• Title/Summary/Keyword: web access

Search Result 1,299, Processing Time 0.026 seconds

Designing a Distributed Access Control Processor Model for Collaborative Product Commerce Services (협업적 제품거래 서비스를 위한 분산 접근제어 프로세서모델)

  • 김형선;박진섭
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.119-124
    • /
    • 2004
  • The service oriented architecture (SOA) is gaining more momentum with the advent of Web services on internet. A programmable and machine accessible Web is the vision of many, and might represent a step towards the semantic Web. However, security is a crucial requirement for the serious usage and adoption of the Web services technology. This paper proposes design goals for an distributed access control model for CPC(Collaborative Product Commerce). It then design a processor model for CPC components, along with web services standard and concept that can be used as a basis to design an access control processor independent of a particular CPC service implementation.

  • PDF

Analysis of Education about Web For the Blind Student (시각장애 학생의 Web 교육 현황 분석)

  • Park, Seong-Je;Jeong, Jae-Won;Gang, Yeong-Mu
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.302-309
    • /
    • 2007
  • Web is becoming a necessary element of information acquisition methods for us who live in an information and knowledge-oriented society, as it is today. It is deriving a revolutionary change on various parts of our society, such as education, culture, etc. Also due to epoch-making development and diversification of web-related technologies and content types, the knowledge, technique and complexity of web users also accompanied it. In this research web-related education of schools for the visually handicapped and current situation of web access of such students are seized, their problems related to web access are analyzed, and efficient alternatives for web implementation to solve those problems were suggested. On the other hand, since this research is a survey targeting information and computer related teachers of 12 schools for the visually handicapped within Korea, it has the restriction that it does not include the analysis of current state of charity facilities which are not regular education institutions. Moreover, the content of the survey is composed by considering totally blind students, thus more detailed survey should also be conducted for weak-sighted students as well.

  • PDF

A Framework for Web Log Analysis Using Process Mining Techniques (프로세스 마이닝을 이용한 웹 로그 분석 프레임워크)

  • Ahn, Yunha;Oh, Kyuhyup;Kim, Sang-Kuk;Jung, Jae-Yoon
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.1
    • /
    • pp.25-32
    • /
    • 2014
  • Web mining techniques are often used to discover useful patterns from data log generated by Web servers for the purpose of web usage analysis. Yet traditional Web mining techniques do not reflect sufficiently sequential properties of Web log data. To address such weakness, we introduce a framework for analyzing Web access log data by using process mining techniques. To illustrate the proposed framework, we show the analysis of Web access log in a campus information system based on the framework and discuss the implication of the analysis result.

Tools for Web-Based Security Management Level Analysis (웹기반 보안 관리 수준 분석 도구)

  • Kim, Jeom-Goo;Choi, Kyong-Ho;Noh, Si-Choon;Lee, Do-Hyeon
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.85-92
    • /
    • 2012
  • Today, the typical web hacking attacks are cross-site scripting(XSS) attacks, injection vulnerabilities, malicious file execution and insecure direct object reference included. Web hacking security systems, access control solutions, access only to the web service and flow inside but do not control the packet. So you have been illegally modified to pass the packet even if the packet is considered as a unnormal packet. The defense system is to fail to appropriate controls. Therefore, in order to ensure a successful web services diagnostic system development is necessary. Web application diagnostic system is real and urgent need and alternative. The diagnostic system development process mu st be carried out step of established diagnostic systems, diagnostic scoping web system vulnerabilities, web application, analysis, security vulnerability assessment and selecting items. And diagnostic system as required by the web system environment using tools, programming languages, interfaces, parameters must be set.

Personalizing Web Service Pages for Mobile Users (모바일 사용자를 위한 웹 서비스 페이지 개인화 기법)

  • Jeon Yeonghyo;Hwang Eejun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.1
    • /
    • pp.69-80
    • /
    • 2005
  • Recent popularity of web-ready mobile devices such as PDA and cellphone has made mobile Internet access very popular. However, most of existing Web contents and services are optimized for desktop computing environment and not well suited for mobile devices. Considering different system features of mobile devices such as small display and limited input capability, an alternative scheme to access the Web efficiently is required. On the other hand, personalization plays an important role in the tailored access to the Web contents and services. In this paper, we propose a proxy- based personalization scheme of Web service pages for mobile users. For that purpose, in addition to log data. service related features of Web pages are considered for the correct identification of popular services. It automatically provides mobile users with the tailored list of Web services well suited for diverse mobile devices. Consequently, mobile users can utilize customized Web services with minimum navigation on the mobile devices with limited capability. In order to show its effectiveness, we have performed several experiments on the prototype system and reported some of the results.

