• Title/Summary/Keyword: 상호연동성

Search Result 484, Processing Time 0.038 seconds

An Efficient Authentication Mechanism for Fast Mobility Services in MIPv6 (MIPv6에서 빠른 이동성 서비스를 위한 효율적인 인증 방법)

  • Lee Seung-Yeon;Huh Eui-Nam
    • Journal of Internet Computing and Services
    • /
    • v.7 no.3
    • /
    • pp.1-11
    • /
    • 2006
  • If a mobile node out of home domain asks to provide mobility service, the mobile should be permitted by the home domain. This can be accomplished by the usage of AAA but the recent studies have shown its weakness to fail the ability of mobile node. This study suggests Fast Handoff model which will shorten permission time by AAA and allow the mobility service to be more efficient. Our suggestion with Assertion function is a new approach to assist authentication capability through mutual authentication of each V_AAA when the distance between HA and itself gets far or its delay time becomes longer. Our suggestion verifies its efficiency by cost analysis.

  • PDF

A Study on information resource management based ITA in a organization (ITA 기반에서의 조직 정보화 자원관리 방안 연구)

  • Cho, sung-nam;Kim, ji-young;Chung, taik-yeong;Park, chan-jin
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.410-413
    • /
    • 2007
  • Information Technology(IT) was introduced to the business as a means of improving operational efficiency. Nowadays, IT has become an essential component of an organization's survival. Almost no operations of an organization can be performed without IT. The benefits of using IT in organizations can not be underestimated. Some organizations have flourished because of the competitive advantages derived from the IT systems they have developed. Most IT systems, however, have been extended, changed and integrated with ad-hoc and makeshift solutions without thinking long-range view. It results in high maintenance cost and uncontrolled system for managing information resources. Especially, public institutions under the Project-Based System (PBS) have some problems in keeping a good management systems for information resource, because they are usually operated for a set period. Therefore, we propose the framework how to efficiently manage the IT assets and resources based on the Information Technology Architecture (ITA) that is introduced for the overall optimization of IT investment, change management and inter-operability.

  • PDF

Distributed Identity Management Model using SAML in Digital Ecosystem (디지털 생태계에서 SAML을 이용한 분산 아이디 관리모델)

  • Jang, In-Yong;Youm, Heung-Youl
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.6
    • /
    • pp.141-154
    • /
    • 2009
  • Digital Ecosystem is a new word for dynamic IT business environments. Digital Ecosystem can consist of various enterprise federations such as competing, collaborating and stable or unstable ones. They make it difficult to implement identity management for the environment. Existing solutions are either too restricting and inflexible to support the dynamic nature of ecosystems since they are too complex and difficult to adopt. This paper is to propose an distributed identity management model for automated processing of identity information between ecosystems. It is featured with being practical, clear and easy to deploy. And it is based on the new OASIS SAML3.0 standard to provide interoperability between existing identity technologies. This paper presents the basic and extended identity model for single service and multiple services. The model presented in this paper can be applied to enterprise context easily.

  • PDF

Performance Evaluation of Real-Time Transaction Processing in a Shared Disk Cluster (공유 디스크 클러스터에서 실시간 트랜잭션 처리의 성능 평가)

  • Lee Sangho;Ohn Kyungoh;Cho Haengrae
    • Journal of KIISE:Databases
    • /
    • v.32 no.2
    • /
    • pp.142-150
    • /
    • 2005
  • A shared disks (SD) cluster couples multiple computing nodes, and every node shares a common database at the disk level. A great deal of research indicates that the SD cluster is suitable to high performance transaction processing, but the aggregation of SD cluster with real-time processing has not been investigated at all. A real-time transaction has not only ACID properties of traditional transactions but also time constraints. By adopting cluster technology, the real-time services will be highly available and can exploit inter-node parallelism. In this paper, we first develop an experiment model of an SD-based real-time database system (SD-RTDBS). Then we investigate the feasibility of real-time transaction processing in the SD cluster using the experiment model. We also evaluate the cross effect of real-time transaction processing algorithms and SD cluster algorithms under a wide variety of database workloads.

Design and Implementation of CORBA based on Multi-Threaded in Open Network Environments (개방형 네트워크 환경을 위한 멀티쓰레드 기반 코바 설계 및 구현)

  • Jang, Jong-Hyeon;Lee, Dong-Gil;Han, Chi-Mun
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.213-220
    • /
    • 2002
  • Distributed competing system gives a new system architecture to be taken into consideration for solving the problems of interoperability of heterogeneous systems. In the present paper, CORBA based on multi-threaded interoperates with software blocks at physically isolated hardware. We show how archives optimal CORBA system from analysis of required functions, implementations of protocols and benchmarking of system performance in the Open Multi-service Network System Environment. The core features of our CORBA system are restricted Quality of Service based on priority, timeout service and exception status information notify to the related software blocks. And the objectives are design and implementation of high performance multi-threaded middleware and satisfied with extendibility, flexibility and stability of CORBA platform.

