• Title/Summary/Keyword: User-requirement

Search Result 604, Processing Time 0.031 seconds

Development of Win32 API Message Authorization System for Windows based Application Provision Service (윈도우 기반 응용프로그램 제공 서비스를 위한 Win32 API 메시지 인가 시스템의 개발)

  • Kim, Young-Ho;Jung, Mi-Na;Won, Yong-Gwan
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.47-54
    • /
    • 2004
  • The growth of computer resource and network speed has increased requests for the use of remotely located computer systems by connecting through computer networks. This phenomenon has hoisted research activities for application service provision that uses server-based remote computing paradigm. The server-based remote computing paradigm has been developed as the ASP (Application Service Provision) model, which provides remote users through application sharing protocol to application programs. Security requirement such as confidentiality, availability, integrity should be satisfied to provide ASP service using centralized computing system. Existing Telnet or FTP service for a remote computing systems have satisfied security requirement by a simple access control to files and/or data. But windows-based centralized computing system is vulnerable to confidentiality, availability, integrity where many users use the same application program installed in the same computer. In other words, the computing system needs detailed security level for each user different from others, such that only authorized user or group of users can run some specific functional commands for the program. In this paper, we propose windows based centralized computing system that sets security policies for each user for the use of instructions of the application programs, and performs access control to the instructions based on the security policies. The system monitors all user messages which are executed through graphical user interface by the users connecting to the system. Ail Instructions, i.e. messages, for the application program are now passed to authorization process that decides if an Instruction is delivered to the application program based on the pre-defined security polices. This system can be used as security clearance for each user for the shared computing resource as well as shared application programs.

A Multichannel Authentication Technique In The Internet Banking System Using OTP (OTP를 이용한 인터넷뱅킹 시스템의 다중 채널 인증 기법)

  • Yoon, Seong Gu;Park, Jae Pyo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.131-142
    • /
    • 2010
  • Due to the development of the Internet, Internet banking that we are liberated from time and space has evolved into banking system. So modern life became comfortable. However, Dysfunction (malicious Information leakage and hacking etc.) of the Internet development has become a serious social problem. According to this, The need for security is rapidly growing. In this paper, we proposed the Internet Banking Authentication System using a dual-channel in OTP(One Time Password) authentication. This technology is that A user transfer transaction information to Bank through one Internet channel then bank transfer transaction information to user using the registered mobile phone or smart phone. If user confirm transaction information then bank request user's OTP value. User create OTP value and transfer to bank and bank authenticate them throgth the ARS. If authentication is pass then transaction permitted. Security assessment that the proposed system, the security requirement that the confidentiality and integrity, authentication, repudiation of all of the features provide a key length is longer than the current Internet banking systems, such as using encryption, the security provided by the Financial Supervisory Service Level 1 rating can be applied to more than confirmed.

Design and Implementation of a Scenario Composition Supporting Tool for Object-Oriented Integration Testing Using the Requirement Trace Table (요구사항 추적테이블을 이용한 객체지향 통합 테스트 시나리오 작성지원 도구의 설계 및 구현)

  • Choe, Sin-Hyeong;Han, Pan-Am
    • The KIPS Transactions:PartD
    • /
    • v.9D no.4
    • /
    • pp.651-658
    • /
    • 2002
  • This paper suggests the scenario composition supporting method, which can be used to perform integration test based on specification, and implemented a scenario composition supporting tool. To compose scenario for object-oriented integration testing, requirement specification, Process definition table and program to table relation diagram are used. In addition, requirement trace table is created. It can check user's requirements, quickly and exactly, dividing former three fables into the stages of requirement analysis, design, and test. The output of scenario composition supporting tool plays a guide part in composing scenario. This tool can reduce scenario composition effort of quality for the checking team and prevent an omission of requirement and input of errors during the test.

Improvement of the Semantic Information Retrieval using Ontology and Spearman Correlation Coefficients (온톨로지 기술과 스피어만 상관계수를 적용한 시맨틱 정보 검색 향상)

  • Lee, Byungwook
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.351-357
    • /
    • 2013
  • Information retrieval by query keywords have some mismatching problems to fit user's requirement for the retrieved documents due to the varieties of users. These problems are originated from the different situations and characteristics of user's requirement. Also, it has a problem that general correlation coefficients did not display the information relations. In this thesis, it is to suggest knowledge retrieval system to verify feasibility of personnel selection procedure and results supporting selection rules after construction of personnel selection ontologies and rules composed of various concept and knowledge based on the semantic web technology. In the suggested system, it is to clear disadvantages of limited information retrieval providing the suitable information to satisfy user's different situations and characteristics using Spearman's coefficients. Experimental results by this semantic-based information retrieval show 90.3% of accuracy and 71.8% of recall compared with legacy keyword information retrieval.

The Development of the Mobile HomeNetwork Components (모바일 홈네트워크 컴포넌트 개발)

  • Kim, Chi-Su;Kim, Young-Tae;Kong, Heon-Tag;Lim, Jae-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.8
    • /
    • pp.1860-1868
    • /
    • 2009
  • As general use of Mobile devices, the integration operations between the Home network is active. For popularization of Home network interface of normalizing in user's use convenience offer must, and developer must be able to cope sensitively in change development and requirement, hereafter such as maintenance with normalized interface environment. In the case of Home network, because several terminal information devices have to be used to a Home server, user establishment and exclusion should be easy and should adapt fast in requirement alteration and maintenance. In this paper, we designed and implemented mobile home network components with applied efficient information transmission interface that can be applied to the various application of OSGi platform. These components can respond quickly of user requirements and maintenance and that can be reuse and evolved.

