that of the Clusterhead Authentication Based Method(1).

Design and Implementation of a Session Handler Module for SyncML Data Synchronization Clients (SyncML 자료 동기화 클라이언트를 위한 세션 핸들러 모듈의 설계 및 구현)

  • Ha Byoung-Hoon;Park KeeHyun;Ju HongTaek;Woo Jongjung
    • The KIPS Transactions:PartC
    • /
    • v.12C no.5 s.101
    • /
    • pp.741-748
    • /
    • 2005
  • SyncML is an open standard data synchronization protocol proposed by OMA(Open Mobile Alliance). In this paper, a Session Handler module, one of major modules for developing SyncML data synchronization clients, and a client User Setup program are designed and implemented. The Session Handier Module controls communication sessions, generates header parts of messages exchanged, and determines the legitimacy of incoming messages. In order to justify normal operations of the Session Handler module and the client User Setup program implemented In this paper, they are ported to a Zaurus PDA, which runs on LINUX operating system. In addition, data synchronization operations are performed between the PDA and a Synthesis sever, whose SyncML data synchronization operation is certificated by OMA, Wireless Internet International Standard Forum.

A Study of Management Strategy for Session QoS System in Education and Research Network (교육 연구망에서 세션 QoS 시스템 관리 기법 연구)

  • Park, Seong-Ho;Lee, Hwa-Sei;Sohn, Keon-Tae
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.3
    • /
    • pp.341-352
    • /
    • 2008
  • The dedicated line linked up with the internet maintains generally the efficiency of network by using Best Effort Model. But it is the problem that we allocate the higher bandwidth to services which request high bandwidth regardless of service types or purposes. To overcome this weak point, we use the Session QoS System which distinguish between business services such as E-mail, Web, etc. and non-business services. But, a recent session QoS system is not adequate to the environment similar to university, because that has many users who have various requests. In this paper, to satisfy various requirements of many user's in session QoS system which support services of research, education, business, etc., we analyze types of service in the environment of education and research network and propose a necessity of management strategies of session Qos system.

  • PDF

A Session Key Exchange Scheme for Secure Vehicle Communication in V2I-based VANET Environments (V2I 기반의 VANET 환경에서 안전한 차량 통신을 위한 세션 키 교환 기법)

  • Ryu, Seung-Ho;Jung, Sou-Hwan
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.4
    • /
    • pp.311-317
    • /
    • 2008
  • This paper proposes a session key exchange scheme for providing secure communication between Vehicles and Infrastructure in VANET. In the current VANET environment, IEEE 802.11i or PKI based mechanism is used to provide secure communication between V2I. However, since the vehicles and the frequent changes of network topology, VANET nodes have some difficulties to exchange the session key using IEEE 802.11i or PKI method. In the proposed scheme, Local Router is newly defined for exchanging the session key between moving vehicles and infrastructure. A session key is generated by XOR operation based on the random values between Local Router and OBU. As a result, the proposed scheme has a noticeable advantage on the fastness of key exchange by exchanging session keys between LR and OBU.