• Title/Summary/Keyword: third party application

Search Result 107, Processing Time 0.027 seconds

A Study on the Scope of Application of Preliminary Draft Convention on International Contract Concluded or Evidenced by Data Message (국제전자계약준비초안(國際電子契約準備草案)의 적용범위에 관한 비교 연구)

  • Oh, Won-Suk
    • International Commerce and Information Review
    • /
    • v.4 no.2
    • /
    • pp.1-12
    • /
    • 2002
  • The purpose of this paper is to examine the scope of the application of Preliminary Draft Convention, which will be fixed as international uniform rules soon, in relation to the CISG. First, this Draft Convention will cover service contracts as well as sales contract of goods, but the license agreement will be excepted because it does not transfer the complete property. Second, this will cover the commercial contracts(sales or services) concluded by data message fully or partially. Third, this will be applied in international contract regardless of contracting states or non-contracting states. As it is very difficult to confirm the places of business of contracting parties in on-line contracts, the first criterion to confirm them is the indication by the party in each contract. This presumption may be supplemented, if they are not indicated in the contract, by the location of the equipment and technology supporting an information system used by a legal entity for the conclusion of a contract. It is essential to establish an international uniform rules as soon as possible in order to activate the international businesses with on-line basis. Thus this author hopes that this paper will contribute to the clear understanding to the scope of application of Preliminary Draft Convention for which the UNCITRAL is under working.

  • PDF

Middleware for Ubiquitous Healthcare Information System

  • Sain, Mangal;Lee, Hoon-Jae;Chung, Wan-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.257-260
    • /
    • 2008
  • We build middleware architecture with J2EE and LiveGraph to process different ubiquitous healthcare application's data and process that data into useful information, which can play a most important role in decision making in ubiquitous Healthcare System. Application developers mostly rely on third party middleware, tools and libraries (i.e., webservers, distributed middleware such as CORBA, etc.) to respond the emerging trends of their target domain. With this middleware we tried to enhance the efficiency of application by decrease their memory uses, data processing and decision making on another web module which is independent of each application. For middleware system, we proposed an algorithm by which we can find some important conclusion about different health status likewise ECG, Accelerometer. etc., which can be used in various data processing and determine the current health status. In this paper we also analyze some different low level and high level middleware technology which were used to build different kind middleware likewise CAMUS, MiLAN and try to find the best solution in the form of middleware for Ubiquitous Healthcare Information System.

  • PDF

An UDDI registry architecture for Parlay X Gateway (웹 서비스 기반의 개방형서비스 게이트웨이를 위한 UDDI 구조)

  • Lee Dong-Heon;Kim Hwa-Sung
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06d
    • /
    • pp.226-228
    • /
    • 2006
  • 최근 정보통신 환경은 통신, 방송, 인터넷이 통합되는 디지털 융합 서비스 제공 형태로 급속히 변화하고 있다. 이에 따라 통신환경이 개방형 네트워크 형태의 광대역통합망으로 변화하였다. 이런 광대역 통합망에서는 Open API(Application Program Interface)에 의하여 third-party 애플리케이션의 제공을 가능하게 한다. Open API에는 대표적으로 Parlay API가 있으며 Parlay API와 웹 서비스를 접목시키고 한단계 더 추상화한 Parlay X API가 있다. 웹 서비스의 요소중의 하나인 UDDI는 웹 서비스를 쉽게 검색, 공유 및 재사용 할 수 있도록 하는 환경을 가져오게 된다. 본 논문에서는 웹서비스기반의 개방형서비스 게이트웨이를 위한 효율적인 UDDI 레지스트리 구축방안에 대해 제안하였다.

  • PDF

Fair Private Block Encryption Protocol for Delegated Node of Public Blockchain (동등한 권한을 가진 대표노드를 위한 비공개 블록 암호화 기법)

  • Jung, Seung Wook;Lee, HooKi
    • Convergence Security Journal
    • /
    • v.19 no.5
    • /
    • pp.11-18
    • /
    • 2019
  • In current public blockchain, any node can see every blocks, so that public blockchain provider transparent property. However, some application requires the confidential information to be stored in the block. Therefore, this paper proposes a multi-layer blockchain that have the public block layer and the private block for confidential information. This paper suggests the requirement for encryption of private block. Also, this paper shows the t-of-n threshold cryptosystem without dealer who is trusted third party. Finally proposed scheme satisfies the requirements for encryption and fairness.

Data hiding in partially encrypted HEVC video

  • Xu, Dawen
    • ETRI Journal
    • /
    • v.42 no.3
    • /
    • pp.446-458
    • /
    • 2020
  • In this study, an efficient scheme for hiding data directly in partially encrypted versions of high efficiency video coding (HEVC) videos is proposed. The content owner uses stream cipher to selectively encrypt some HEVC-CABAC bin strings in a format-compliant manner. Then, the data hider embeds the secret message into the encrypted HEVC videos using the specific coefficient modification technique. Consequently, it can be used in third-party computing environments (more generally, cloud computing). For security and privacy purposes, service providers cannot access the visual content of the host video. As the coefficient is only slightly modified, the quality of the decrypted video is satisfactory. The encrypted and marked bitstreams meet the requirements of format compatibility, and have the same bit rate. At the receiving end, data extraction can be performed in the encrypted domain or decrypted domain that can be adapted to different application scenarios. Several standard video sequences with different resolutions and contents have been used for experimental evaluation.