Design Mobility Agent Module for Healthcare Application Service (헬스케어 응용 서비스를 위한 Mobility Agent 모듈 설계)

  • Nam, Jin-Woo;Chung, Yeong-Jee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.2
    • /
    • pp.378-384
    • /
    • 2008
  • The sensor network for the health care application service has the man or movable object as the main sensing object. In order to support inter-node interaction by the movement of such sensing objects, the node's dynamic function modification, dynamic self-configuration and energy efficiency must be considered. In this paper, the Agilla model which supports the dynamic function modification through the agent migration between nodes and LEACH protocol which guarantees the dynamic self-configuration and energy efficiency through the configuration of inter-node hierarchical cluster configuration are analyzed. Based on the results of the analysis, the Mobility Agent Middleware which supports the dynamic function modification between nodes is designed, and LEACH_Mobile protocol which guarantees the node nobility as the weakness of the existing LEACH protocol is suggested. Also, the routing module which supports the LEACH_Mobile protocol is designed and the interface for conjunction with Mobility Agent Middleware is designed. Then, it is definitely increase performance which un mobility node of transfer data rate through LEACH_Mobile protocol of simulation result.

Blockchain-based new identification system (블록체인 기반 새로운 신원확인 체계)

  • Jung, Yong-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.2
    • /
    • pp.452-458
    • /
    • 2021
  • The value and importance of personal information are increasing due to the increasing number of fields where the Internet environment and computing environment are used, and user authentication technology is also changing. Until now, accredited certificates, which are mainly used in the financial sector, are being replaced with biometric authentication technology due to the problem of revocation. However, another problem is that biometric information cannot be modified once it is leaked. Recently, with the advent of blockchain technology, research on user authentication methods has actively progressed. In this paper, both public certificate and blockchain-based user authentication can be used without system change, and a new DID issuance and reissuance method that can replace the resident registration number is presented. The proposed system can be used without restrictions in a blockchain. However, the currently used DID requires installation of an application at the Interworking Support Center for verification. Since a DID can be authenticated without registering as a member, indiscriminate information collection can be prevented. Security, convenience, and determinism are compared with the existing system, and excellence is proven based on various attack methods, its portability, and proxy use.

A Study on the Assessment of Critical Assets Considering the Dependence of Defense Mission (국방 임무 종속성을 고려한 핵심 자산 도출 방안 연구)

  • Kim Joon Seok;Euom Ieck Chae
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.189-200
    • /
    • 2024
  • In recent years, the development of defense technology has become digital with the introduction of advanced assets such as drones equipped with artificial intelligence. These assets are integrated with modern information technologies such as industrial IoT, artificial intelligence, and cloud computing to promote innovation in the defense domain. However, the convergence of the technology is increasing the possibility of transfer of cyber threats, which is emerging as a problem of increasing the vulnerability of defense assets. While the current cybersecurity methodologies focus on the vulnerability of a single asset, interworking of various military assets is necessary to perform the mission. Therefore, this paper recognizes these problems and presents a mission-based asset management and evaluation methodology. It aims to strengthen cyber security in the defense sector by identifying assets that are important for mission execution and analyzing vulnerabilities in terms of cyber security. In this paper, we propose a method of classifying mission dependencies through linkage analysis between functions and assets to perform a mission, and identifying and classifying assets that affect the mission. In addition, a case study of identifying key assets was conducted through an attack scenario.

Design and Implementation of Hybrid Coaching System based on Web Service for College Career Guidance (진로 지도를 위한 웹서비스 기반의 하이브리드 코칭 시스템 설계 및 구현)

  • JIN, Wen-Quan;Koh, Eun-Hyeon;Kim, Do-Hyeun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.5
    • /
    • pp.1-7
    • /
    • 2015
  • Recently, a coaching helps individual to lead and maximize performance. Generally there is a face to face coaching at the current spot of education, and the e-coaching is on the rise. And the face-to-face coaching means that coach and the coachee come face to face directly. And, the effective coaching method is required to supply the weakness and to maximize the strength of the e-coaching using the Internet. Accordingly, we are studying a hybrid coaching to overcome the difficulty and the limit of face-to-face coaching and online coaching. In this paper, we design and implement the career coaching system to provide the face-to-face coaching and the e-coaching for coachee based on the Web service on the Internet. We provide the hybrid coaching using Web service based on the Restful and connect with the database based on the Web to save and manage the profiles and the coaching history of the coach and the coachee. Proposed hybrid coaching system for coachee career improves remote accessibility between the coach and the coachee. This system provides the interaction without the limit of the time and the space, and overcomes the limit of the traditional face-to-face coaching on the online environment.

Design of Framework for Ubiquitous Privacy-Aware Web Services (유비쿼터스 Privacy-Aware Web Services Framework 설계)

  • Song, You-Jin;Lee, Dong-Hyeok
    • The Journal of Society for e-Business Studies
    • /
    • v.11 no.2
    • /
    • pp.13-30
    • /
    • 2006
  • Web services are independent on a platform and are suitable in the Ubiquitous environment which an interaction for each device. Ubiquitous web services can use various applied service in any network neighborhood or terminal. Main characteristic of Ubiquitous is context-awareness. Therefore, Ubiquitous web services must include context-aware control process and protect user privacy because context-aware environment collects privacy data. But current web services standard is not specially designed in respect of context-communication. Therefore, the framework which can add flexibility in transmission of context is required. Our Framework can give extension for context and can communicate flexibly Context information for every session. Therefore, Our Framework can solve overhead problem of context in SOAP message and protect user's privacy according to user preference.

  • PDF