• Title/Summary/Keyword: exchange of information

Search Result 3,556, Processing Time 0.038 seconds

STEP-Based CAE/CAO Information Exchange (STEP을 이용한 CAE/CAO 정보교환)

  • Baek, Ju-Hwan;Min, Seung-Jae
    • Proceedings of the KSME Conference
    • /
    • 2003.04a
    • /
    • pp.1234-1239
    • /
    • 2003
  • In the product design process computer-aided engineering and optimization tools are widely utilized in order to reduce the total development time and cost. Since several simulation tools are involved in the process, information losses, omissions, or errors are common and the importance of seamless information exchange among the tools has been increased. In this study ISO STEP standards are adopted to represent the neutral format for CAE/CAO information exchange. The schema of AP209 is used to define the information of finite element analysis and the new schema is proposed to describe the information of structural optimization based on the STEP methodology. The schema is implemented by EXPRESS, information modeling language, and ST-Developer is employed to generate C++ classes and STEP Rose Library by using the schema denoted. To substantiate the proposed approach, the information access interfaces of the finite element modeling software (FEMAP), structural optimization software (GENESIS) and in-house topology optimization program are developed. Examples of the size optimization of a three-bar truss and topology optimization of a MBB beam are shown to validate the information exchange of finite element analysis and structural optimization using STEP standards.

  • PDF

Timestamp based Key Exchange Protocol for Satellite Access Network (위성환경에서의 Timestamp 기반 키 교환 프로토콜)

  • Song, In-A;Lee, Young-seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.2
    • /
    • pp.162-170
    • /
    • 2016
  • The key exchange protocols are very important to provide the secure communication in broadband satellite access network. However key exchange protocol of ETSI(European Telecommunications Standards Institute) is vulnerable to man-in-the-middle-attack by using Diffie-Hellman algorithm. And the key exchange protocol using certification is not useful in satellite environment. We propose the key exchange protocol using Timestamp which have the resistant to man-in-the-middle-attack. Proposed protocol is able to prevent the man-in-the-middle-attack by calculated time value. Also showing experiment results, we prove that proposed protocol improve memory usage, communication amount and calculation amount than other protocols.

A Hybrid Parametric Translator Using the Feature Tree and the Macro File (피처 트리와 매크로 파일을 이용하는 하이브리드 파라메트릭 번역기)

  • 문두환;김병철;한순흥
    • Korean Journal of Computational Design and Engineering
    • /
    • v.7 no.4
    • /
    • pp.240-247
    • /
    • 2002
  • Most commercial CAD systems provide parametric modeling functions, and by using these capabilities designers can edit a CAD model in order to create design variants. It is necessary to transfer parametric information during a CAD model exchange to modify the model inside the receiving system. However, it is not possible to exchange parametric information of CAD models based on the cur-rent version of STEP. The designer intents which are contained in the parametric information can be lost during the STEP transfer of CAD models. This paper introduces a hybrid CAB model translator, which also uses the feature tree of commercial CAD systems in addition to the macro file to allow transfer of parametric information. The macro-parametric approach is to exchange CAD models by using the macro file, which contains the history of user commands. To exchange CAD models using the macro-parametric approach, the modeling commands of several commercial CAD systems are analyzed. Those commands are classified and a set of standard modeling commands has been defined. As a neutral fie format, a set of standard modeling commands has been defined. Mapping relations between the standard modeling commands set and the native modeling commands set of commercial CAD systems are defined. The scope of the current version is limited to parts modeling and assemblies are excluded.

A Study on Product Information Exchange between Heterogeneous Systems including Commercial PDM Systems (상용 PDM을 포함한 이기종 시스템 간의 제품정보 교환에 관한 연구)

  • Yang, Tae-Ho;Yoon, Tae-Hyuck;Choi, Sang-Su;Noh, Sang-Do
    • Korean Journal of Computational Design and Engineering
    • /
    • v.13 no.3
    • /
    • pp.175-186
    • /
    • 2008
  • For the success to PLM in manufacturing industries, the creation, management and coordination of all product-related information are essential, and the exchange of product information and data has become an important part of the product development. In this paper, we define the neutral schema, and it refers to PLM Services. Based on this neutral schema, we develop the PLM Integrator to exchange product information and data between diverse heterogeneous systems including PDM systems. We apply the PLM Integrator developed in this paper to commercial PDM systems such as SmarTeam, Teamcenter Engineering and MEMPHIS which is a data exchange middleware system for VR applications. By implementations, exchanges of product information and data can be done without loss of information. Also, the PLM Integrator can upload and download product information, data and related files. The result of this paper can not only reduce unnecessary efforts for data exchanging between different information systems including PDM/PLM systems but also provide a collaborative environment for PLM.