A study on user Satisfaction of the Junior College Library based on its Characteristics of Space Composition (전문대학도서관의 공간구성 특성에 따른 이용만족도 연구)

  • Lee, Su-Young
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.24 no.6
    • /
    • pp.37-44
    • /
    • 2017
  • This study is about user satisfaction of the Junior College Library based on its characteristics of space composition. For this, we studied characteristics of space composition targeting the libraries in colleges in Seoul and Gyeonggi-do. First, in case of study of characteristics of space composition for books and library data, student satisfaction for traditional and normal library areas was high. It means that the service based on library areas should start from normal library areas as well as there is a change about space as the type of data in libraries change to electric data and multimedia. Second, If we look at the space for a reader and a user, satisfaction for a normal reading room was high. we can also see that satisfaction for a computer room and a multimedia reading room was not higher but still high. Also, the reason why satisfaction for a multimedia reading room that provides various activities was high was that the complex of a library space is needed to provide users with various activities. Third, in case of space for programme function and meeting, satisfaction for the room of video information and the group study room was high. we can see that user satisfaction for the space got high basically when a user is satisfied with the proper information technology based on interaction Fourth, as a result of variance analysis of 3 spaces of Junior College Library and the services, the size of the space of service does not influence user satisfaction directly. Even the space is small, if it decorates variously like with a lighting for a user, a window seat to meet the nature of users and has specific factors such as space reservation using internet, user satisfaction is high. If we summarise the result of this study, to make user satisfaction for speace in a Junior College Library higher, not just we need to try to make it extend as a educational, a cultural place but we also need to accept the student's requirement that the space also needs to be extend as a complex cultural space.

The Study on the Emotional Lighting by Combination of Hybrid Materials (혼성적 소재의 결합을 통한 감성조명 연구)

  • Lee, Yun-Joo
    • Proceedings of the Korean Institute of Interior Design Conference
    • /
    • 2006.11a
    • /
    • pp.187-188
    • /
    • 2006
  • With development of global network in the 21th century, Korea has recklessly accepted western culture occurred damages to our identity. Development of traditions in a modern way contribute us Korea identity and future vision. This study has studied about combination traditional material and contemporary material with a view to diversified user's desires and individuality. This object shows that function and decoration coexist together, and design reflects mans life and thinking of the age as a reflection of sociocultural phenomena. The purpose of this work to create the object that meets mans requirement and even foresees the possibility of such requirement through converting into various appearances. Different concepts including closed singleness and expansion within open structure coexist one element. also this objects suggest that transformative expressions that simplify or transform, the forms can be freely changed by consumer's emotional changes. Here, light and form are experimented for creating diversified emotions. Considering design as positively responding behavior against the limitations given by environment instead of the solution to simple functional requirement, future design will find Its value more In more active response.

  • PDF

A Study on the RTMD(Requirement Tracing Matrix Design) Base on UML (UML기반의 요구사항 추적 매트릭스 설계)

  • Heo, Kwae-Bum;Kim, Young-Gyu;Yang, Dong-Il
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.3
    • /
    • pp.419-431
    • /
    • 2011
  • Design traceability has been widely recognized as being an integral aspect of software development. Also many projects for software application development have failed because that the projects did not analyze user requirements sufficiently and reflected them in the projects adequately. This thesis proposes a specification and tracing technique for object-oriented analysis and design. The subject of this study is the artifacts of UML development methodology. Therefore, to improve the quality of the software development cycle, in short, the system requirement of customers will be able to respond quickly.

An Attribute-Based Authentication Scheme Using Smart Cards (스마트카드를 이용한 속성기반 사용자 인증 스킴)

  • Yoo, Hye-Joung;Rhee, Hyun-Sook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.41-47
    • /
    • 2008
  • In a network environment, when a user requests a server's service, he/she must pass an examination of user authentication. Through this process, the server can determine if the user can use the provided services and the exact access rights of this user in these services. In these authentication schemes, the security of private information became an important issue. For this reason, many suggestions have been made in order to protect the privacy of users and smart cards have been widely used for authentication systems providing anonymity of users recently. An remote user authentication system using smart cards is a very practical solution to validate the eligibility of a user and provide secure communication. However, there are no studies in attribute-based authentication schemes using smart cards so far. In this paper, we propose a novel user authentication scheme using smart cards based on attributes. The major merits include : (1) the proposed scheme achieves the low-computation requirement for smart cards; (2) user only needs to register once and can use permitted various services according to attributes; (3) the proposed scheme guarantees perfect anonymity to remote server.

Design and Construction of High Speed Data Communication Network Using FDDI and Frame Realy (FDDI와 프레임 릴레이를 이용한 고속 데이터 통신망 설계 및 구축)

  • 김도현
    • Journal of the military operations research society of Korea
    • /
    • v.23 no.2
    • /
    • pp.171-191
    • /
    • 1997
  • In this paper, we design and construct a high speed LAN(Local Area Network) using FDDI(Fiber Distributed Data Interface) and Frame Relay in order to support our multimedia communication services. A program of this communication network is divided into requirement analysis, design, establishment and test. First, we propose an optimal communication method that compares various network techniques in the requirement analysis phase. Second, we design the physical network configuration, secure method, and address in the LAN and WAN. Finally, we establish and test the communication devices and lines. Ultimately, we minimized mistakes and satisfied user requirements using this program. We constructed efficiently a high speed data communication network using FDDI and Frame Relay.

  • PDF