• Title/Summary/Keyword: 상속

Search Result 360, Processing Time 0.025 seconds

Development of an OODBMS Functionality Testing Tool Prototype. (객체지향 DBMS 기능 시험 도구의 프로토타입 개발)

  • 김은영;이상호;전성택
    • The Journal of Information Technology and Database
    • /
    • v.2 no.2
    • /
    • pp.25-34
    • /
    • 1995
  • In this paper, we present design philosophy and implementation issues of a functionality testing tool for object-oriented database systems. A testing tool has been developed to validate UniSQL/X functionalities with C++ interface. A testing tool is designed under consideration of scaleability, simplicity and extendibility. The schema is deliberately constructed to verify the object-oriented functionalities such as abstraction, inheritance and aggregation. Each test item has been derived under various black box techniques such as equivalent partitioning and boundary-value analysis. The testing tool consists of six phases, namely, database creation, database population, construction of testindex, compilation and link, execution and result reporting, and final cleanup. The prototype provides more than 140 test items at 90 programs.

  • PDF

Design and Implementation of Permission Delegation in Role-Based Access Control Model (권한의 위임을 위한 역할-기반 접근 제어 모델의 설계 및 구현)

  • 나상엽
    • Convergence Security Journal
    • /
    • v.3 no.2
    • /
    • pp.1-10
    • /
    • 2003
  • In the distributed-computing environment, applications or users have to share resources and communicate with each other in order to perform their jobs more efficiently. In this case, it is important to keep resources and information integrity from the unexpected use by the unauthorized user. Therefore, there is a steady increase in need for a reasonable way to authentication and access control of distributed-shared resources. In RBAC, there are role hierarchies in which a higher case role can perform permissions of a lower case role. No vise versa. Actually, however, it is necessary for a lower case role to perform a higher case role's permission, which is not allowed to a lower case role basically. In this paper, we will propose a permission delegation method, which is a permission delegation server, and a permission delegation protocols with the secret key system. As the result of a permission delegation, junior roles can perform senior role's permissions or senior role itself on the exceptional condition in a dedicated interval.

  • PDF

Analysis of Withdrawal Strategies in Retirement Assets Reflecting Risk Aversion Based on Programmed Withdrawal (위험회피성향을 반영한 퇴직자산 지급방식 분석에 관한 연구 - Programmed Withdrawal 중심으로)

  • Yeo, Jeong-Mi;Kang, Jung-Chul;Sung, Joo-Ho
    • Communications for Statistical Applications and Methods
    • /
    • v.17 no.5
    • /
    • pp.653-666
    • /
    • 2010
  • Under the retirement pension plan enforced since December 2005, retirees can just choose the payout strategy either of a lump sum allowance or of an annuity in receiving the retirement benefit. Therefore, it is imperative to review and introduce the program withdrawal system enforced by countries with mature pension plan, and complement the limitations of the current payout strategy in the future. In this study, the appropriateness of each of the payout strategies related to the program withdrawal system is examined in terms of shortfall risk and bequest fund per each risk propensity through the expected utility model that reflects the age of the retiree.

SG-RBAC : Role Based Access Control Model for Smart Grid Environment (SG-RBAC : 스마트그리드 환경에 적합한 역할기반접근제어 모델)

  • Lee, Woomyo;Lee, Gunhee;Kim, Sinkyu;Seo, Jungtaek
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.307-318
    • /
    • 2013
  • Smart grid is composed of variable domains including different systems, and different types of the access control are needed in the multiple domain. Therefore, the access control model suitable for the smart grid environment is required to minimize access control error and deny the unauthorized access. This paper introduce the access control requirements in the smart grid environment and propose the access control model, SG-RBAC, satisfied with the requirements. SG-RBAC model imposes constraints on the access right activation according to the user property, the role property, and the system property. It also imposes constraints on the delegation and the inheritance of access right according to temporal/spatial information and a crisis occurrence.

Applying the AHP approach to evaluate Mobile Commerce Environment (AHP 기법을 이용한 모바일 상거래 환경의 평가)

  • Oh, Gi-Oug
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.12
    • /
    • pp.2308-2314
    • /
    • 2006
  • Internet Technology allowed general commerce to have proceeded actively, and now it is sharply evolving into Mobile Commerce. Mobile Commerce came into an inheritance of the Electronic Commerce, thought the feature to be different form is various as well. Many researches that analyzed the feature of Electronic Commerce were carried out but those were processed according to its location and field only. This study extracted and analyzed the factor that considered the several positions for Mobile Commerce so that it can reflect diverse the demands from those related to Mobile Commerce. It sought the new characteristic which is different from the Electronic Commerce, and took account of the successful factor for Mobile Commerce which includes the position in a user, a developer and an operator. In addition AHP (Analytics Hierarchy Process) was used in order to evaluate the subject characteristic applied to each related to through more objective methods. The analysis results identified in this study such as the quality trust and understandability for an information duality might be the one of the chief elements of success in Mobile Commerce which applies at the present.

