• Title/Summary/Keyword: server-independent system

Search Result 131, Processing Time 0.024 seconds

RBAC-based Trust Negotiation Model for Grid Security (그리드 보안을 위한 역할 기반의 신뢰 협상 모델)

  • Cho, Hyun-Sug;Lee, Bong-Hwan
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.455-468
    • /
    • 2008
  • In this paper, we propose FAS model for establishing trust based on digital certificates in Grid security framework. The existing RBAC(Role Based Access Control) model is extended to provide permissions depending on the users‘ roles. The FAS model is designed for a system independent integrated Grid security by detailing and extending the fundamental architecture of user, role, and permission. FAS decides each user’s role, allocates access right, and publishes attribute certificate. FAS is composed of three modules: RDM, PCM, and CCM. The RDM decides roles of the user during trust negotiation process and improves the existing low level Grid security in which every single user maps a single shared local name. Both PCM and CCM confirm the capability of the user based on various policies that can restrict priority of the different user groups and roles. We have analyzed the FAS strategy with the complexity of the policy graph-based strategy. In particular, we focused on the algorithm for constructing the policy graph. As a result, the total running time was significantly reduced.

Analysis for Efficiency of Long Range Wireless IoT Network (장거리무선통신 IoT 네트워크 효율성 분석)

  • Kim, Ki-Young
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.6
    • /
    • pp.617-623
    • /
    • 2016
  • Recently, IoT technology has been applied to the control of appliances in the home, and information about temperature, humidity, etc. is collected and the application of the system to control the indoor environment automatically is increasing. Currently, the network configuration of IoT devices is mainly used to connect IoT devices to the Internet through wireless gateways. Since such a method is dependent on a gateway, there are limitations in providing various services. Therefore, this paper proposes an independent method of gateway by using IoT network without using gateway by applying long distance wireless communication technology. IoT devices using the proposed long distance wireless internet technology can connect to a remote server and provide mobility that can not be supported by existing methods, thereby providing more various services. The performance evaluation of the proposed network configuration method is compared with the delay time and the amount of data generated in the existing network method constituted by the gateway and the proposed network configuration method respectively. Experimental results show that the proposed method decreases the delay time and the amount of data generated by the gateway.

Smart Contract's Hierarchical Rules Modularization and Security Mechanism (스마트 컨트랙트의 계층형 규칙 모듈화와 보안 메커니즘)

  • An, Jung Hyun;Na, Sung Hyun;Park, Young B.
    • Journal of the Semiconductor & Display Technology
    • /
    • v.18 no.1
    • /
    • pp.74-78
    • /
    • 2019
  • As software becomes larger and network technology develops, the management of distributed data becomes more popular. Therefore, it is becoming increasingly important to use blockchain technology that can guarantee the integrity of data in various fields by utilizing existing infrastructure. Blockchain is a distributed computing technology that ensures that servers participating in a network maintain and manage data according to specific agreement algorithms and rules to ensure integrity. As smart contracts are applied, not only passwords but also various services to be applied to the code. In order to reinforce existing research on smart contract applied to the blockchain, we proposed a dynamic conditional rule of smart contract that can formalize rules of smart contract by introducing ontology and SWRL and manage rules dynamically in various situations. In the previous research, there is a module that receives the upper rule in the blockchain network, and the rule layer is formed according to this module. However, for every transaction request, it is a lot of resources to check the top rule in a blockchain network, or to provide it to every blockchain network by a reputable organization every time the rule is updated. To solve this problem, we propose to separate the module responsible for the upper rule into an independent server. Since the module responsible for the above rules is separated into servers, the rules underlying the service may be transformed or attacked in the middleware. Therefore, the security mechanism using TLS and PKI is added as an agent in consideration of the security factor. In this way, the benefits of computing resource management and security can be achieved at the same time.

Prototype Design and Security Association Mechanism for Policy-based on Security Management Model (정책기반 보안관리 모델을 위한 프로토타입과 정책 협상 메커니즘)

  • 황윤철;현정식;이상호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.131-138
    • /
    • 2003
  • With the Internet winning a huge popularity, there rise urgent problems which are related to Network Security Managements such as Protecting Network and Communication from un-authorized user. Accordingly, Using Security equipments have been common lately such as Intrusion Detection Systems, Firewalls and VPNs. Those systems. however, operate in individual system which are independent to me another. Their usage are so limited according to their vendors that they can not provide a corporate Security Solution. In this paper, we present a Hierarchical Security Management Model which can be applicable to a Network Security Policies consistently. We also propose a Policy Negotiation Mechanism and a Prototype which help us to manage Security Policies and Negotiations easier. The results of this research also can be one of the useful guides to developing a Security Policy Server or Security Techniques which can be useful in different environments. This study also shows that it is also possible to improve a Security Characteristics as a whole network and also to support Policy Associations among hosts using our mechanisms.

