• Title/Summary/Keyword: Web Party

Search Result 63, Processing Time 0.025 seconds

A Study on the Functions and Problems of Bolero Bill of Lading in the Days of Global Electronic Trading (글로벌 전자무역시대(電子貿易時代)에서의 볼레로 선화증권(船貨證券)의 기능(機能)과 문제점(問題點))

  • Choi, Seok-Beom
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.14
    • /
    • pp.177-218
    • /
    • 2000
  • Global Electronic Trading means that trading partners trade each other via Global Electronic Trading Network, that is, global business to business electronic commerce. Recently, where the cargo arrives ahead of the B/L, the importer cannot take delivery of the cargo without the B/L. This situation is referred to as the B/L dilemma. But the BOLERO system will resolve this B/L dilemma. Bolero Project is developing a cross industry utility platform for the secure, electronic transfer of commercial trade information world wide. After the successful testing of an original pilot project, The Bolero Association was formed in 1995 by a group of interested cross industry companies. As a joint venture between SWIFT and TT Club, bolero.net is changing the way the world trades by providing a web-based, paperless mode of commerce that is designed to become a global standard. Bolero International Limited published the first edition of Bolero Rulebook in 1999. The Bolero Rulebook as amended from time to time, governing the relationship between Users and their rights and obligations arising from the Bolero system. The Bolero service will be governed by a multilateral contract called the Bolero Rule Book which specifies the rights and responsibilities of Bolero and its users. The Title Registry and Bolero Bill of Lading provide a fully functional equivalent to the paper bill of lading. The Bolero Bill of Lading can be created, transferred, amended, and surrendered by way of designating to order party, blank endorsement, refusal by the transferee etc. Thus, this study deals with the functions of Bolero Bill of Lading and the problems and solutions in the Bolero Bill of Lading in point of definitions and operation under the Bolero Rulebook.

  • PDF

Design and Implementation of National Supercomputing Service Framework (국가 슈퍼컴퓨팅 서비스 프레임워크의 설계 및 구현)

  • Yu, Jung-Lok;Byun, Hee-Jung;Kim, Han-Gi
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.12
    • /
    • pp.663-674
    • /
    • 2016
  • Traditional supercomputing services suffer from limited accessibility and low utilization in that users(researchers) may perform computational executions only using terminal-based command line interfaces. To address this problem, in this paper, we provide the design and implementation details of National supercomputing service framework. The proposed framework supports all the fundamental primitive functions such as user management/authentication, heterogeneous computing resource management, HPC (High Performance Computing) job management, etc. so that it enables various 3rd-party applications to be newly built on top of the proposed framework. Our framework also provides Web-based RESTful OpenAPIs and the abstraction interfaces of job schedulers (as well as bundle scheduler plug-ins, for example, LoadLeveler, Open Grid Scheduler, TORQUE) in order to easily integrate the broad spectrum of heterogeneous computing clusters. To show and validate the effectiveness of the proposed framework, we describe the best practice scenario of high energy physics Lattice-QCD as an example application.

Distributed Intrusion Detection System for Safe E-Business Model (안전한 E-Business 모델을 위한 분산 침입 탐지 시스템)

  • 이기준;정채영
    • Journal of Internet Computing and Services
    • /
    • v.2 no.4
    • /
    • pp.41-53
    • /
    • 2001
  • Multi-distributed web cluster model built for high availability E-Business model exposes internal system nodes on its structural characteristics and has a potential that normal job performance is impossible due to the intentional prevention and attack by an illegal third party. Therefore, the security system which protects the structured system nodes and can correspond to the outflow of information from illegal users and unfair service requirements effectively is needed. Therefore the suggested distributed invasion detection system is the technology which detects the illegal requirement or resource access of system node distributed on open network through organic control between SC-Agents based on the shared memory of SC-Server. Distributed invasion detection system performs the examination of job requirement packet using Detection Agent primarily for detecting illegal invasion, observes the job process through monitoring agent when job is progressed and then judges the invasion through close cooperative works with other system nodes when there is access or demand of resource not permitted.

