• Title/Summary/Keyword: e-Business Architecture

Search Result 250, Processing Time 0.028 seconds

Design of Workflow Management System using Web Services (웹 서비스를 이용한 워크플로우 관리 시스템의 설계 방안)

  • 오명은;이용표;한상용
    • Proceedings of the CALSEC Conference
    • /
    • 2003.09a
    • /
    • pp.230-235
    • /
    • 2003
  • A Workflow Management System is one which provides procedural automation of a business process by management of the sequence of work activities. The existing workflow management systems have limitation of interaction among application systems. In this paper, we propose a new workflow management system that can be adapted in dynamically changed paradigm of distributed computing by using Web Service. System Architecture and prototyping execution model of the system is described in BPEL4WS.

  • PDF

Trusted Third Party for Clearing Consumption Tax of Global Electronic Commerce and System Architecture of Global Electronic Tax Invoice (GETI)

  • Yeoul , Hwang-Bo;Jung, Yang-Ook
    • Proceedings of the CALSEC Conference
    • /
    • 2003.09a
    • /
    • pp.261-267
    • /
    • 2003
  • This study deals with controversial issues surrounding the today′s cyber-taxation and recommends feasible consumption tax system architecture titled Global Electronic Tax Invoice System (GETI). The GETI is an electronic consumption tax architecture to provide "all-in-one" tax and e-payment services through a trusted third party (TTP). GETI is designed to streamline the overall cyber-taxation process and provide simplified and transparent tax invoice services through an authorized np. To ensure information security, GETI incorporates public Key infrastructure (PKI) based digital certificates and other data encryption schemes when calculating, reporting, paying, and auditing tax in the electronic commerce environment. GETI is based on the OECD cyber-taxation agreement that was reached in January 2001, which established the taxation model for B2B and B2C electronic commerce transactions. For the value added tax systems, tax invoice is indispensable to commerce activities, since they provide documentations to prove the validity of commercial transactions. As paper-based tax invoice systems are gradually phased out and are replaced with electronic tax invoice systems, there is an increasing need to develop a reliable, efficient, transparent, and secured cyber-taxation architecture. To design such architecture, several desirable system attributes were considered -- reliability, efficiency, transparency, and security. GETI was developed with these system attributes in mind.

  • PDF

A Study on GPGPU Performance Improvement Technique on GCN Architecture Using OpenCL API (GCN 아키텍쳐 상에서의 OpenCL을 이용한 GPGPU 성능향상 기법 연구)

  • Woo, DongHee;Kim, YoonHo
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.1
    • /
    • pp.37-45
    • /
    • 2018
  • The current system upon which a variety of programs are in operation has continuously expanded its domain from conventional single-core and multi-core system to many-core and heterogeneous system. However, existing researches have focused mostly on parallelizing programs based CUDA framework and rarely on AMD based GCN-GPU optimization. In light of the aforementioned problems, our study focuses on the optimization techniques of the GCN architecture in a GPGPU environment and achieves a performance improvement. Specifically, by using performance techniques we propose, we have reduced more then 30% of the computation time of matrix multiplication and convolution algorithm in GPGPU. Also, we increase the kernel throughput by more then 40%.

A Study on the Semantic Web enabled Knowledge Management System Architecture (시맨틱 웹 기술을 적용한 지식관리시스템 아키텍처에 관한 연구)

  • 전종홍;이원석;이강찬
    • The Journal of Society for e-Business Studies
    • /
    • v.8 no.4
    • /
    • pp.183-205
    • /
    • 2003
  • There have been various attempts of Knowledge Management System in order to effectively support Knowledge Process and to manage a wide variety of unstructured knowledge. However, Knowledge Management System basically has some significant weakness for searching knowledge, extracting information and maintenance, and some difficulties to integrate such various knowledge resources. Several studies had been conducted to overcome these weaknesses and to improve the method of knowledge management. The purpose of this study is 1) to examine the effectiveness of Semantic Web Technology that has a great attention lately; whether it is useful to overcome the weaknesses, and 2) to review its strong points and some future uses. Further, differences of Semantic Web Technology compared to existing Knowledge Management System Architecture are reviewed. Finally, a new Semantic Web Enabled KMS Architecture is proposed. Also some prospects for future market direction are suggested.

  • PDF

Collaborative workflow architecture modeling in B2B (B2B에서의 Collaborative 워크플로우 아키텍처 모델링)

  • Kim TaeWoon;Han YongHo;Kim SeungWan
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2002.05a
    • /
    • pp.909-915
    • /
    • 2002
  • Collaborative system is an essential idea in the global and e-business environments Workflow plays a key role implementing collaborative system. Workflow is an emerging technology for business process automation, monitoring integrity enforcement, and recovery. A process model describes the structure of business process in the real world The process model can be transformed into a Workflow model utilizing a computer. The paper proposes a web-based Workflow process design in the B2B environment Considering a global environment where the partners interchange their processes beyond the company boundaries, a web-based infrastructure is the most preferred platform Considering this, Workflow processes and e-Business structures were combined together on the web environment.

