• Title/Summary/Keyword: Web base

Search Result 595, Processing Time 0.026 seconds

RBAC Method using Certificates (인증서를 이용한 역할기반 접근제어방안)

  • Park, Chong-Hwa;Kim, Ji-Hong
    • The Journal of Information Technology
    • /
    • v.6 no.1
    • /
    • pp.11-20
    • /
    • 2003
  • With the development of Information Communication Technique, electronic commerce using PKIs is widely used over the Internet. The goal of access control is to counter the threat of unauthorized operations involving Web-server or data base systems. The RBAC(Role-Based Access Control) has recently received considerable attention as a promising alternative to traditional discretionary and mandatory access controls. In this paper we propose two methods, the RBAC system using attribute certificates and the RBAC system using SPKI certificates. And we analyze and compare the two methods.

  • PDF

The Implementation of OPENLS Presentation Service in Location Based System

  • Heo, Tae-Wook;Lee, Jun-Wook;Kim, Sung-Soo;Park, Jong-Hyun
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.555-557
    • /
    • 2003
  • Location-based services allow consumers to receive services based on their geographic location data. For example, businesses can provide information to find traffic facility, public restaurant, a hospital, and a station based on the consumer’s location at a particular moment. Also, they wish to grasp a accurate location based service in mobile device or PDA. So, this paper shows that presentation service offers a base-map to be overlaid OpenLS (Open Location Services)’s directory service, route determination service, geocode and reverse-geocode service. The presentation service is the portrayal of a map and portrayal of feature as map overlays.

  • PDF

Implementation of Security Model Base on Peer to Peer Network (P2P 네트워크 구조에 기반한 보안 모델 구현)

  • 김경석;박진영;이구연
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.805-807
    • /
    • 2001
  • 본 논문은 P2P 네트워크 구조에 기반한 보안 모텔 구청에 관한 것을 논하고 있다. 현재 많이 사용되고 있는 P2P 프로토콜중에는 중계서버가 있어 각각의 peer가 데이터를 공유하고, 검색할 수 있게 하는 방법과 중계서버가 존재하지 않고 peer간의 통신만으로 구성되어지는 방식이 있다. 본 논문에서는 두 가지 방식의 장점을 이용해서 서버를 통하여 다른 peer의 정보를 얻어 올 수도 있으나 그렇지 못한 경우에도 캐쉬된 기존 정보에서의 자체 검색과 다른 peer와의 통신을 통해서 P2P 동작이 가능하도록 네트워크을 구성하였다. 이러한 P2P 네트워크 구조에서 취약할 수 있는 보안환경을 SSL(Secure Socket Layer)을 이용하며 웹 (web)을 통해 서버와 통신하는 단계와 peer 간에 정보 교환을 위한 통신에 적용하였으며, 그룹키(group key)를 이용하여 보안 멀티캐스트 환경을 구현하였다.

  • PDF

Implementation of Web-based Social Network Service Systems for Campus Management (학교 서비스를 위한 웹 기반 SNS 시스템 구현)

  • Kim, Seon Jung;Kim, June Young;Lim, Seung-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.90-93
    • /
    • 2013
  • 최근 IT Service 에는 SNS 즉, Social Network Service가 주를 이루고 있다. Facebook, Twitter 등 자신의 일상을 친구들과 공유하는 웹 기반 Service가 사람들에게 많이 이용되고 인기를 끌고 있다. SNS system이 일반화되어 가면서, 보다 전문적이고 국소적인 분야에 특성화되어 발전되어 나갈 것으로 보이며, 이러한 SNS 시스템을 최적화 하기 위해 SNS 프로토타입을 직접 개발해 볼 필요가 있다. 본 논문에서는 학교 캠퍼스 정도 규모의 서비스를 위한 웹 기반의 SNS들이 어떠한 구조로 이루어져 있으며, 어떠한 원리로 동작하는지 알아보고, Server, DataBase, PHP 를 이용하여 웹 기반 SNS 시스템을 직접 구현하고 시연해 봄으로써 SNS System에 대한 이해를 해보고, SNS system에 대한 향후 방향을 모색해 보도록 한다.

