• Title/Summary/Keyword: intranet

Search Result 267, Processing Time 0.022 seconds

Web-based Distributed Parallel Computing Environment with Multi-Managing Method (멀티 매니징 기법을 이용한 웹기반 분산 병렬 컴퓨팅 환경)

  • Maeng, Hye-Seon;Han, Tak-Don;Kim, Sin-Deok
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.7
    • /
    • pp.1777-1788
    • /
    • 1999
  • The portability of Java language makes it possible to use heterogeneous computers without re-compiling of application programs. Java applet can also be transported to other computers via Web browser. In this research, a Cooperative Web Computing Environment(CWCE) that uses idle computers on the Intranet for cooperative parallel computing work is suggested. The CWCE allows to use more than a manager computer that sends applets and manages communication between other computers. The number of manager computers can be determined according to the characteristics of computing environment and any chosen application program. It can reduce the amount of communication overhead for the application programs especially with synchronized communication. For the CWCE, a decision function to determine the managing level is provided. The CWCE turns out to be useful computing environment for the applications with less computation request ratio and multi-managing can help to reduce the communication overhead especially for the applications with a high ratio of synchronization purpose communications.

  • PDF

Design and Implementation of SGML Document Management System (SGML 문서 관리 시스템의 설계 및 구현)

  • Kim Yong-Hun;Lee Won-Suk;Ryu Eun-Suk;Lee Kyu-Chul;Lee Sang-Ki;Kim Hyun-Ki;Lee Hae-Ran;Zhoo Zong-Chul
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.32 no.3
    • /
    • pp.157-177
    • /
    • 1998
  • The 21st century will be the advanced Information society era. The management of very large quantity of electronic documents is important because new applications such as Digital Libraries, CSCW (Computer-Supported Cooperative Work) in Intranet, CALS (Commerce At the Light Speed) are emerging, which require the functionalities of efficient storing, searching and managing a bulk of electronic documents. SGML(Standard Generalized Markup Language) is an ISO Standard for representing structure information of electronic documents. This paper proposes an effective data model for storing and managing SGML documents. We also describe the design and implementation details of SGML document management system, which has capabilities of storing SGML instances, generating schema dynamically, and retrieving structure elements efficiently.

  • PDF

Intranet을 위한 방화벽 시스템구현에 관한 연구

  • 최석윤;김중규
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.2 no.1
    • /
    • pp.103-123
    • /
    • 1997
  • This dissertation provides a theoretic study on the network security in general , the firewall in particular. In fact the firewall has been recognized as a very promising option to obtain the security inthe real work network environment . The dissertation provides a throuth theoretic investigation on the various problems raised in the computer network, and also explores a methodology of the security against IP spoofing. Moreover, it investigates a systematic procddure to make analysis and plans of the firewall configuration . Based on the above investigation and analysis, this dissertation provides two approaches to network security , which address anumber of issuesboth at the network and at applicatino level. At the network level, a new method is proposed which uses packet filtering based on the analysis of the counter plot about the screen router.On the other hand, at the application level, a novel method is explored which employs secureity software. Firewall-1 , on Bastion host. To demonstrate the feasibililty and the effectiveness of the proposed methodologties , a prototype implementation is made The experiment result shows that the screen router employing the proposed anti-IP spoofing method at the network level is effective enough for the system to remain secure without being invaded by any illegal packets entering form external hackers. Meanwhile , at the application level, the proposed software approach employing Firewall-1 is proved to be robust enugh to prevent hackings from the outer point the point protocal connnection . Theoretically, it is not possible to provide complete security to the network system, because the network security involve a number of issues raised form low level network equipments form high level network protocol. The result inthis dissertation provides a very promising solution to network security due to its high efficiency of the implementation and superb protectiveness from a variety of hacking.