An Efficient Identity-Based Deniable Authenticated Encryption Scheme

  • Wu, Weifeng;Li, Fagen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.5
    • /
    • pp.1904-1919
    • /
    • 2015
  • Deniable authentication protocol allows a sender to deny his/her involvement after the protocol run and a receiver can identify the true source of a given message. Meanwhile, the receiver has no ability to convince any third party of the fact that the message was sent by the specific sender. However, most of the proposed protocols didn't achieve confidentiality of the transmitted message. But, in some special application scenarios such as e-mail system, electronic voting and Internet negotiations, not only the property of deniable authentication but also message confidentiality are needed. To settle this problem, in this paper, we present a non-interactive identity-based deniable authenticated encryption (IBDAE) scheme using pairings. We give the security model and formal proof of the presented IBDAE scheme in the random oracle model under bilinear Diffie-Hellman (BDH) assumption.

A Study on the development of an Object Oriented Robot Simulator (객체 지향 방식의 로봇 그래픽 시뮬레이터 개발에 관한 연구)

  • Ho, Won
    • Proceedings of the KIEE Conference
    • /
    • 1995.07b
    • /
    • pp.840-842
    • /
    • 1995
  • It is very important to understand the 3-dimensional movement of a robot manipulator in developing a robot manipulator system. The robot design software package is required to test the specification. Usually these robot simulators are turn-key based and not possible to be used on the other robot system. The aim of this paper is to develop a general purpose robot simulator. AutoCad is selected for the developing environment to avoid the difficulties of building a cad system from the scratch. Because Autocad provides a semi-open structure to a Lisp programmer, it is quite successful to achieve the goal of building the simulator. At the moment the kinematic analysis is possible on the package. Further study will be advanced to the application and analysis of dynamic area, which would not be that difficult to be implemented, considering the many third party tools available for Autocad.

  • PDF

Design and Implementation of 256-Point Radix-4 100 Gbit/s FFT Algorithm into FPGA for High-Speed Applications

  • Polat, Gokhan;Ozturk, Sitki;Yakut, Mehmet
    • ETRI Journal
    • /
    • v.37 no.4
    • /
    • pp.667-676
    • /
    • 2015
  • The third-party FFT IP cores available in today's markets do not provide the desired speed demands for optical communication. This study deals with the design and implementation of a 256-point Radix-4 100 Gbit/s FFT, where computational steps are reconsidered and optimized for high-speed applications, such as radar and fiber optics. Alternative methods for FFT implementation are investigated and Radix-4 is decided to be the optimal solution for our fully parallel FPGA application. The algorithms that we will implement during the development phase are to be tested on a Xilinx Virtex-6 FPGA platform. The proposed FFT core has a fully parallel architecture with a latency of nine clocks, and the target clock rate is 312.5 MHz.

Utilization of Cloud and Biometrics to improve Vulnerability of OAuth Framework (OAuth 프레임워크의 취약점 개선을 위한 클라우드 및 생체인증 기술 활용 방안)

  • Park, Jin-Seong;Lee, Chang-Hoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.292-295
    • /
    • 2018
  • Open API의 사용이 대중화되면서 대형 포털사이트 및 대형 소셜 네트워크 서비스에 입력한 개인정보를 바탕으로 사용자들이 원하는 서비스를 제공하는 외부 서비스(Third-party application)의 수가 계속 증가하고 있다. 이러한 외부 서비스들이 정보 제공자에게 개인정보를 요청할 때, 외부 서비스가 권한 부여를 받은 정당한 요청을 하는지 여부를 확인하기 위해 OAuth 인증 프레임워크를 사용한다. 그러나 외부 서비스가 유효한 요청을 하고 있음을 판단하기 위해 사용하는 엑세스 토큰을 탈취하면 이를 이용하여 로그인 과정을 우회할 수 있으며, 개인정보 또한 쉽게 취득 가능하다. 본 논문에서는 이러한 취약점을 해결하기 위해 OAuth 인증 프레임워크에 2차적인 인증과정을 추가하여 엑세스 토큰의 탈취를 방지하여 사용자의 계정정보와 개인정보를 보호하는 프레임워크를 제시한다.

A Data Provenance System for Myanmar Rice Cycle Based on Ethereum Blockchain

  • Latt, Cho Nwe Zin;Rahmadika, Sandi;Rhee, Kyung-Hyune
    • Journal of Multimedia Information System
    • /
    • v.8 no.1
    • /
    • pp.35-44
    • /
    • 2021
  • The Myanmar rice cycle's existing system is still relying on a third party to manage every rice data information from several organizations. It is inconvenient to supervise simultaneously due to the unreliability of information provided by organizations. Thus, the rice cycle's original data is challenging to be utterly trusted since irresponsible parties can manipulate the current state of information. Moreover, the applied system does not preserve a proper incentive for the involved parties. In this paper, we leverage the Ethereum blockchain to be adopted to tackle the aforementioned issues. The main objective is to build trust between parties in the Myanmar rice cycle system. Our proposed scheme allows customers to check and trace information about the rice cycle information without worrying about the integrity of the data. Furthermore, the authorized parties are also rewarded by the government through Ethereum smart contract features. Eventually, our scheme achieves traceability in the rice chain system and leads to the complete digitization and automation of the rice cycle information.