Design and Implementation of Lesson Plan System for teacher-student based on XML (XML 기반 교수-학생 학습지도 시스템의 설계 및 구현)

  • Choi, Mun-Kyoung;Kim, Haeng-Kon
    • The KIPS Transactions:PartD
    • /
    • v.9D no.6
    • /
    • pp.1055-1062
    • /
    • 2002
  • Recently, the lesson plan document that is imported in the educational area is not provided to the educational information systematically, and the teachers are not easy to compose the lessen plan documentation. So, it needs additional time and effort to develope the lesson plan documents. Because of increasing the distributing network. web-based lesson plan system is required to all of the education area. Therefore, we need to compose the lesson plan that is possible to obtain the various teacher's requirement by providing creation, retrival, and reusability of document using the standard XML on web. In this paper, we developed the system for creating the common DTD (Document Type Definition), providing the standard XML document through the common DTD over the lesson plan analysis. In this system, it provides the editor to compose the lesson plan and supports the searching function to improvement of reusability on the existing lesson plan. We design the searching functions such as the structure base, facet and keyword. The composed lesson plans are interoperated with Database. Consequently, we can share the information on web by composing the lesson plan using the XML and save the time and cost by directly writing the lesson plan on web. We can also provide the improved learning environment.

Active Documents: Programs by Form Designers (능동문서: 서식설계자의 프로그램)

  • Nam, Chul-Ki;Bae, Jae-Hak;Yoo, Hae-Young
    • The KIPS Transactions:PartB
    • /
    • v.10B no.6
    • /
    • pp.599-610
    • /
    • 2003
  • The Web plays an important role as information source and most Web applications are document-centric. A document implies an intention of its own designer, which can be utilized actively in automation of business processes. Through an understanding of an intrinsic nature of a document function, we can see a document as an executable computer program in a special case. For this approach, we propose an active document model that is composed of form, knowledge base, rules, and queries. For reusability and interoperability of a document, each component of the proposed model is uniformly represented in XML. The proposed active document not only plays a passive role in providing user interfaces, but also is a document that a machine can infer and process with reading a procedure of document processing and business rules intended by document designers. Through this approach, document can interact with machines and can cooperate with other applications. For applicability of our active document, we show a case study for the processing of purchase orders in a B2B e-Commerce system. This paper is expected to provide the framework of accelerating the development of intelligent applications through our approach regards form document as a computer program. In short, the proposed active document contains knowledge representation and processing method, consequently our document will play an important role in providing a concept of document of pursuing in Semantic Web.

The development of web based teaching and learning system for the efficient operation of "professional learning activity" model ("전문가 학습 활동"모형의 효율적 운영을 위한 웹 기반 교수.학습 시스템 개발)

  • Park, Soon-Il;Goh, Byung-Oh
    • Journal of The Korean Association of Information Education
    • /
    • v.8 no.3
    • /
    • pp.293-303
    • /
    • 2004
  • To follow in change and the development which circumference environment of education are quick even from scene of education students form the structure of knowledge themselves, the place where own lead studying of personal small group studying is emphasized, here upon specialist learning activity there is a wild possibility in the model which is suitable. But, studying of the learning paper was most center mainly the specialist learning activity of existing, it solves a learning problem at unit hour to, the hour was too insufficient to solve and it became plentifully at block time. But, this is to the curriculum operation and or the schedule operation it is when trying to consider the intensive degree of learning the elementary student, a problem point there is. It grasps the strong point and a weak point of specialist learning activity model of existing from the research which consequently, it sees and it applies more efficiently from web base study to establish the instructional strategy for, it composed the modules which strengthen the interaction of learning subject for. Also, unit macro learning and block time learning in order to do to become accomplished at web with studying problem, it will be able to solve inside unit hour in order, specialist teaching-learning system based on the web. It developed, after applied in the electrification S elementary school 5 grades which will reach the result, it analyzed.

