• Title/Summary/Keyword: Ubiquitous Business

Search Result 354, Processing Time 0.029 seconds

The Context-Aware Access Control Model of Workflow-based System for Business Environment (워크플로우 시스템 기반의 사무 환경을 위한 상황 인식 기반 접근 제어 모델)

  • Choi, Jin-Young;Kim, Jong-Myoung;Park, Seon-Ho;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.714-717
    • /
    • 2008
  • 유비쿼터스 컴퓨팅(Ubiquitous Computing) 시대에 기업의 사무 환경은 다양한 정보들과 많은 사용자들이 유기적인 관계를 형성한다. 이러한 관계에서 접근 제어는 다양한 정보 객체에 허가된 사용자만이 접근할 수 있는 권한을 갖는 기능을 제공하는 것이고, 사무 환경에서 보안상 필수적이며 중요한 역할을 한다. 하지만 기존의 접근 제어 모델들은 상황 정보를 고려하지 않아 동적인 접근 제어를 하지 못하는 문제점을 가지고 있다. 본 논문은 워크플로우 기반의 오피스 환경에서 동적이고 능동적인 접근제어 관리를 제공하기 위한 상황 정보와 역할 기반의 워크플로우 데이터 접근제어 모델을 제안한다. 이 모델은 수많은 상황 정보 및 사무 정보와 사용자가 동적으로 변화하는 사무환경에서 사용자에게 접근을 제어하기 적합하다.

Future Impacts of RFID on Supply Chain Management and Redesigning the Distribution Structure of Seafood in Korea (국내 수산물 유통구조 재설계와 수산물 SCM에서의 RFID 효과)

  • Park, Myong-Sop;Park, Sang-Cheol;Kim, Jong-Uk
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.36
    • /
    • pp.143-170
    • /
    • 2007
  • In order to analyze the distribution channel of marine products in Korea, this study shows SCM approach to redesign of the marine distribution channel with case study related to previous literatures. In view of the supply chain and the future impact of RFID on the marine SCM on the recognition of the importance of the seafood traceability system, this study also provides the possibility to accomplish effective SCM for integration of production, storage, transportation, delivery, and sale when RFID is used in the seafood distribution channel based on the expansion of awareness on the marine product traceability. The traceability system for seafood is considered as the distribution infrastructure established in RFID deployment. By introducing Lotte mart case, this case study also discusses the marine distribution structure in view of the supply chain, to present an effective foundation for supplying seafood throughout production, distribution, and consumption. This is achieved by introducing RFID in an ubiquitous environment, and suggesting far more efficient control planning throughout the seafood distribution channel in view of the expected effects resulting from the introduction. In addition, as the alternative of solving this situation, this study propose the supply chain in seafoods by comprehensive management in whole distribution channels. In the SCM in seafood perspectives, HACCP can take into account the whole seafood chain from the point of supply to the point of consumption when assessing hazards. As the contributions of this study, this study emphasizes the seafood industry first should require the establishment of the relevant infrastructure, for which the efforts of the government and demonstrative project participants are essential.

  • PDF

Digital Rights Management and Rights Language (디지털 저작권관리와 Rights Language)

  • 박정희;성평식;이기동
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.8 no.2
    • /
    • pp.7-13
    • /
    • 2003
  • The Internet presents a unique platform for disseminating digital content such as music, video, games, software, text, business and proprietary corporate information. It promises ubiquitous access, while at the same time fundamentally challenging the traditional rules of ownership and distribution of content. In such environment, safe protection and proper delivery of digital content would be a crucial requirement toward a new e-business model. Research on the Digital Rights Management (DRM) focuses on filling this functional vacancy of the market transition by providing a more viable business model based. XrML(eXtensible Rights Markup Language) provides a universal tool for specification of rights, fees, and issuing conditions(licenses) associated with the use and protection of digital content. ContentGuard has developed XrML to unify the Digital Rights Management(DRM) specifications and encourage interoperability. It seems that all working groups of DRM agree to use XrMl for their right description language.

