• Title/Summary/Keyword: Ubiquitous Service Model

Search Result 360, Processing Time 0.024 seconds

Implementation of Role Based Access Control Model for U-healthcare (유비쿼터스 헬스케어를 위한 역할 기반 접근제어 모델의 구현)

  • Lee, You-Ri;Park, Dong-Gue
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.6
    • /
    • pp.1256-1264
    • /
    • 2009
  • When unapproved users access to healthcare system and use medical information for other malicious purposes, it could severely threaten important information related to patients' life, because in ubiquitous environment healthcare service makes patient's various examination results, medical records or most information of a patient into data. Therefore, to solve these problems, we design RBAC(Role Based Access Control) for U-healthcare that can access control with location, time and context-awareness information like status information of user and protect patient's privacy. With implementation of the proposed model, we verify effectiveness of the access control model for healthcare in ubiquitous environment.

An Empirical Approach to the Influence of IT Assets and Information Security Service on Information Security Quality and Satisfaction (IT자산과 정보보호 서비스가 정보보호 품질 및 만족도에 미치는 영향에 관한 실증연구)

  • Gwon, Sun-Jae;Lee, Geon-Chang;Kim, Chang-Hyeon
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2006.11a
    • /
    • pp.467-481
    • /
    • 2006
  • In the era of the Internet and ubiquitous computing, IS users are still facing a variety of threats. Therefore, a need of more tightened information security service increases unprecedentedly. In this sense, this study is aimed at proposing a new research model in which IT assets (i.e., network, system, and information influence) and Information Security Service (i.e., confidentiality, integrity, nonrepudiation, authentication) affect information security qualty positively, leading to users' satisfaction eventually To prove the validity of the proposed research model, PLS analysis is applied with valid 177 questionnaires. Results reveal that both IT assets and Information Security Service influence informations security quality positively, and user satisfaction as well. From the results, it can be concluded that Korean government's recent orchestrated efforts to boost the IT assets and Information Security Service helped great improve the information security quality and user satisfaction.

  • PDF

A Study on the Methodology of U-City Services Standardization (신도시 U-City 서비스 표준화 방법론에 관한 연구)

  • Lee, Sang Hun;Yang, Dong Suk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.4
    • /
    • pp.53-62
    • /
    • 2012
  • U-City means the high-tech city that applied ubiquitous technology and information communication technology. U-City aims to intensify urban competitiveness and to improve the quality of residents' life through efficient management of the urban. Currently, 77 U-City projects is underway. The each project cost and scale estimate is not clear in the absence of the U-Service Standardization Model. So, many of the project are trouble about making a production the proper number of U-Service or the cost of project. The excessive service construction is reflected on the construction costs, which leads to the rise of sales price and passes onto the executor of a project as a burden of the project costs, and the problem of the delay of the change-over occurs due to supporting the operation costs for the operation of the constructed service and the demand for additional installation of facilities between a local autonomous entity and the executor of a project. In this paper, we suggested the U-Services Construction Standardization Methods and proposed the standardization services guideline of crime prevention services. U-City services in the future are able to maintain the consistency of the system through the utilization of the proposed standard model. As a result, the U-City project's pre-estimated cost and scale can be extracted.

A Design of Schema and Data Model for Shipping Distribution Field using Electronic Tag (전자태그의 해운 물류 유통 분야에 적용하기 위한 스키마 및 데이터 모델 설계)

  • Chang, Jung-Soo;Song, Jong-Chul;Choi, Il-Sun;Jeong, Jae-Gil;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.967-970
    • /
    • 2005
  • Ubiquitous Computing appeared, and moth researches are gone to apply this in various field. Specially, physical distribution circulation service field is intelligence enemy while alternate existent bar code and induction of RFID(Radio Frequency Identification) technology that permit various service is gone vigorously. In this treatise designed data model and schema to progress research about Core Event Type of PML(Product Markup Language) that is object information expression language that is proposed Auto-Id Lab and EPCglobal Inc. to process information of physical object and EPC-lS(Electronic Product Code Information Services) that is information services component and applies in sea transport physical logistics distribution service field.

  • PDF

An Efficient Hybrid Lookup Service Exploiting Localized Query Traffic (질의의 지역성을 이용한 효율적인 하이브리드 검색 서비스)

  • Lee, Sang-Hwan;Han, Jae-Il;Kim, Chul-Su;Hwang, Jae-Gak
    • Journal of Information Technology Services
    • /
    • v.8 no.3
    • /
    • pp.171-184
    • /
    • 2009
  • Since the development of the Distributed Hash Tables (DHTs), the distributed lookup services are one of the hot topics in the networking area. The main reason of this popularity is the simplicity of the lookup structure. However, the simple key based search mechanism makes the so called "keyword" based search difficult if not impossible. Thus, the applicability of the DHTs is limited to certain areas. In this paper. we find that DHTs can be used as the ubiquitous sensor network (USN) metadata lookup service across a large number of sensor networks. The popularity of the Ubiquitous Sensor Network has motivated the development of the USN middleware services for the sensor networks. One of the key functionalities of the USN middleware service is the lookup of the USN metadata, by which users get various information about the sensor network such as the type of the sensor networks and/or nodes, the residual of the batteries, the type of the sensor nodes. Traditional distributed hash table based lookup systems are good for one sensor network. However, as the number of sensor network increases, the need to integrate the lookup services of many autonomous sensor networks so that they can provide the users an integrated view of the entire sensor network. In this paper, we provide a hybrid lookup model, in which the autonomous lookup services are combined together and provide seamless services across the boundary of a single lookup services. We show that the hybrid model can provide far better lookup performance than a single lookup system.