A Trusted Sharing Model for Patient Records based on Permissioned Blockchain

  • Kim, Kyoung-jin;Hong, Seng-phil
    • Journal of Internet Computing and Services
    • /
    • v.18 no.6
    • /
    • pp.75-84
    • /
    • 2017
  • As there has been growing interests in PHR-based personalized health management project, various institutions recently explore safe methods of recording personal medical and health information. In particular, innovative medical solution can be realized when medical researchers and medical service institutes can generally get access to patient data. As EMR data is extremely sensitive, there has been no progress in clinical information exchange. Moreover, patients cannot get access to their own health data and exchange it with researchers or service institutions. It can be operated in terms of technology, yet policy environment are affected by state laws as well as Privacy and Security Policy. Blockchain technology-independent, in transaction, and under test-is introduced in the medical industry in order to settle these problems. In other words, medical organizations can grant preliminary approval on patient information exchange by using the safely encrypted and distributed Blockchain ledger and can be managed independently and completely by individuals. More apparently, medical researchers can gain access to information, thereby contributing to the scientific advance in rare diseases or minor groups in the world. In this paper, we focused on how to manage personal medical information and its protective use and proposes medical treatment exchange system for patients based on a permissioned Blockchain network for the safe PHR operation. Trusted Model for Sharing Medical Data (TMSMD), that is proposed model, is based on exchanging information as patients rely on hospitals as well as among hospitals. And introduce medical treatment exchange system for patients based on a permissioned Blockchain network. This system is a model that encrypts and records patients' medical information by using this permissioned Blockchain and further enhances the security due to its restricted counterfeit. This provides service to share medical information uploaded on the permissioned Blockchain to approved users through role-based access control. In addition, this paper presents methods with smart contracts if medical institutions request patient information complying with domestic laws by using the distributed Blockchain ledger and eventually granting preliminary approval for sharing information. This service will provide an independent information transaction and the Blockchain technology under test will be adopted in the medical industry.

Reinforcing Financial Data Exchange Security Policy with Information Security Issues of Data Broker (금융데이터거래 정보보호 강화방안: 데이터브로커 보안이슈를 중심으로)

  • Kim, Su-bong;Kwon, Hun-yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.1
    • /
    • pp.141-154
    • /
    • 2022
  • In the data economy era, various policies are being implemented to create an active data distribution environment. In South Korea, the formation of a big data distribution platform and data trading began with the launch of the Financial Data Exchange under public data governance. In the case of major advanced countries in the data field, they have built a data distribution environment based on the data broker industry for decades and have strengthened national data competitiveness through added values generated from the industry. However, behind the active data distribution through data brokers, there are numerous information security issues, which have resulted in various privacy issues and national security threats. These problems can occur sufficiently in the process of domestic financial data exchange. In our study, we analyzed various information security issues of data trading caused by data brokers and derived information security requirements to be considered when trading data. We verified whether information security requirements are well reflected in the information security policy for each transaction stage of the domestic financial data exchange. Based on the verification, measurements to strengthen information security for financial data exchange are presented in our paper.

An Analytic Study on the Present Condition of Internet Knowledge Exchange Market (인터넷 지식거래소의 현황분석에 관한 조사연구)

  • Noh Young-Hee
    • Journal of Korean Library and Information Science Society
    • /
    • v.37 no.3
    • /
    • pp.33-57
    • /
    • 2006
  • Upon the growing popularity of knowledge information and paid digital content, the Internet knowledge exchange market had emerged. A Internet knowledge exchange market consists of general characteristics of a market where a wide variety of knowledge is exchanged at market-appropriate prices, the Internet knowledge exchange market is recently gaining momentum with specialized knowledge items such as design, program source, patent information, consulting service, multimedia, or resumes, as it seeks to secure competitive advantage over its peer markets. Considering the immense influence that these Internet markets will exert on the existing system of knowledge circulation including libraries and information centers, this study aims to contribute to a better understanding of Korea's knowledge circulation structure by analyzing the current standing of the Internet knowledge exchange market.

  • PDF

Practical Password-Authenticated Three-Party Key Exchange

  • Kwon, Jeong-Ok;Jeong, Ik-Rae;Lee, Dong-Hoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.6
    • /
    • pp.312-332
    • /
    • 2008
  • Password-based authentication key exchange (PAKE) protocols in the literature typically assume a password that is shared between a client and a server. PAKE has been applied in various environments, especially in the “client-server” applications of remotely accessed systems, such as e-banking. With the rapid developments in modern communication environments, such as ad-hoc networks and ubiquitous computing, it is customary to construct a secure peer-to-peer channel, which is quite a different paradigm from existing paradigms. In such a peer-to-peer channel, it would be much more common for users to not share a password with others. In this paper, we consider password-based authentication key exchange in the three-party setting, where two users do not share a password between themselves but only with one server. The users make a session-key by using their different passwords with the help of the server. We propose an efficient password-based authentication key exchange protocol with different passwords that achieves forward secrecy in the standard model. The protocol requires parties to only memorize human-memorable passwords; all other information that is necessary to run the protocol is made public. The protocol is also light-weighted, i.e., it requires only three rounds and four modular exponentiations per user. In fact, this amount of computation and the number of rounds are comparable to the most efficient password-based authentication key exchange protocol in the random-oracle model. The dispensation of random oracles in the protocol does not require the security of any expensive signature schemes or zero-knowlegde proofs.

Determinants of Financial Information Disclosure: An Empirical Study in Vietnam's Stock Market

  • PHAM, Thu Thi Bich
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.4
    • /
    • pp.73-81
    • /
    • 2022
  • The focus of the research is to determine the amount of financial information disclosure and the factors that influence it for non-financial enterprises listed on Vietnam's stock exchange. To evaluate the level of financial information disclosure, the study uses a set of disclosure indexes from the world's leading credit rating agency, Standard and Poor's (S&P). It makes some revisions in compliance with regulations for information disclosure on the Vietnam stock market. The study collects data in the form of annual reports for the year 2017-2020 from 350 non-financial firms listed on Vietnam's stock exchange and then uses a multivariate regression model to assess the effects of factors on the amount of financial information disclosure. The findings show that the size of the firm, the size of the board of directors, and foreign ownership all have a positive impact on financial transparency; however, the number of years the company has a negative impact. According to the findings of this study, companies with more total assets, a larger board of directors, and a higher rate of foreign ownership publish more financial information. Still, long-term listed companies on the stock exchange tend to disclose less.