A Transforming Technique toward Component-based System from Object-oriented Model Using Static Metrics (객체지향 모델로부터 정적 메트릭을 이용하여 컴포넌트 기반 시스템으로 변환하는 기법)

  • 이은주;신우창;이병정;우치수
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.6
    • /
    • pp.728-740
    • /
    • 2004
  • The increasing complexity and shorter life cycle of software have made it necessary to reuse software. Object-oriented development had not provided extensive reuse and computing infrastructures are evolving from mainframe to distributed environments. However, components provide more advanced means of structuring, describing and developing system, because they are more coarse-grained and have more domain-specific aspects than objects. And they are also suited for distributed environment due to their reusability and granularity. In this paper, we present a process including the static metrics and guidelines that can be applied to transform object-oriented systems into component-based systems. Our process consists of two parts: First, basic components are created based upon composition and inheritance relationships between classes. Second, intermediate system is refined into component-based system with the static metrics and guidelines we propose.

Object Views in the ODYSSEUS Object-Relational DBMS (오디세우스 객체관계형 DBMS를 위한 오브젝트 뷰)

  • 이재길;한욱신;이민재;이종학;황규영
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.1
    • /
    • pp.14-24
    • /
    • 2004
  • Views are essential in providing logical data independence for database systems. Object views in object-oriented/object-relational databases have requirements quite different from those of relational databases due to support for object-oriented concepts. Although many commercial object-oriented/object-relational database systems support object views, implementation techniques have not been discussed sufficiently in the literature. In this paper, we devise a technique for implementing views in object-oriented/object-relational databases and apply it to the ODYSSEUS object-relational database system. We first analyze the requirements of object views. Next, to implement object views, we extend the existing query modification algorithm that has been proposed for implementing views in relational databases. Next, we compare the features of the proposed object view with those of object views in commercial object-relational database systems. It is shown that the proposed object view supports all object-oriented concepts such as object identifiers, inheritance, methods, and composite objects, while existing object views support part of them. Last, we propose detailed techniques for implementing the extended query modification algorithm in the ODYSSEUS object-relational database system.

Comparative Analysis on Author's Property Right Limitation in North & South Korea (남북한 저작재산권 권리제한에 관한 비교 분석)

  • Lee, Chan-Do
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.3
    • /
    • pp.138-149
    • /
    • 2017
  • The objective of this study was to investigate and analyze the problems on 'System for Author's Property Right Limitation' in the North Korean Copyright Law. The NK Copyright Law had applied the international standards superficially, it may not be considered to get out of the grand frame of NK system. Especially, it is different that there is lack or short of contents on transfer, disposition, succession, trust, and so on for Author's Property Right. For example, free usages of Literary Works upon the NK law of Author's Property Right were described as 9 cases including copy and translation for personal purpose; copy in the library, etc. However, there are many insufficient items in view of international standards among the cases, showing omissions of critical terminology such as publications of literary works, purpose of usage, scope of usage, etc. Therefore, the NK law of Author's Property Right is interpreted not to be satisfied with the requirements for the law of Author's Property Right but to be legalized in terms of external announcement, and it seems not to be considered as the Author's Property Right Law with general standards enough to demonstrate the creativity freely.

Design and Implementation of u-Learning Hub Site based on Learning Activity Oriented Components (학습활동 중심의 컴포넌트 기반 u-러닝 허브 사이트 설계 및 구현)

  • Park, Chan;Seong, Dong-Ook;Jang, Young-Hee;Lee, Hye-Jin;Yoo, Jae-Soo;Yoo, Kwan-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.1
    • /
    • pp.446-454
    • /
    • 2009
  • In this paper, we propose u-learning hub site systems which are designed and implemented based on learning activities oriented components. The proposed systems are composed of component which can process the functionalities for coming into action of learning activities through various devices. Specially, each component is broken into class units by which learning activities of users can be performed on various devices. When users try to connect u-learning system in hub site, the system explores devices of users and connection program and then selects components that are fit to the activities and combines them in realtime. Through the methodology of u-learning hub site, the system proposed in this paper provides u-learning environment so that users can use the learning activity services taking no influence on time, place, devices and programs under the consistent system. That is different to traditional e-learning system which cannot support various devices of users directly.

An Approach to Verifying Behavioral Compatibility between Objects using Successive Methods Rule (연속 메소드 규칙을 이용한 객체간의 행위적 호환성 검증 기법)

  • Chae, Heung-Seok;Lee, Joon-Sang;Bae, Jung-Ho
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.9
    • /
    • pp.785-796
    • /
    • 2007
  • In object-oriented systems, objects are organized in hierarchies such that subtypes Inherit and specialize the structure and the behavior of supertypes. Behavioral compatibility is a very crucial issue to permit the substitution between object types, which supports the extension and evolution of object oriented system. This paper proposes successive methods rule that extending methods rule for checking behavioral compatibility between objects on the basis of their dynamic behaviors expressed in finite state machine which is one of the most frequently used notations for expressing dynamic behaviors of object. Based on the classical methods rule, successive methods rule is used for guarantee behavioral compatibility by checking the traces of two objects. And we describe an algorithm for verifying behavioral compatibility between objects using the successive methods rule.