A New Online News Service Model, based on NewsML and UCI Systems (NewsML과 UCI를 적용한 뉴스 콘텐츠의 온라인 유통모델)

  • Park, Chang-Shin;Kil, Duke
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2007.11a
    • /
    • pp.641-645
    • /
    • 2007
  • News contents, produced for paper readers, are more and more being used online instead of offline. Internet sites, expecially portals(naver, daum, nate etc.) are dominant marketplaces, where news are exchanged and values are added. So, establishing a new online news service system, which can satisfy news provider(copyright owner) and internet service provider together, is a necessary task under current online-dominant news service environment. UCI(Universal & Ubiquitous Content Identifier) and IPTC NewsML(News Mark-up Language) are considered as useful standards to compromise protection of news-copyright and enhancement of online use of news contents. This study is based on a real case of 'NewsBank' in korea, We expect that this study can show an inspiration to obtain two contradictory goals of copyright protection and free online use of copyright.

  • PDF

EDS scenario Implementation for the Multiple Network and Multiple Service Environments

  • Kim, Dong-Il;Lee, Soong-Hee
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.2
    • /
    • pp.135-140
    • /
    • 2009
  • The wide deployment of wireless access technologies and the integration of various access network interfaces into a single terminal, allows mobile end-users to be always connected to the IP network, and to use those interface simultaneously. In this paper the CTE provides various access network interfaces capabilities, allowing reception of data over multiple service providers with different characteristics. Considerations for multiple network and service provider environments are regarded as essential for the successful deployment of convergence services in Next Generation Network (NGN). Event Driven Service (EDS) is regarded as a typical convergence service converging different functions of multiple service providers. This paper first describes the deployment model of NGN convergence services for multiple service provider environments. It also covers the service scenario of EDS, a convergence service for multiple service provider environments in NGN. Multiple provider environments stimulates the unified identifier management, namely ubiquitous identification (U-ID), to enable users to be provided convergence services without awareness of multiple provides. Then the designed structure and procedures of U-ID based EDS are given. Finally, the implementation results tested on Korea Advanced Research Network (KOREN) are described.

A CASA-Based Dynamic Access Control Scheme for Ubiquitous Environments (유비쿼터스 환경을 위한 CASA 기반의 동적 접근 제어 기법)

  • Kim, Kyoung-Ja;Chang, Tae-Mu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.4
    • /
    • pp.205-211
    • /
    • 2008
  • Conventional context-aware service models permit the access of resources only by user authentication, but the ubiquitous environments where the context information around users is changing frequently require the resource access control according to the rapid changes. This paper proposes a scheme to control access permission of resource dynamically as context information of user changes. Our access control model is based on traditional CASA (Context-Aware Security Architecture), but can restrict the access of the user already has been authorized. With the real-time checking of context information, our scheme gives different access controls according to changes in environmental information, and provides more secure services than conventional context-aware models.

  • PDF

A Study on Service Quality of Mobile Internet Affecting Customer Satisfaction (모바일 인터넷의 서비스 품질(Mobisqual)이 사용자 만족에 미치는 영향)

  • Heo, Min;Kim, Jun-Woo;Kim, Yon-Soo
    • Journal of Digital Convergence
    • /
    • v.8 no.2
    • /
    • pp.161-176
    • /
    • 2010
  • Mobile internet has been emerged as a key IT infrastructure while mobile internet service equipments such as smart phones have been introduced in this mobile market. These mobile internet services would be more widely spread in shorter period because the wired internet services are already popular in our life and mobile internet services have the typical characteristics that ubiquitous has. This study investigates the research model for mobile internet services based on previous researches and tests it via questionnaire. The findings are that some of features such as joy and sufficiency are statistically significant as expected.

  • PDF

Design and Implementation Testbed of Home Network based PLC (PLC 기반의 홈 네트워크 테스트베드 설졔 및 구현)

  • Kim, Hyeock-Jin;Han, Kuy-Ban;Jean, Byoung-Chan
    • Journal of the Korea Computer Industry Society
    • /
    • v.10 no.4
    • /
    • pp.143-150
    • /
    • 2009
  • Remote control service, monitoring, gear service of information electronic appliance, various services of security service and so on of Home network that is by link of Ubiquitous environment are offered. These services need verification process through priority test to use and are changed. If test using actuality information electronic device for test, much expenses and time may be invested. Home network test bed offers softness of research using control model and simulator, in this paper, Wish to design and embody home network test bed to do environment construction of home network and test of application service. Because use istent power line just as it is without necessity to establish circuit in addition by solution of home network testbed, expense costs to be less and establishment used easy PLC. Also, propriated Wireless sensor network that use Zigbee by solution of home network testbed. Appliance check and monitor square do by Home Auto that know embodied, and embodied by Home Gateway that interlink terminals of Home Auto and out of.

  • PDF