• Title/Summary/Keyword: Ubiquitous environment

Search Result 1,822, Processing Time 0.03 seconds

A Study on Safe Authentication Method for Security Communication in RFID Environment (RFID 환경에서 보안 통신을 위한 안전한 인증 방안에 관한 연구)

  • Ko, Hoon;Kim, Bae-Hyun;Kwon, Moon-Taek
    • Convergence Security Journal
    • /
    • v.5 no.3
    • /
    • pp.59-65
    • /
    • 2005
  • Ubiquitous computing environment has a lot of different things as for applying existing security technical. It needs authentication method which is different kinks of confidence level or which satisfies for privacy of user's position. Using range localizes appoint workstation or it uses assumption which is satify environment of client in Kerberos authentication method which is representation of existing authentication method but it needs new security mechanism because it is difficult to offer the condition in ubiquitous computing environment. This paper want to prove the result which is authentication method for user authentication and offering security which are using wireless certificate from experiment in ubiquitous environment. Then I propose method which is offering security and authentication in ubiquitous environment.

  • PDF

A Study on Secure and Efficient Wireless Network Management Scheme based Multi users for Ubiquitous Environment (유비쿼터스 환경을 위한 다중 사용자 기반의 안전하고 효율적인 무선 네트워크 관리 기법 제안)

  • Seo Dae-Hee;Lee Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.1-10
    • /
    • 2006
  • Ubiquitous computing, a new type of network environment has been generating much interest recently and has been actively studied. In ubiquitous computing, the sensor network which consists of low electric power ad-hoc network-based sensors and sensor nodes, is particularly the most important factor The sensor network serves as the mediator between ubiquitous computing and the actual environment. Related studies are focused on network . management through lightweight hardware using RFID. However, to apply these to actual environment, more practical scenarios as well as more secured studies equipped with secures and efficiency features are needed. Therefore, this study aims to build a wireless network based on PTD for multi users, which provides the largest utility in individual networks, and propose an appropriate management method. The proposed method is designed to enhance security and efficiency related to various services required in wireless networks, based on the reliable peripheral devices for users or pm. using pm, which has been applied to electronic commerce transactions in existing papers, this study also proposed an appropriate management method that is suitable for a dynamic environment and setting a temporary group to provide various services.

Study of an Accurate and Efficient Data Integration for Decision Making in Data Management of Ubiquitous (유비쿼터스 데이터 관리에서 의사결정을 위한 정확하고 효율적인 데이터 통합 연구)

  • Lee Hyun-Chang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.2 s.40
    • /
    • pp.145-151
    • /
    • 2006
  • In conjunction with the rapid progress of IT(information technology) an increasing amount of data are being generated. The amount of new data is so big and the type of new data generated from clients or sensor devices needed to be in ubiquitous environment is so various that it is hard to manage and control them. Especially data to be occurred in ubiquitous environment are generated through PDA(personal digital assistant) smart phone, mobile device or sensor units etc. Therefore, to manage and control them generated from ubiquitous devices for decision making, we can use data warehouse as an integrated storage. A data warehouse integrates and aggregates data of several different DBMS into one DBMS. Also the updated data from source data have to be effectively propagated to the data warehouse. Therefore, in this paper, we proposed a mode) for an exact and efficient data management methodology in new IT paradigm environment, ubiquitous computing environment, to apply updated data on the warehouse to make decision. We also show brief result compared to conventional methodology.

  • PDF

A Store Recommendation Procedure in Ubiquitous Market (U-마켓에서의 매장 추천방법)

  • Kim, Jae-Kyeong;Chae, Kyung-Hee;Kim, Min-Yong
    • Journal of Intelligence and Information Systems
    • /
    • v.13 no.4
    • /
    • pp.45-63
    • /
    • 2007
  • Recently as ubiquitous environment comes to the fore, information density is raised and enterprise is being able to capture and utilize customer-related information at the same time when the customer purchases a product. In this environment, a need for the recommender systems which can deliver proper information to the customer at the right time and right situation is highly increased. Therefore, the research on recommender systems continued actively in a variety of fields. Until now, most of recommender systems deal with item recommendation. However, in the market in ubiquitous environment where the same item can be purchased at several stores, it is highly desirable to recommend store to the customer based on his/her contextual situation and preference such as store location, store atmosphere, product quality and price, etc. In this line of research, we proposed the store recommender system using customer's contextual situation and preference in the market in ubiquitous environment. This system is based on collaborative filtering and Apriori algorithms. It will be able to provide customer-centric service to the customer, enhance shopping experiences and contribute in revitalizing market in the long term.