  • PDF

A Macro Attacks Detection Model Based on Trace Back Information (트레이스 백 정보에 기반한 매크로 공격 탐지 모델)

  • Baek, Yong Jin;Hong, Suk Won;Park, Jae Heung;Kang, Gyeong Won;Kim, Sang Bok
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.113-120
    • /
    • 2018
  • Today, the development of information and communication technology is rapidly increasing the number of users of network-based service, and enables real-time information sharing among users on the Internet. There are various methods in the information sharing process, and information sharing based on portal service is generally used. However, the process of information sharing serves as a cause of illegal activities in order to amplify the social interest of the relevant stakeholders. Public opinion attack using macro function can distort normal public opinion, so security measures are urgent. Therefore, security measures are urgently needed. Macro attacks are generally defined as attacks in which illegal users acquire multiple IP or ID to manipulate public opinion on the content of a particular web page. In this paper, we analyze network path information based on traceback for macro attack of a specific user, and then detect multiple access of the user. This is a macro attack when the access path information for a specific web page and the user information are matched more than once. In addition, when multiple ID is accessed for a specific web page in the same region, it is not possible to distort the overall public opinion on a specific web page by analyzing the threshold count value.

  • PDF

Reliable Image-Text Fusion CAPTCHA to Improve User-Friendliness and Efficiency (사용자 편의성과 효율성을 증진하기 위한 신뢰도 높은 이미지-텍스트 융합 CAPTCHA)

  • Moon, Kwang-Ho;Kim, Yoo-Sung
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.27-36
    • /
    • 2010
  • In Web registration pages and online polling applications, CAPTCHA(Completely Automated Public Turing Test To Tell Computers and Human Apart) is used for distinguishing human users from automated programs. Text-based CAPTCHAs have been widely used in many popular Web sites in which distorted text is used. However, because the advanced optical character recognition techniques can recognize the distorted texts, the reliability becomes low. Image-based CAPTCHAs have been proposed to improve the reliability of the text-based CAPTCHAs. However, these systems also are known as having some drawbacks. First, some image-based CAPTCHA systems with small number of image files in their image dictionary is not so reliable since attacker can recognize images by repeated executions of machine learning programs. Second, users may feel uncomfortable since they have to try CAPTCHA tests repeatedly when they fail to input a correct keyword. Third, some image-base CAPTCHAs require high communication cost since they should send several image files for one CAPTCHA. To solve these problems of image-based CAPTCHA, this paper proposes a new CAPTCHA based on both image and text. In this system, an image and keywords are integrated into one CAPTCHA image to give user a hint for the answer keyword. The proposed CAPTCHA can help users to input easily the answer keyword with the hint in the fused image. Also, the proposed system can reduce the communication costs since it uses only a fused image file for one CAPTCHA. To improve the reliability of the image-text fusion CAPTCHA, we also propose a dynamic building method of large image dictionary from gathering huge amount of images from theinternet with filtering phase for preserving the correctness of CAPTCHA images. In this paper, we proved that the proposed image-text fusion CAPTCHA provides users more convenience and high reliability than the image-based CAPTCHA through experiments.

Repair of Unilateral Cleft Lip and Nose: Mulliken's Modification of Rotation Advancement (편측 구순열비의 교정술: Rotation Advancement 원칙에 근거한 Mulliken의 방법)

  • Jung, Young-Soo;Lee, Gyu-Tae;Jung, Hwi-Dong;Mulliken, John B.
    • Maxillofacial Plastic and Reconstructive Surgery
    • /
    • v.34 no.2
    • /
    • pp.133-139
    • /
    • 2012
  • This is a review regarding Mulliken's Modification using the Millard rotation-advancement principle for the repair of unilateral complete cleft lip and nasal deformity. All patients underwent prior labionasal adhesion and dentofacial orthopedics with a pin-retained (Latham) appliance used for infants with a cleft of the lip and palate. Technical variations concerning the operation are described. A high rotation and releasing incision in the columella lengthens the medial labial element and produces a symmetric prolabium with minimal transgression of the upper philtral column through the advancement flap. The orbicularis oris muscle is everted, from caudad to cephalad, to form the philtral ridge. A minor variation of unilimb Z-plasty is used to level the cleft side of Cupid's bow handle, and cutaneous closure proceeds superiorly from this junction. The dislocated alar cartilage is visualized though a nostril rim incision and suspended to the ipsilateral upper lateral cartilage. Symmetry of the alar base is addressed in three dimensions, including maneuvers to position the deviated anterior-caudal septum, configure the sill, and efface the lateral vestibular web. The authors believe the technical refinements described herein contribute favorably to the outcome of repair regarding unilateral cleft lip and nasal distortion.