  • PDF

Web-based Real Environment Monitoring Using Wireless Sensor Networks

  • Lee, Gil-Jae;Kong, Jong-Uk;Kim, Min-Ah;Byeon, Ok-Hwan
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.207-210
    • /
    • 2005
  • Ubiquitous computing is one of the key technology areas in the "Project on Development of Ubiquitous computing and network technology" promoted by the Ministry of Science and Technology as a frontier business of the $21^{st}$ century in Korea, which is based on the new concept merging physical space and computer-based cyber space. With recent advances in Micro Electro Mechanical System (MEMS) technology, low cost and low-power consumption wireless micro sensor nodes have been available. Using these smart sensor nodes, there are many activities to monitor real world, for example, habitat monitoring, earthquake monitoring and so on. In this paper, we introduce web-based real environment monitoring system incorporating wireless sensor nodes. It collects sensing data produced by some wireless sensor nodes and stores them into a database system to analyze. Our environment monitoring system is composed of a networked camera and environmental sensor nodes, which are called Mica2 and developed by University of California at Berkeley. We have modified and ported network protocols over TinyOS and developed a monitoring application program using the MTS310 and MTS420 sensors that are able to observe temperature, relative humidity, light and accelerator. The sensed data can be accessed user-friendly because our environment monitoring system supports web-based user interface. Moreover, in this system, we can setup threshold values so the system supports a function to inform some anomalous events to administrators. Especially, the system shows two useful pre-processed data as a kind of practical uses: a discomfort index and a septicity index. To make both index values, the system restores related data from the database system and calculates them according to each equation relatively. We can do enormous works using wireless sensor technologies, but just environment monitoring. In this paper, we show just one of the plentiful applications using sensor technologies.

  • PDF

A Implementation of Oriental Medicine U-Healthcare Service Model Using CDSS (CDSS를 이용한 한방 U-Healthcare 서비스 모델 구현)

  • Eun, Sung-Jong;Do, Jun-Hyeong;Kim, Keun-Ho;WhangBo, Taeg-Keun
    • Journal of Internet Computing and Services
    • /
    • v.11 no.5
    • /
    • pp.59-70
    • /
    • 2010
  • The Ubiquitous Healthcare business are growing recently by medical service development. According to this environment, many healthcare service model have been studying and suggested. At the same time, medical world market has been reorganized into a traditional medical science out of the west medical science. But in spite of this trend, domestic U-Healthcare market in traditional medical science is for lack of profit service model. So it is true that the presentation is demanded from oriental medicine U-Healthcare service model these days in oriental field. Thus, in this paper we propose the healthcare service model that can be applied to the oriental field efficiently. Our method is based on fuzzy rule method that analyze the patient data by CDSS processing. In experiment, proposed method is more profitable and efficient than west service model. For future works, we will research about the standardization and security of processed data.

Product Line Development Process for Mobile Software based on Product Line (프로덕트 라인 기반의 모바일 소프트웨어 개발 프로세스)

  • Kim Haeng-Kon;Son Lee-Kyeong
    • The KIPS Transactions:PartD
    • /
    • v.12D no.3 s.99
    • /
    • pp.395-408
    • /
    • 2005
  • Ubiquitous computing spans a very broad range of technologies and needs very complicated user's requirements. There are many scenarios and technologies involved in ubiquitous computing. We need new software development tools and methodology to meet the requirements. A software product line is one of promising new technology for it. A software product line is a set of software intensive systems that share a common, managed set of features satisfying the specific needs of a particular market segment or mission and that are developed from a common set of core assets. Software architecture-based development is the exploration and maturation of the role of software architecture in the product line life cycle. In this thesis, we identify the foundational concepts underlying software product lines and the essential activities to develop the mobile application systems. So, we define, design, and implement the Mobile Application System Architecture(MASA) that includes the development process for applying into mobile business domain and encompass scoping and gathering requirements for the Product line based on Component Based Development(CBD).

The Authentication Model which Utilized Tokenless OTP (Tokenless OTP를 활용한 인증 모델)

  • Kim, Ki-Hwan;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.205-214
    • /
    • 2006
  • Is need Remote Access through internet for business of Ubiquitous Computing age, and apply OTP for confidentiality about inputed ID and Password, network security of integrity. Current OTP must be possessing hardware or Token, and there is limitation in security. Install a Snooping tool to OTP network in this treatise, and because using Cain, enforce ARP Cache Poisoning attack and confirm limitation by Snooping about user password. Wish to propose new system that can apply Tokenless OTP by new security way, and secure confidentiality and integrity. Do test for access control inflecting Tokenless OTP at Remote Access from outside. and could worm and do interface control with certification system in hundred. Even if encounter hacking at certification process, thing that connection is impossible without pin number that only user knows confirmed. Because becoming defense about outward flow and misuse and hacking of password when apply this result Tokenless OTP, solidify security, and evaluated by security system that heighten safety.