  • PDF

The study on the construction of IWSDB for National Defense CALS (국방 CALS를 위한 IWSDB 구축에 관한 연구)

  • 신선우;손해용;김철환
    • The Journal of Society for e-Business Studies
    • /
    • v.1 no.1
    • /
    • pp.93-116
    • /
    • 1996
  • This study aims to develop an approach to construct IWSDB for National Defense CALS. Along with the introduction of Korean version of CALS conception, it is essential to analyze the national defense system with a new information technology for the construction of IWSDB. A long-tenn goal of CALS is to construct fully Integrated Data Environment (IDE) and establish IWSDB for the application of CALS conception to the life cycle management of weapon system. IWSDB is a set of databases that contain digital data. It supports common interface of data objects and databases throughout the life cycle management of weapon system, including design, engineering, analysis, manufacturing, operation, and logistics. etc. The goal of this study is threefold. First, we propose a right direction for the establishment of Integrated Data Environment. For the integrated database technology, we use the five schema architecture and the distributed object oriented technology that will lead to the "share of data." Second, we present the most effective IWSDB architecture for defense CALS, which will provide the efficient data sharing by business process modeling. Third, we suggest that IWSDB should be constructed based on the process which is related to the acquisition and logistics of weapon system for the national defense, and at the same time it should be implemented with GITIS for government agencies and CITIS for the industries in order to obtain the efficient data sharing.

  • PDF

Provision of VHE Services to Roaming Users

  • Roussaki, Ioanna;Chantzara, Maria;Xynogalas, Stavros;Anagnostou, Miltiades
    • Journal of Communications and Networks
    • /
    • v.4 no.4
    • /
    • pp.363-369
    • /
    • 2002
  • Towards the deployment of 3rd generation systems, Virtual Home Environment (VHE), stemming from 3GPP, appears to be a powerful concept advocating the provision and delivery of personalized services to roaming users across network and terminal boundaries. This paper aims to expose the pathway for materializing the VHE concept, via the specification, implementation and evaluation of a prototype. Core aspects for realizing the concept such as the business and roaming models are presented, while a VHE enabling architecture utilizing key technologies (OSA/Parlay, MExE, and USAT) is introduced. The proposed architecture has already been evaluated by performing an initial trial demonstration. Currently it is being extended to support VHE service provision to roaming users, an aspect to be addressed by the final trial.

Design and Implementation of Large Size Distributed Object Process Based Spring Framework 2.5 with Lightweight Container Architecture (경량 컨테이너 구조 환경에서 스프링 프레임워크 2.5를 기반으로 대용량 분산 객체 처리의 설계 및 구현)

  • Lee, Myeong-Ho
    • Proceedings of the KAIS Fall Conference
    • /
    • 2009.05a
    • /
    • pp.50-53
    • /
    • 2009
  • This paper proposes an object-oriented software development guidance and an evaluation index for the productivity related to spring framework 2.5. Non EJB and the EJB architecture to resolve the problem with benefits to support the new architecture is a lightweight container architecture. This architecture, such as the EJB, but not heavy, to provide all of the architecture is possible. The lightweight container architecture is most often used in business spring framework is well-known architecture. Therefore, this research has the Non EJB and the EJB to solve the advantages and disadvantages developed to support the latest spring framework 2.5 lightweight container architecture based on the design and implementation of a pilot system with the objective through the specification of the software previously to provide guidance to development productivity.

  • PDF

Design of Interoperable DTD Architecture supporting Interoperability of Digital Documents for B2B, B2G Environments (B2B, B2G 환경에서 전자문서의 상호운용을 지원하는 DTD 상호운용 구조의 설계)

  • Park, Sang-Yun
    • Management & Information Systems Review
    • /
    • v.21
    • /
    • pp.99-114
    • /
    • 2007
  • According as Internet based EC(Electronic Commerce) has been activated, More requirements for exchanging digital documents are being proposed in B2B(Business to Business) and B2G(Business to Government) environments. However, the documents can not be processed automatically, because the structures of documents in each site(companies, central/local governments) do not match. Therefore, W3C(World Wide Web Consortium) has proposed XML(eXtensible Markup Language) DTD(Document Type Declaration) technology to support structuring documents. The XML DTD technology can support interoperability between EC sites. And, XML DTD based documents can be processed automatically in every sites. They will improve efficiency of services in B2B and B2G environments. In this paper, we propose interoperable DTD architecture and IDEP(Interoperable DTD Exchange Protocol) protocol which supports searching DTDs and exchanging DTDs. This technology can popularize DTDs and digital documents.

  • PDF

An Effective Authentication in Mobile Ad Hoc Networks (Mobile Ad Hoc Networks에서 효과적인 인증서비스)

  • Kim Yoon-Ho
    • The Journal of Society for e-Business Studies
    • /
    • v.10 no.1
    • /
    • pp.121-134
    • /
    • 2005
  • The MANET has many problems in security despite of its many advantages such as supporting the mobility of nodes, independence of the fixed infrastructure, and quick network establishment. In particular, in establishing security, the traditional certification service has many difficult problems in applying to the MANET because of its safety, expandability, and availability. In this paper, a secure and effective distributed certification service method was proposed using the Secret Sharing scheme and the Threshold Digital Signature scheme in providing certification services in the MANET. In the proposed distributed certification service, certain nodes of relatively high safety among the mobile nodes consisting of the MANET, were set as privileged nodes, from which the process of issuing a certification started. The proposed scheme solved problem that the whole network security would be damaged by the intrusion to one node in the Centralized Architecture and the Hierarchical Architecture. And it decreased the risk of the exposure of the personal keys also in the Fully Distributed Architecture as the number of the nodes containing the partial confidential information of personal keys decreased. By the network simulation, the features and availability of the proposed scheme was evaluated and the relation between the system parameters was analyzed.

  • PDF