• Title/Summary/Keyword: 웹서비스 개발

Search Result 1,590, Processing Time 0.034 seconds

Development of RESTful Web Service for Loading Data focusing on Daily Meteorological Data (데이터 로딩 자동화를 위한 RESTful 웹서비스 개발 - 일별 기상자료 처리를 중심으로 -)

  • Kim, Taegon;Lee, JeongJae;Nam, Won-Ho;Suh, Kyo
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.56 no.6
    • /
    • pp.93-102
    • /
    • 2014
  • Generally data loading is a laborous job to develop models. Meteorological data is basic input data for hydrological models, it is provided through websites of Korea Meteorological Administration (KMA). The website of KMA provides daily meteorological observation data with tabular format classified by years, items, stations. It is cumbersome to manipulate tabular format for model inputs such as time series and multi-item or multi-station data. The provider oriented services which broadcast restricted formed information have caused inconvenient processes. Tim O'Reilly introduces "Web 2.0" which focuses on providing a service based on data. The top ranked IT companies such as google, yahoo, daum, and naver provide customer oriented services with Open API (Application Programming Interface). A RESTful web service, typical implementation for Open API, consists URI request and HTTP response which are simple and light weight protocol than SOAP (Simple Object Access Protocol). The aim of this study is to develop a web-based service that helps loading data for human use instead of machine use. In this study, the developed RESTful web service provides Open API for manipulating meteorological data. The proposed Open API can easily access from spreadsheet programs, web browsers, and various programming environments.

A Method for Specifying the Access Control of XML Document using Process Algebra (프로세스 대수를 이용한 XML 문서의 접근권한 표현법)

  • Lee, Ji-Yeon;Kim, Il-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.3
    • /
    • pp.251-258
    • /
    • 2007
  • With the increase of a web service technology, a new access control mechanism has developed for XML documents. As a result, as legacy access control systems, access control systems has become an active research topic. In this paper, we propose a methodology to translate access control policies for XML documents into formal specification language CSP. To do this, first, we introduce a method to translate a hierarchical access to XML documents using XPath language into CSP process algebra. Second, we explain a method to represent a XML schema as a formal model like automata. Third, we present a method for representing the semantics of access control policies such as the scope of rules and confliction resolution into a process algebra language. Finally, a CSP specification example of an XML schema and path expressions aye shown to illustrate the validity of our approach.

  • PDF

A Study on Ubiquitous Tree Management System based on GIS and Smart-Phone for Efficiency of Arboreal Growth Management (수목 생장 관리 효율을 위한 GIS 및 스마트폰 기반의 유비쿼터스 수목 관리 시스템에 관한 연구)

  • Jung, Se-Hoon;Sim, Chun-Bo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.6
    • /
    • pp.119-130
    • /
    • 2012
  • In this paper, we propose ubiquitous tree management system based on GIS and smart-phone using the object-oriented design modeling to maximize the efficiency of tree management. For this, proposed system is implemented in the form of client/server (C/S). The spot tree management system as the client is based on the mobile(PDA, Smart-Phone), whereas the tree management system based on PC as the server makes use of GIS. Also, Web service method instead of CDMA used in exist studies is used for tree data communication among C/S. And problems of existing studies, that is excessive maintenance costs, accessibility shortage of variety users, connectivity shortage of geographic information system will be settled through the convergence of the proposed system development methods, GIS system, smart devices. Therefore, we verify proposed system by using the systemic unit test and qualitative assessment respectively and prove to be more excellent than the existing system based on the mobile, in terms of systemic effectiveness and extendability.

OSI Network Management of CORBA-based using Object Web (Object Web을 이용한 CORBA기반의 OSI 망관리)

  • 김강석;송왕철
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.3 no.1
    • /
    • pp.163-173
    • /
    • 1999
  • The CORBA provides a object-oriented middleware that lets applications extend their range across networks, languages, component boundaries, and operating systems. Java can provide a potable object that works in any operating system. Mapping Java into CORBA helps large scale information system operate through the Web by using the mobile code property of Java and object component technique of CORBA. This development environment is called the Object Web. This paper proposes an architecture of OSI network management with a CORBA manager using Object Web and an CORBA/CMIS gateway which apply a CMIS-level gateway model to gateway. In this architecture, CORBA manager is based on Object Web and can manage MOs in the OSI domain. The gateway has a role to translate CORBA IDLs into CMIS services and vice versa. In addition, an OSI agent is abstracted into a CORBA agent.