  • PDF

Remote Secure Entrance Control System using RFID and TCP/IP (RFID와 TCp/IP를 활용한 원격 보안 출입 제어 시스템)

  • Kim, Jeong-Sook;Kim, Cheon-Shik;Yoon, Eun-Jun;Hong, You-Sik
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.6
    • /
    • pp.60-67
    • /
    • 2008
  • At present, RFID system is highly welcomed as a substitute system with its bar code recognition system and self recognition equipment. Consequently, the system has multi applications and can be complementing to its security. In particular, RFID system is significantly related with electronic transaction equipments : transportation card, ID card in check point, attendance sheet. Based upon these characteristic, the system is becoming extremely popular in the field of logistics, harbor and stock management, animal control and product circulation & distribution. In this dissertation, I would like to present a more efficient and stable remote entry control system with the network-based TCP/IP. It is a simple example of ubiquitous computing function. Above all, approved protocol system should be applied to the remote entry control function. Its efficient function with the applied approval protocol based-remote entry control system should be confirmed. Therefore, a preliminary test should be prerequisite in automatic entrance function with the embedded and TCP/IP-based RFID system.

The Interactive Factors of Ubiquitous Media Affected on the Intention of Convergence Service Adoption (유비쿼터스 미디어의 수용의도에 영향을 미치는 상호작용성 요인에 관한 연구)

  • Kim, Ju-An
    • International Commerce and Information Review
    • /
    • v.9 no.2
    • /
    • pp.19-40
    • /
    • 2007
  • In recent, T-commerce is widely dispersed as alternative type of commerce. It is forecasted that t-commerce system is used more than e-commerce system. Therefore more and more t-commerce-related industries are also recognizing that t-commerce is a critical business model. It is needed to understand the concept of t-commerce and develop the t-commerce marketing strategy. CEO analyses consumer's behaviors according to the data about buyers and applies the advantage of t-commerce to the communication with customers. This t-commerce system plays an important role in maximizing customer satisfaction and affecting their intention to reuse it. Therefore this paper attempts to identify T-commerce critical success factors and divide between use-intention group and unuse-intention group by taking out a discriminant function by the discriminant analysis. This lays a foundation in developing T-commerce strategy. According to the discriminant function extracted, convenience factor, amusement factor, system quality factor, product perception factor are significant in the sequence of influential degree. However, usefulness factor and speedy connection factor are not significant. In result, the target hitting rate is 77.9% in the first unuse-intention group and it is 95.2% in the second use-intention group. The total discriminant target hitting rate is computed to higher value, 86.55%. The statistic package, SPSS 12.0, is used to survey and analyse data and test the hypothesis. The validity and reliability of variables are verified by both reliability analysis and factor analysis. The discriminant analysis is used to tell the difference between use-intention group and unuse-intention group.

  • PDF

A Design of KDPC(Key Distributed Protocol based on Cluster) using ECDH Algorithm on USN Environment (USN 환경에서 ECDH 알고리즘을 이용한 KDPC(Key Distribution Protocol based on Cluster) 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.856-858
    • /
    • 2013
  • The data which is sensed on USN(Ubiquitous Sensor Network) environment is concerned with personal privacy and the secret information of business, but it has more vulnerable characteristics, in contrast to common networks. In other words, USN has the vulnerabilities which is easily exposed to the attacks such as the eavesdropping of sensor information, the distribution of abnormal packets, the reuse of message, an forgery attack, and denial of service attacks. Therefore, the key is necessarily required for secure communication between sensor nodes. This paper proposes a KDPC(Key Distribution Protocol based on Cluster) using ECDH algorithm by considering the characteristics of sensor network. As a result, the KDPC can provide the safe USN environment by detecting the forgery data and preventing the exposure of sensing data.

  • PDF