Stationary Waiting Times in Simple Fork-and-Join Queues with Finite Buffers and Communication Blocking (통신차단규칙을 따르는 유한버퍼 단순 조립형 대기행렬 망에서의 안정대기시간)

  • Seo, Dong-Won;Lee, Seung-Man
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.3
    • /
    • pp.109-117
    • /
    • 2010
  • In this study, we consider stationary waiting times in a simple fork-and-join type queue which consists of three single-server machines, Machine 1, Machine 2, and Assembly Machine. We assume that the queue has a renewal arrival process and that independent service times at each node are either deterministic or non-overlapping. We also assume that the Machines 1 and 2 have an infinite buffer capacity whereas the Assembly Machine has two finite buffers, one for each machine. Services at each machine are given by FIFO service discipline and a communication blocking policy. We derive the explicit expressions for stationary waiting times at all nodes as a function of finite buffer capacities by using (max,+)-algebra. Various characteristics of stationary waiting times such as mean, higher moments, and tail probability can be computed from these expressions.

Software Architecture for Implementing the Grid Computing of the High Availability Solution through Load Balancing (고가용성 솔루션 구축을 위한 그리드 측면에서의 소프트웨어 아키텍처를 통한 로드밸랜싱 구현)

  • Lee, Byoung-Yup;Park, Jun-Ho;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.3
    • /
    • pp.26-35
    • /
    • 2011
  • In these days, internet environment are very quickly development as well on-line service have been using a online for the mission critical business around the world. As the amount of information to be processed by computers has recently been increased there has been cluster computing systems developed by connecting workstations server using high speed networks for high availability. but cluster computing technology are limited for a lot of IT resources. So, grid computing is an expanded technology of distributed computing technology to use low-cost and high-performance computing power in various fields. Although the purpose of Grid computing focuses on large-scale resource sharing, innovative applications, and in some case, high-performance orientation, it has been used as conventional distributed computing environment like clustered computer until now because grid middleware does not have common sharable information system. In order to use grid computing environment efficiently which consists of various grid middleware, it is necessary to have application-independent information system which can share information description and services, and expand them easily. This paper proposed new database architecture and load balancing for high availability through Grid technology.

Speed-up Techniques for High-Resolution Grid Data Processing in the Early Warning System for Agrometeorological Disaster (농업기상재해 조기경보시스템에서의 고해상도 격자형 자료의 처리 속도 향상 기법)

  • Park, J.H.;Shin, Y.S.;Kim, S.K.;Kang, W.S.;Han, Y.K.;Kim, J.H.;Kim, D.J.;Kim, S.O.;Shim, K.M.;Park, E.W.
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.19 no.3
    • /
    • pp.153-163
    • /
    • 2017
  • The objective of this study is to enhance the model's speed of estimating weather variables (e.g., minimum/maximum temperature, sunshine hour, PRISM (Parameter-elevation Regression on Independent Slopes Model) based precipitation), which are applied to the Agrometeorological Early Warning System (http://www.agmet.kr). The current process of weather estimation is operated on high-performance multi-core CPUs that have 8 physical cores and 16 logical threads. Nonetheless, the server is not even dedicated to the handling of a single county, indicating that very high overhead is involved in calculating the 10 counties of the Seomjin River Basin. In order to reduce such overhead, several cache and parallelization techniques were used to measure the performance and to check the applicability. Results are as follows: (1) for simple calculations such as Growing Degree Days accumulation, the time required for Input and Output (I/O) is significantly greater than that for calculation, suggesting the need of a technique which reduces disk I/O bottlenecks; (2) when there are many I/O, it is advantageous to distribute them on several servers. However, each server must have a cache for input data so that it does not compete for the same resource; and (3) GPU-based parallel processing method is most suitable for models such as PRISM with large computation loads.

Efficient Publishing Spatial Information as GML for Interoperability of Heterogeneous Spatial Database Systems (이질적인 공간정보시스템의 상호 운용성을 위한 효과적인 지리데이터의 GML 사상)

  • 정원일;배해영
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.1
    • /
    • pp.12-26
    • /
    • 2004
  • In the past, geographic data is constructed and serviced through independent formats of its own according to each GIS(Geographic Information System). Recently the provision of interoperability in GIS is important to efficiently apply the various geographic data between conventional GIS's. Whereupon OGC(Open GIS Consortium) proposed GML(Geography Markup Language) to offer the interoperability between heterogeneous GISs in distributed environments. The GML is an XML encoding for the transport and storage of geographic information, including both the spatial and non-spatial properties of geographic features. Also, the GML includes Web Map Server Implementation Specification to service the GML documents. Accordingly the prototype to provide the reciprocal interchange of geographic information between conventional GIS's and GML documents is widely studied. In this paper, we propose a mapping method of geographic in formation between spatial database and GML for the prototype to support the interoperability between heterogeneous geographic information. For this method, firstly the scheme of converting geographic in Formation of the conventional spatial database into the GML document according to the GML specification is explained, and secondly the scheme to transform geographic information of GML documents to geographic data of spatial database is showed. Consequently, the proposed method is applicable to the framework for integrated geographic information services based on Web by making an offer the interoperability between already built geographic information of conventional GIS's using a mapping method of geographic information between spatial database and GML.