  • PDF

A Research on the Ubiquitous Learning and Enhancement of Library Services in Universities (대학의 유비쿼터스 학습과 도서관서비스 활성화에 관한 연구)

  • Kwack, Dong-Chul
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.20 no.2
    • /
    • pp.109-128
    • /
    • 2009
  • In the 21st century, Korean society has continually changed into information society, knowledge society, and recently ubiquitous society. Therefore, 'ubituious' has become one of the most popular terms, and in many sectors of our society the ubiquitous environment has become more and more realities. And, universities are facing the need for changes in teaching and learning as well as library services. In this research, to enhance and vitalize the ubiquitous learning and academic library services, the following topics are discussed: First, the concept of 'ubiquitous' is defined and its major elements are examined. Second, the trend of establishing the information environment in higher education and developing the ubiquitous learning are investigated. Third, the present situation of ubiquitous campus and libraries are reviewed. Fourth, proposed are the strategies of developing those ubiquitous learning and library services in universities in Korea.

Development of Investment Evaluation Model for Ubiquitous Health Service (유비쿼터스 서비스 모델의 성과 평가 모형 개발에 관한 연구 : u-Health 서비스의 투자 타당성을 중심으로)

  • Nam, Se-Il;Kim, Min-Kwan;Lee, Cha-Young;Han, Chang-Hee
    • Journal of Information Technology Applications and Management
    • /
    • v.15 no.1
    • /
    • pp.183-202
    • /
    • 2008
  • The introduction of a ubiquitous environment has realized commercial ubiquitous services in various industrial fields and government area. The central and/or local governments are demanding an appropriate investment evaluation model for ubiquitous service. Thus, this study develops and suggests an evaluation model for ubiquitous service by reflecting its characteristic of promoting public good, as well as its broad ripple effect on people. The investment evaluation model for ubiquitous service suggested by this study is based on Cost Benefit Analysis Method. Especially, the 'Benefit' is analyzed in two aspects; 'Economic Benefit', which shows the benefit that ubiquitous service providers to the overall local economy, and; 'Financial Benefit', which shows the profit of individual investors participating in the introduction of ubiquitous service. The investment evaluation model for ubiquitous service suggested by this study can be used by the central and/or local government during their evaluation for investment before introducing a ubiquitous service. Also, when introducing a ubiquitous service in public field, the model can be used to support the decision making of private businesses for investment. Finally, it can be used to promote and inform the expected benefits of introducing a ubiquitous service to local residents.

  • PDF

Assessment and Access Control for Ubiquitous Environments

  • Diep, Nguyen Ngoc;Lee, Sung-Young;Lee, Young-Koo;Lee, Hee-Jo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1107-1109
    • /
    • 2007
  • Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. However, these strategies are inadequate for the increased flexibility and performance that ubiquitous computing environment requires because such systems can not utilize effectively all benefit from this environment. In this paper, we propose a solution based on risk to make use of many context parameters in order to provide good decisions for a safety environment. We design a new model for risk assessment in ubiquitous computing environment and use risk as a key component in decision-making process in our access control model.

A Design CORBA Security Service for DataBase Security in Ubiquitous Computing (유비쿼터스 환경의 데이터베이스 보안을 위한 CSS 설계)

  • Lee, Dae-Sik;Yun, Dong-Sic;Ahn, Heui-Hak
    • Convergence Security Journal
    • /
    • v.5 no.3
    • /
    • pp.15-22
    • /
    • 2005
  • The spread of Internet and the appear of Downsizing, SI(System Integration) is chaning centralized computing to distributed computing. Also distributed computing is rapidly changing to Ubiquitous computing escape from hard wire connected network. CORBA(Common Object Request Broker Architecture) is a middleware that used for smoothness communication between application program and operation system in a different environment. However distributed computing environment is not safe from the danger, the attack like virus, worm is too intellectual and variety. In this paper, we design a new DB security model and suggest efficiency of it in Ubiquitous environment base on CSS(CORBA Security Service) that present ed from OMG(Object Management Group).

  • PDF

A Feature-based Method to Identify Services in Ubiquitous Environment (유비쿼터스 환경에서 피쳐 기반 서비스 식별 방법)

  • Shin, Hyun-Suk;Song, Chee-Yang;Kang, Dong-Su;Baik, Doo-Kwon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.7
    • /
    • pp.37-49
    • /
    • 2008
  • Services are reusable units in business level. Ubiquitous computing provides computing services anytime and anywhere. The combination of both is becoming an important paradigm of computing environment. Fundamentals of services require flexibility and interoperability, and key elements of ubiquitous modeling require interoperability and context-awareness. There are two kinds of methods to identify services. The top-down approach is based on business process, and the bottom-up approach is based on components. The first approach depends on experts' intuitions, while the second approach suffers the incapability of expressing non-functional expression through components. Although a feature-based approach is capable of expressing non-functional expression and identifying services in ubiquitous environment, the research on this issue is not adequately addressed by far. To promote this research, this paper proposes a feature-based method to identify services in ubiquitous computing. The method extracts initial-candidate-services from a feature model. Then, the ultimate services are identified through optimizing and analyzing the candidate-services. The proposed method is expected to enhance the service reusability by effectively analyzing ubiquitous domain based on feature, and varying reusable service units.

  • PDF