  • PDF

A Design and Implementation of a Web-based Ship ERP(SHERP) (웹기반 선박용 ERP (SHERP) 설계 및 구현)

  • Kim, Sang-Rak;Bae, Jae-Hak J.
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.6B
    • /
    • pp.710-719
    • /
    • 2011
  • Shipping companies have become interested in the development of strategic ship assets management systems which are implemented for high competitiveness and business rationalization to meet the tough business environment of high oil prices and decrease in cargo. In this paper we introduce a ship assets management system that is suitable for the SAN(Ship Area Network) environment. This system is designed to execute business strategy of ship owners giving consideration to requirements of shipping stakeholders. In addition we have implemented it in a web-based ERP system (SHERP) which separates user interface and business logic. The SHERP is based on STEP and PLIB, which are international standards for data exchange of mechanical devices and parts. It also adopts a ship ontology to manage the ship information and knowledge during its life-cycle. The SHERP will be a concrete example of servitization of shipbuilding, as an information system which is used in ships and ship groups.

Selection of Hydrologic Factors of NASA LIS for Water Hazrd Information Platform (수재해 정보 플랫폼에 활용 가능한 NASA LIS의 수문인자 선정)

  • PARK, Gwang-Ha;BAECK, Seung Hyub;CHAE, Hyo-Sok;HWANG, Eui-Ho
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2017.05a
    • /
    • pp.471-471
    • /
    • 2017
  • 최근 기상 이변으로 인해 홍수, 가뭄 등과 같은 수재해가 빈번히 발생되고 있다. 이에 수재해예방 등의 안전 기술과 관련된 관심이 증가되고 있다. 수재해 예방을 위해서는 먼저 홍수, 가뭄 등과 같은 수재해 감시가 필요하며, 이를 위해 위성, 레이더 등으로 관측된 자료를 활용한 수문인자 정보는 매우 중요하다. 미국 NASA의 LIS(Land Information System)는 위성 및 지상관측 자료를 활용하여 홍수, 가뭄, 기상, 산사태, 농업 등의 정보를 생산할 수 있는 프레임워크이다. LIS는 크게 지표면 모델 및 자료동화를 위한 변수들의 전처리 과정(LDT), 지표면 모델을 활용한 분석 및 자료동화 과정(LDAS) 및 분석된 자료의 검보정(LVT) 과정으로 구성되어 있다. LIS에서 산출 가능한 인자는 Energy Balance, Water Balance, Surface/Subsurface State, Evaporation, Hydrologic, Cold Season Processes, Compared Data, Carbon 등 9개로 분류되며 약 78개의 인자를 산출한다. 홍수, 가뭄 등과 같은 수재해 감시를 위한 수문인자는 강수량, 증발산량, 토양수분, 지표면 온도 등을 비롯한 여러 가지 인자들이 필요하다. LIS는 주로 미국, 캐나다 등 평활한 지역에 활용되어 공간해상도는 약 10km(0.1deg) 이하로 자료를 산출한다. 산악 지형이 대부분인 한국 지형에 적용하기에는 자료의 정확성이 낮아 10km 이상의 공간해상도 자료가 필요하며, 한국형 수재해정보 플랫폼에서 홍수, 가뭄 등의 기초자료로 사용하기 위한 수문인자의 선정이 필요하다. 이에 본 연구에서 NASA LIS를 통해 산출 가능한 인자를 정리하고 한국형 수재해 정보플랫폼에 활용 가능한 수문인자의 항목을 조사하였다. 홍수, 가뭄 등 수재해 분석에 필요한 기초자료는 강우량, 유출량, 잠재적 증발산량, 식생의 증산량, 토양수분, 표면온도, 알베도 등의 수문인자이며, NASA LIS에서 이와 같은 수문인자 산출이 가능하다. NASA와 국제공동 연구중인 한국형 물순환분석 프레임워크(K-LIS(안)) 개발을 통해 한국 지형에 적합한 홍수 및 가뭄 등의 수재해 감시 평가 예측이 가능할 것이며, K-LIS에서 산출되는 고해상도의 수문인자들을 수재해 정보 웹 포털의 정보 제공 서비스를 통하여 손쉽게 접근 가능할 것으로 사료된다.