  • PDF

A Study on Development of u-4PL Based Air Cargo Logistics System (항공물류에 적용한 u-4PL 시스템 개발 연구)

  • Li, Guang-Zhu;Na, Hyeong-Seok;Lee, Doo-Yong;Li, Zhong-Shi;Lee, Chang-Ho
    • Journal of the Korea Safety Management & Science
    • /
    • v.10 no.4
    • /
    • pp.181-187
    • /
    • 2008
  • The market of air cargo in Korea grows very quickly and diversifies. It is an essential factor in the process of development of Northeast-Asia as a hub for Air Cargo logistics. But the process of air cargo in Korea is complex as compared with other north-east asia nations and it has many problems and causes inconvenience to owners of freight. We emphasize that 4PL(Fourth party Logistics) is the excellent solution from among many alternatives. The wave of 4PL added to strategic consulting based on new IT techniques, for example RFID, with logistics outsourcing through existing 3PL service is a great issue. It is also worthy of notice that EPCglobal network strengthen the role of 4PL. In conclusion, the 4PL system based on EPCglobal network will result in a good success, so it will raise a prestige of air cargo in Korea to a higher position. This study deals with the new logistics system, air cargo logistics system based on u-4PL system, RFID and EPCglobal network, that will bring many advantages. At the end, we verify the u-4PL air cargo logistics system by simulation tool.

Design and Implementation of SNS-linked Location based Mobile AR Systems using OpenAPI on Android (안드로이드 기반 OpenAPI를 이용한 SNS 연동 지역정보 서비스를 위한 모바일 증강현실 시스템 설계 및 구현)

  • Kim, Cheong-Ghil;Chung, Ji-Moon
    • Journal of Digital Convergence
    • /
    • v.9 no.2
    • /
    • pp.131-140
    • /
    • 2011
  • As the recent advances in network and wireless communications and semiconductor design and process technologies, our computing platform is rapidly shifting from desktop PCs to mobile devices such as UMPC (Ultra Mobile PC), Tablet PC, and Smartphone. Especially, wide-spreading Smartphones allow a new field of application based on location based services available with an user interface called augmented reality (AR). Therefore, this paper introduces an implementation of AR using various OpenAPls on Android Smartphones. In order to utilize enrich user data in real time, the system integrates with location based social network services also with OpenAPI. These APIs enable third-party developers to make use of rich contents of many portal web sites. The prototype was implemented on the real Android phone, Sky Sirius, and the result shows that it can provide an efficient location based service using AR technology without any constraints on mobile devices; in addition, it connects SNS to AR for sharing user data including photos, videos, and messages based on a specific location.

SIP Session Control using Web service-based Open API in IMS (웹서비스 기반 Open API를 이용한 IMS 망의 SIP 세션 제어)

  • Park, Yoo-Mi;Yim, Jong-Chul;Choi, Young-Il;Kim, Sang-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.12B
    • /
    • pp.1112-1122
    • /
    • 2008
  • This paper reviews the Parlay X and proposes SIP multimedia session control mechanism which is able to be implemented over IMS using Extended Call Control APIs of Parlay X. Parlay X is one of the industrial standards of Open API in the telecommunication to open network resources and capabilities to third party service providers. In this paper, SIP session control mechanism is described by depicting call flows of basic and essential session handling methods including session initiation, transfer, restoration, and termination. We also show how easy Parlay X Extended Call Control APIs can be used for the purpose of complicated calls handling in the IT applications. To verify feasibility of the blended services based on convergence of telecommunication and internet with regard to performance, we accomplish experimental performance of Extended Call Control APIs from IT application through open service gateway. We show Open API could be applied to next generation network based on IMS without serious degradation of the network performance.

Message Security Level Integration with IoTES: A Design Dependent Encryption Selection Model for IoT Devices

  • Saleh, Matasem;Jhanjhi, NZ;Abdullah, Azween;Saher, Raazia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.328-342
    • /
    • 2022
  • The Internet of Things (IoT) is a technology that offers lucrative services in various industries to facilitate human communities. Important information on people and their surroundings has been gathered to ensure the availability of these services. This data is vulnerable to cybersecurity since it is sent over the internet and kept in third-party databases. Implementation of data encryption is an integral approach for IoT device designers to protect IoT data. For a variety of reasons, IoT device designers have been unable to discover appropriate encryption to use. The static support provided by research and concerned organizations to assist designers in picking appropriate encryption costs a significant amount of time and effort. IoTES is a web app that uses machine language to address a lack of support from researchers and organizations, as ML has been shown to improve data-driven human decision-making. IoTES still has some weaknesses, which are highlighted in this research. To improve the support, these shortcomings must be addressed. This study proposes the "IoTES with Security" model by adding support for the security level provided by the encryption algorithm to the traditional IoTES model. We evaluated our technique for encryption algorithms with available security levels and compared the accuracy of our model with traditional IoTES. Our model improves IoTES by helping users make security-oriented decisions while choosing the appropriate algorithm for their IoT data.