  • PDF

A Study of variables Related to Nursing Productivity (간호생산성에 관한 연구: 관련변수의 검증을 중심으로)

  • 박광옥
    • Journal of Korean Academy of Nursing
    • /
    • v.24 no.4
    • /
    • pp.584-596
    • /
    • 1994
  • The objective of the study is to explore the relationships between the variables of nursing productivity on the framework of system del in the tertiary university based care hospital in Korea. Productivity is basically defined as the relation-ship between inputs and outputs. Under the proposition that the nursing unit is a system that produces nursing care output using personal and material resources through the nursing intervention and nursing care management. And this major conception of nursing productivity system comproises input, process and output and feed-back. These categorized variables are essential parts to produce desirable and meaningful out-put. While nursing personnel from head nurse to staff nurses cooperate with each other, the head nurse directs her subordinates to achieve the goal of nursing care unit. In this procedure, the head nurse uses the leadership of authority and benevolence. Meantime nursing productivity will be greatly influenced by environment and surrounding organizational structures, and by also the operational objectives, the policy and standards of procedures. For the study of nursing productivity one sample hospital with 15 general nursing care units was selected. Research data were collected for 3 weeks from May 31 to June 20 in 1993. Input variables were measured in terms of both the served and the server. And patient classification scores were measured drily by degree of nursing care needs that indicated patent case-mix. And also nurses' educational period for profession and clinical experience and the score of nurses' personality were measured as producer input variables by the questionnaires. The process varialbes act necessarily on leading input resources and result in desirable nursing outputs. Thus the head nurse's leadership perceived by her followers is defined as process variable. The output variables were defined as length of stay, average nursing care hours per patient a day the score of quality of nursing care, the score of patient satisfaction, the score of nurse's job satis-faction. The nursing unit was the basis of analysis, and various statistical analyses were used : Reliability analysis(Cronbach's alpha) for 5 measurement tools and Pearson-correlation analysis, multiple regression analysis, and canonical correlation analysis for the test of the relationship among the variables. The results were as follows : 1. Significant positive relationship between the score of patient classification and length of stay was found(r=.6095, p.008). 2. Regression coefficient between the score of patient classification and length of stay was significant (β=.6245, p=.0128), and variance explained was 39%. 3. Significant positive relationship between nurses’ educational period and length of stay was found(r=-.4546, p=.044). 5. Regression coefficient between nurses' educational period and the score of quality of nursing care was significant (β=.5600, p=.029), and variance explained was 31.4%. 6. Significant positive relationship between the score of head nurse's leadership of authoritic characteristics and the length of stay was found (r=.5869, p=.011). 7. Significant negative relationship between the score of head nurse's leadership of benevolent characteristics and average nursing care hours was found(r=-.4578, p=.043). 8. Regression coefficient between the score of head nurse's leadership of benevolent characteristics and average nursing care hours was significant(β=-.6912, p=.0043), variance explained was 47.8%. 9. Significant positive relationship between the score of the head nurse's leadership of benevolent characteristics and the score of nurses' job satis-faction was found(r=.4499, p=050). 10. A significant canonical correlation was found between the group of the independent variables consisted of the score of the nurses' personality, the score of the head nurse's leadership of authoritic characteristics and the group of the dependent variables consisted of the length of stay, average nursing care hours(Rc²=.4771, p=.041). Through these results, the assumed relationships between input variables, process variable, output variables were partly supported. In addition it is also considered necessary that-further study on the relationships between nurses' personality and nurses' educational period, between nurses' clinical experience including skill level and output variables in many research samples should be made.

  • PDF

A Performance Comparison of the Mobile Agent Model with the Client-Server Model under Security Conditions (보안 서비스를 고려한 이동 에이전트 모델과 클라이언트-서버 모델의 성능 비교)

  • Han, Seung-Wan;Jeong, Ki-Moon;Park, Seung-Bae;Lim, Hyeong-Seok
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.3
    • /
    • pp.286-298
    • /
    • 2002
  • The Remote Procedure Call(RPC) has been traditionally used for Inter Process Communication(IPC) among precesses in distributed computing environment. As distributed applications have been complicated more and more, the Mobile Agent paradigm for IPC is emerged. Because there are some paradigms for IPC, researches to evaluate and compare the performance of each paradigm are issued recently. But the performance models used in the previous research did not reflect real distributed computing environment correctly, because they did not consider the evacuation elements for providing security services. Since real distributed environment is open, it is very vulnerable to a variety of attacks. In order to execute applications securely in distributed computing environment, security services which protect applications and information against the attacks must be considered. In this paper, we evaluate and compare the performance of the Remote Procedure Call with that of the Mobile Agent in IPC paradigms. We examine security services to execute applications securely, and propose new performance models considering those services. We design performance models, which describe information retrieval system through N database services, using Petri Net. We compare the performance of two paradigms by assigning numerical values to parameters and measuring the execution time of two paradigms. In this paper, the comparison of two performance models with security services for secure communication shows the results that the execution time of the Remote Procedure Call performance model is sharply increased because of many communications with the high cryptography mechanism between hosts, and that the execution time of the Mobile Agent model is gradually increased because the Mobile Agent paradigm can reduce the quantity of the communications between hosts.