A Study on Food Truck business model utilizing NFC (NFC를 활용한 Food Truck 비즈니스 모델에 관한 연구)

  • Yoon, Youngdoo;Choi, Eunyoung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.135-137
    • /
    • 2014
  • The expansion of the transportation card, and the popularity of smart phones has been increasing social concern about the NFC technology. Has been focused on the use of e-commerce, most of the NFC, fulfilling the security problems or technical topic for this, but the reality is that the current debate on the new value added contents industry and a nonexistent connection. Leverage NFC for efficient order management system in order to build lunch or dinner by being pushed to ease restrictions on remodeling and renovation projects Food Truck vehicle through a small business support programs in the current government, but increasing interest in the Food Truck I study a model of ordering system for food truch 재소 s-guide system. A lot of the effectiveness of management as appropriate to the use of NFC for small business that operates as a server system is highly Food Truck tendencies tied to one router and server on the intranet without the need of internet connection system. I believe in this study S-Guide system contributes for business success for food truck of small business.

  • PDF

A Study on the Security Enhancement for Personal Healthcare Information of CloudHIS (CloudHIS의 개인 의료정보를 위한 보안강화에 관한 연구)

  • Cho, Young-Sung;Chung, Ji-Moon;Na, Won-Shik
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.9
    • /
    • pp.27-32
    • /
    • 2019
  • Along with the growth of u-Healthcare, we propose a security enhancement based on network separation for CloudHIS with for handling healthcare information to cope with cyber attack. To protect against all security threats and to establish clear data security policies, we apply desktop computing servers to cloud computing services for CloudHIS. Use two PCs with a hypervisor architecture to apply physical network isolation and select the network using KVM switched controller. The other is a logical network separation using one PC with two OSs, but the network is divided through virtualization. Physical network separation is the physical connection of a PC to each network to block the access path from both the Internet and the business network. The proposed system is an independent desktop used to access an intranet or the Internet through server virtualization technology on a user's physical desktop computer. We can implement an adaptive solution to prevent hacking by configuring the CloudHIS, a cloud system that handles medical hospital information, through network separation for handling security enhancement.

A Study on Implementation of NAS-based K-12 Learning Management System for Supporting Developing Countries (개발도상국 지원을 위한 NAS기반의 K-12 학습관리 시스템 구현 방안에 대한 연구)

  • No, In-Ho;Yoo, Gab-Sang;Kim, Hyeock-Jin
    • Journal of Digital Convergence
    • /
    • v.17 no.1
    • /
    • pp.179-187
    • /
    • 2019
  • Developing countries, including Africa, are experiencing very little human resources development due to the deprivation of equal educational opportunities, poor educational conditions, and the gap in information technology with developed countries. Developing countries that do not have excellent human resources are lagging behind in globalization competition with developed countries, and the problem of 'human resource development' in developing countries can not be avoided. In developing countries, education budgets are too low to meet education needs and compulsory education, and therefore they are not adequately responding to the increasing demand for education. The lack of education budget is due to the lack of education infrastructure. In this study, the NAS based server is configured to configure functions such as educational content and learning management, and the client area is presented with solutions for various media such as tablet, PC, and beam projector. And to support optimized e-learning services in developing countries by constructing a SCORM-based platform.

An Enhanced method for detecting obfuscated Javascript Malware using automated Deobfuscation (난독화된 자바스크립트의 자동 복호화를 통한 악성코드의 효율적인 탐지 방안 연구)

  • Ji, Sun-Ho;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.869-882
    • /
    • 2012
  • With the growth of Web services and the development of web exploit toolkits, web-based malware has increased dramatically. Using Javascript Obfuscation, recent web-based malware hide a malicious URL and the exploit code. Thus, pattern matching for network intrusion detection systems has difficulty of detecting malware. Though various methods have proposed to detect Javascript malware on a users' web browser, the overall detection is needed to counter advanced attacks such as APTs(Advanced Persistent Treats), aimed at penetration into a certain an organization's intranet. To overcome the limitation of previous pattern matching for network intrusion detection systems, a novel deobfuscating method to handle obfuscated Javascript is needed. In this paper, we propose a framework for effective hidden malware detection through an automated deobfuscation regardless of advanced obfuscation techniques with overriding JavaScript functions and a separate JavaScript interpreter through to improve jsunpack-n.