Measuring and Improving Method the Performance of E-Commerce Websites (전자상거래 웹사이트의 성능 측정 및 향상 방법)

  • Park, Yang-Jae
    • Journal of Digital Convergence
    • /
    • v.15 no.9
    • /
    • pp.223-230
    • /
    • 2017
  • In the current wireless Internet environment, using a mobile device to quickly access a web site is closely related to measuring the performance of a website. When accessing a website, the user has a long time to access the website and has no access to the website.In this case, the performance of the web site should be improved by measuring and analyzing the performance of the connection delay due to a problem of the web site.Among the performance measurement factors of Web sites, Web page loading time is a very important factor for a successful service business in the situation where most of e-commerce business is being developed as a web-based service.An open source tool was analyzed to analyze the performance of the e-commerce web page to present problems, software optimization methods and hardware optimization methods. Applying two optimization methods to suit the environment will enable stable and e-commerce websites.

Web Structure Mining by Extracting Hyperlinks from Web Documents and Access Logs (웹 문서와 접근로그의 하이퍼링크 추출을 통한 웹 구조 마이닝)

  • Lee, Seong-Dae;Park, Hyu-Chan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.11
    • /
    • pp.2059-2071
    • /
    • 2007
  • If the correct structure of Web site is known, the information provider can discover users# behavior patterns and characteristics for better services, and users can find useful information easily and exactly. There may be some difficulties, however, to extract the exact structure of Web site because documents one the Web tend to be changed frequently. This paper proposes new method for extracting such Web structure automatically. The method consists of two phases. The first phase extracts the hyperlinks among Web documents, and then constructs a directed graph to represent the structure of Web site. It has limitations, however, to discover the hyperlinks in Flash and Java Applet. The second phase is to find such hidden hyperlinks by using Web access log. It fist extracts the click streams from the access log, and then extract the hidden hyperlinks by comparing with the directed graph. Several experiments have been conducted to evaluate the proposed method.

Back-end Prefetching Scheme for Improving the Performance of Cluster-based Web Servers (클러스터 웹 서버에서 성능 향상을 위한 노드간 선인출 기법)

  • Park, Seon-Yeong;Park, Do-Hyeon;Lee, Joon-Won;Cho, Jung-Wan
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.5
    • /
    • pp.265-273
    • /
    • 2002
  • With the explosive growth of WWW traffic, there is an increasing demand for the high performance Web servers to provide a stable Web service to users. The cluster-based Web server is a solution to core with the heavy access from users, easily scaling the server according to the loads. In the cluster-based Web sewer, a back-end node may not be able to serve some HTTP requests directly because it does not have the requested contents in its main memory. In this case, the back-end node has to retrieve the requested contents from its local disk or other back-end nodes in the cluster. To reduce service latency, we introduce a new prefetch scheme. The back-end nodes predict the next HTTP requests and prefetch the contents of predicted requests before the next requests arrive. We develop three prefetch algorithms bated on some useful information gathered from many clients'HTTP requests. Through trace-driven simulation, the service latency of the prefetch scheme is reduced by 10 ~ 25% as compared with no prefetch scheme. Among the proposed prefetch algorithms, Time and Access Probability-based Prefetch (TAP2) algorithm, which uses the access probability and the inter-reference time of Web object, shows the best performance.

Design of a Role-Based Access Control Model for Web-based Applications (웹 기반 응용을 위한 직무 기반 접근 제어 모델의 설계)

  • Lee, Ho
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.59-66
    • /
    • 2002
  • The access controls are the methods which are generally used in such systems as computer operating systems, workflow systems, information security systems and etc.. In the paper, is proposed a role-based access control model which not only has fundamental security functions such as security, integrity and flow control, but also meets the access control requirements of role-based social organizations. The proposed role-based access control model is designed in order to perform its functions in simple and secure way, largely in the environment of web-based applications.

  • PDF