INTRA-AND INTERGOVERNMENTAL INFORMATION SYSTEM TO MANAGE INFORMATION IN URBAN RENEWAL PROJECT

  • Dong-bum Kim;Jin-Won Kim;Ju-Hyung Kim;Jae-Jun Kim
    • International conference on construction engineering and project management
    • /
    • 2011.02a
    • /
    • pp.561-566
    • /
    • 2011
  • In general, the early stage of urban renewal such as preparing a master plan and processing administrative works including planning permission are conducted by local governments in Korea. The local governments need to review the status of projects that are undergone in other local governments' territories. However, no integrated information system to manage information to this end at the level of nation exists in Korea. If the system would be developed, it may support central government to obtain information on required resources at the national level. In addition, local governments can gain guidance on the process and recognize potential problematic situations from others experience. The system should include functions to collect data on project summary, cost and schedule of projects according to local governments. The expected effects from using the information system are as following. First, information generated from project practice become more credible on account of management at the national level. Because the authorized party such as system administrative agents of governments are responsible for collecting and managing data. Second, the unified information system with no regard to the place where projects progresses reduces the efforts for accumulating reference data for aiding local governments decision making by providing appropriate information timely. Also, enhanced information accessibility for stakeholders make the project process clear. Finally, oversight management is enforced with visualization technology adopted in the system, presenting master plan and mass model including information on usage by floors and progressing information graphically. Ultimately, potential challenges can be anticipated by considering records accumulated from other local governments' projects. This paper presents concept, functionalities, and architecture of information system enabling to manage data from individual projects and aggregate those for oversight management for local and central governments. As a part of systems analysis, general requirements of briefing system for governments and necessary data fields to this end are identified.

  • PDF

Design and Implementation of HPC Job Management Framework for Computational Scientific Simulation (계산과학 시뮬레이션을 위한 HPC 작업 관리 프레임워크의 설계 및 구현)

  • Yu, Jung-Lok;Kim, Han-Gi;Byun, Hee-Jung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.554-557
    • /
    • 2016
  • Recently, supercomputer has been increasingly adopted as a computing environment for scientific simulation as well as education, healthcare and national defence. Especially, supercomputing system with heterogeneous computing resources is gaining resurgence of interest as a next-generation problem solving environment, allowing theoretical and/or experimental research in various fields to be free of time and spatial limits. However, traditional supercomputing services have only been handled through a simple form of command-line based console, which leads to the critical limit of accessibility and usability of heterogeneous computing resources. To address this problem, in this paper, we provide the design and implementation of web-based HPC (High Performance Computing) job management framework for computational scientific simulation. The proposed framework has highly extensible design principles, providing the abstraction interfaces of job scheduler (as well as bundle scheduler plug-ins for LoadLeveler, Sun Grid Engine, OpenPBS scheduler) in order to easily incorporate the broad spectrum of heterogeneous computing resources such as cluster, computing cloud and grid. We also present the detailed specification of HTTP standard based RESTful endpoints, which manage simulation job's life-cycles such as job creation, submission, control and status monitoring, etc., enabling various 3rd-party applications to be newly created on top of the proposed framework.

  • PDF

A Categorization Method based on RCBAC for Enhanced Contents and Social Networking Service for User (사용자를 위한 향상된 콘텐츠 및 소셜 네트워킹 서비스 제공을 위한 RCBAC 기반 분류 방법)

  • Cho, Eun-Ae;Moon, Chang-Joo;Park, Dae-Ha
    • Journal of Digital Contents Society
    • /
    • v.13 no.1
    • /
    • pp.101-110
    • /
    • 2012
  • Recently, social network sites are very popular with the enhancement of mobile device function and distribution. This gives rise to the registrations of the people on the social network sites and the usage of services on the social sites is also getting active. However, social network sites' venders do not provide services enough compared to the demand of users' to share contents from diverse roots by users effectively. In addition, the personal information can be revealed improperly in processes sharing policies and it is obvious that it raises a privacy invasion problem when users access the contents created from diverse devices according to the relationship by policies. However, the existing methods for the integration management of social network are weak to solve this problem. Thus, we propose a model to preserve user privacy, categorize contents efficiently, and give the access control permissions at the same time. In this paper, we encrypt policies and the trusted third party classifies the encrypted policies when the social network sites share the generated contents by users. In addition, the proposed model uses the RCBAC model to manage the contents generated by various devices and measures the similarity between relationships after encrypting when the user policies are shared. So, this paper can contribute to preserve user policies and contents from malicious attackers.