The Technological Method for Safe Processing of Sensitive Information in Network Separation Environments (망분리 환경에서 민감정보를 안전하게 처리하기 위한 기술적 방안)

  • Juseung Lee;Ilhan Kim;Hyunsoo Kim
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.125-137
    • /
    • 2023
  • Companies that handle sensitive information, led by public institutions, establish separate networks for work and the Internet and protect important data through strong access control measures to prevent cyber attacks. Therefore, systems that involve the junction where the Intranet(internal LAN for work purposes only) and the Internet network are connected require the establishment of a safe security environment through both administrative and technical measures. Mobile Device Management(MDM) solutions to control mobile devices used by institutions are one such example. As this system operates by handling sensitive information such as mobile device information and user information on the Internet network, stringent security measures are required during operation. In this study, a model was proposed to manage sensitive information data processing in systems that must operate on the Internet network by managing it on the internal work network, and the function design and implementation were centered on an MDM solution based on a network interconnection solution.

Differences in the social presence of instructor by instructor's social intervention and its effects on learning satisfaction in an online university (온라인대학에서 교수자의 사회적 촉진활동에 따른 교수자 사회적 실재감의 차이 및 이들의 관계가 학습만족도에 미치는 영향)

  • Lee, Euikil;Kim, Yun-Jung
    • The Journal of Korean Association of Computer Education
    • /
    • v.18 no.3
    • /
    • pp.69-78
    • /
    • 2015
  • This study aims to analyze differences in the social presence of instructor by instructor's social intervention, the effects of the social presence of instructor on learning satisfaction, and learner characteristics related to the social presence of instructor. Data including subjects' demographic information, interactions, social presence of instructor, social presence of the course, and learning satisfaction were collected from 119 adult learners in an online university in Korea. The main findings of this study are as follows. First, the social presence of instructor was higher in the higher-aged group or active group on intranet message board than the lower-aged group or inactive group on the board. Second, instructor's social intervention increased the level of perceived social presence of instructor. However, the active group on the board has shown the highest level of perceived social presence of instructor, without instructor's social intervention. Third, there was a high correlation between instructor's social intervention and the social presence of instructor, while the variables affecting learning satisfaction were the social presence of instructor and social presence of the course. From the results of this study, it is suggested that instructors' social interventions be provided systematically for those who are not active in social interaction to enhance their learning satisfaction.

Performance Enhancement Method Through Science DMZ Data Transfer Node Tuning Parameters (Science DMZ 데이터 전송 노드 튜닝 요소를 통한 성능 향상 방안)

  • Park, Jong Seon;Park, Jin Hyung;Kim, Seung Hae;Noh, Min Ki
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.2
    • /
    • pp.33-40
    • /
    • 2018
  • In an environment with a large network bandwidth, maximizing bandwidth utilization is an important issue to increase transmission efficiency. End-to-end transfer efficiency is significantly influenced by factors such as network, data transfer nodes, and intranet network security policies. Science DMZ is an innovative network architecture that maximizes transfer performance through optimal solution of these complex components. Among these, the data transfer node is a key factor that greatly affects the transfer performance depending on storage, network interface, operating system, and transfer application tool. However, tuning parameters constituting a data transfer node must be performed to provide high transfer efficiency. In this paper, we propose a method to enhance performance through tuning parameters of 100Gbps data transfer node. With experiment result, we confirmed that the transmission efficiency can be improved greatly in 100Gbps network environment through the tuning of Jumbo frame and CPU governor. The network performance test through Iperf showed improvement of 300% compared to the default state and NVMe SSD showed 140% performance improvement compared to hard disk.