  • PDF

Countermeasure of an Application Attack Scenario Using Spring Server Remote Code Execution Vulnerability (CVE-2018-1270) (스프링 서버 원격코드 실행 취약점(CVE-2018-1270)을 이용한 응용 공격 시나리오의 대응 방안)

  • Jung, Byeong-Mun;Jang, Jae-Youl;Choi, Chul-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.2
    • /
    • pp.303-308
    • /
    • 2019
  • Spring framework is widely used as a base technology for e-government frameworks and to the extent it is a standard for web service development tools of Korean public institutions. However, recently, a remote code execution vulnerability(CVE-2018-1270) was found in an application using a spring framework. This paper proposes a method of analyzing the vulnerability experiment using a hacking scenario, Proof Of Concept(POC), in which the spring framework is a hazard to the server. We propose the patch to version 4.3.16 and version 5.0.5 or later as an ultimate response. It is also expected that the proposed experiment analysis on vulnerability of hacking scenario will be used as a data for improving performance of security programs and establishing a new authentication system.

OneNet Cloud Computing Based Real-time Home Security System (OneNet 클라우드 컴퓨팅 기반 실시간 홈 보안 시스템)

  • Kim, Kang-Chul;Zhao, Yongjiang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.1
    • /
    • pp.101-108
    • /
    • 2021
  • This paper builds a real-time home security system based on the OneNet cloud platform to control the status of the house through a smartphone. The system consists of a local part and a cloud part. The local part has I/O devices, router and Raspberry Pi (RPi) that collects and monitors sensor data and sends the data to the cloud, and the Flask web server is implemented on a Rasberry Pi. When a user is at home, the user can access the Flask web server to obtain the data directly. The cloud part is OneNet in China Mobile, which provides remote access service. The hybrid App is designed to provide the interaction between users and the home security system in the smartphone, and the EDP and RTSP protocol is implemented to transmit data and video stream. Experimental results show that users can receive sensor data and warning text message through the smartphone and monitor, and control home status through OneNet cloud.

A Study of Path-based Retrieval for JSON Data Using Suffix Arrays (접미사 배열을 이용한 JSON 데이터의 경로 기반 검색에 대한 연구)

  • Kim, Sung Wan
    • Journal of Creative Information Culture
    • /
    • v.7 no.3
    • /
    • pp.157-165
    • /
    • 2021
  • As the use of various application services utilizing Web and IoT and the need for large amounts of data management expand accordingly, the importance of efficient data expression and exchange scheme and data query processing is increasing. JSON, characterized by its simplicity, is being used in various fields as a format for data exchange and data storage instead of XML, which is a standard data expression and exchange language on the Web. This means that it is important to develop indexing and query processing techniques to effectively access and search large amounts of data expressed in JSON. Therefore, in this paper, we modeled JSON data with a hierarchical structure in a tree form, and proposed indexing and query processing using the path concept. In particular, we designed an index structure using a suffix array widely used in text search and introduced simple and complex path-based JSON data query processing methods.

A Study on Traceback by WAS Bypass Access Query Information of DataBase (DBMS WAS 우회접속의 쿼리정보 역추적 연구)

  • Baek, Jong-Il;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.181-190
    • /
    • 2009
  • DBMS access that used high speed internet web service through WAS is increasing. Need application of DB security technology for 3-Tier about DBMS by unspecified majority and access about roundabout way connection and competence control. If do roundabout way connection to DBMS through WAS, DBMS server stores WAS's information that is user who do not store roundabout way connection user's IP information, and connects to verge system. To DBMS in this investigation roundabout way connection through WAS do curie information that know chasing station security thanks recording and Forensic data study. Store session about user and query information that do login through web constructing MetaDB in communication route, and to DBMS server log storing done query information time stamp query because do comparison mapping actuality user discriminate. Apply making Rule after Pattern analysis receiving log by elevation method of security authoritativeness, and develop Module and keep in the data storing place through collection and compression of information. Kept information can minimize false positives of station chase through control of analysis and policy base administration module that utilize intelligence style DBMS security client.