• Title/Summary/Keyword: 웹 응용 개발

Search Result 647, Processing Time 0.026 seconds

Vulnerability Analysis on the CNG Crypto Library (CNG 암호 라이브러리의 보안 취약점 분석)

  • Lee, Kyungroul;Oh, Insu;Lee, Sun-Young;Yim, Kangbin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.4
    • /
    • pp.838-847
    • /
    • 2017
  • CNG which was released as a substitute of the previous CAPI (Cryptography API) library from Microsoft is constructed with individual modules based on the plug-in architecture, this means CNG is exceedingly helpful in the cost of development as well as the facility of extension. On the opposite side of these advantages, considerations on security issues are quite insufficient. Therefore, a research on security assurance is strongly required in the environment of distributing and utilizing the CNG library, hence, we analyze possible security vulnerabilities on the CNG library. Based on analyzed vulnerabilities, proof-of-concept tools are implemented and vulnerabilities are verified using them. Verified results are that contents of mail, account information of mail server, and authentication information of web-sites such as Amazon, E-bay, Google, and Facebook are exposed in Outlook program and Internet Explorer program using CNG library. We consider that the analyzed result in this paper can improve the security for various applications using CNG library.

The Gaurantee of Real-Time Vital Sign Information Service Message of Patient Monitoring System in Distributed Network Systems (분산 네트워크 시스템에서 환자 모니터링 시스템의 실시간 생체정보 서비스 메시지 보장)

  • Lim, Se-Jung;Kim, Gwang-Jun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.4 no.2
    • /
    • pp.162-167
    • /
    • 2009
  • In this paper, we present a patient real-time vital sign information transmission system to effectively support developing real-time communication service by using a real-time object model named TMO (Time-Triggered Message-Triggered Object). Also, we describes the application environment as the PMS(Patient Monitoing System) to guarantee real-time service message with TMO structure in distributed network systems. We have to design to obtain useful vital sign information, which is generated at parsing data receiver modulor of HIS with TMO structure, that is offered by the central monitor of PMS. Vital sign informations of central monitor is composed of the raw data of several bedsite patient monitors. We are willing to maintain vital sign information of real time and continuity that is generated from the bedsite patient monitor. In the real time simulation techniques based on TMO object modeling, we have observed several advantages to the TMO structuring scheme. TMO object modeling has a strong traceability between requirement specification and design.

  • PDF

Educational Voice Storybook Application using Mobile NFC (모바일 NFC를 이용한 교육용 음성동화책 어플리케이션)

  • Jo, Seung-Geun;Kim, Tae Yong;Jang, Won-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.541-544
    • /
    • 2015
  • Through the data communication services in the mobile field in the past of a voice call center (SMS, E-Mail, web surfing, etc.), it has evolved as a "service of smartphone-based" life convenience. According to the latest world book publishing market statistics, the while increasing the proportion of e-books, the proportion of this paper are commercially being reduced. Paper this many e-books in the development of, but active communication in this paper By fusing an NFC-based mobile environment that provides a function to complement the disadvantage of electronic books has, it can give to meet the matters required in more diverse applications. Therefore, in this paper, in order to design and implement an NFC-based mobile phonic fairy book application of, and the efficiency and maintenance of the development through a way to save on rather than storing the information of the management target device server We have implemented a NFC-based mobile education phonic fairy book application that takes into account.

  • PDF

Design and Implementation of Commodity Information System Using LBS with Augumented Reality Based on Smart Phone (스마트폰 기반 위치기반서비스와 증강현실을 결합한 상점정보시스템의 설계 및 구현)

  • Yoon, Sunhee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.12
    • /
    • pp.229-239
    • /
    • 2012
  • In 2011, more than 2000 million smartphone users are in our country. As a result, consumer demand have been developed for a variety of applications, especially in the information service-related applications that combine location-based services and augmented reality in addition to related information for the virtual reality of things are rapidly increased. This paper analysed location-based services and augmented reality technology as related research and designed and implemented the system that provides the same environment as if the user is shopping and purchasing the items in the real world and offers the information characterizing the real situation combines location-based service and augmented reality which provides with an excellent reality in the smart phone environment. The proposed system in this paper is excellent in mobility, scalability and reality as a result of analysis of functions and services compared to web-based systems and has advantages to apply for the suitable system in ubiqutous environment which can be used in anytime and anywhere.

A Hybrid Recommendation Method based on Attributes of Items and Ratings (항목 속성과 평가 정보를 이용한 혼합 추천 방법)

  • Kim Byeong Man;Li Qing
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.12
    • /
    • pp.1672-1683
    • /
    • 2004
  • Recommender system is a kind of web intelligence techniques to make a daily information filtering for people. Researchers have developed collaborative recommenders (social recommenders), content-based recommenders, and some hybrid systems. In this paper, we introduce a new hybrid recommender method - ICHM where clustering techniques have been applied to the item-based collaborative filtering framework. It provides a way to integrate the content information into the collaborative filtering, which contributes to not only reducing the sparsity of data set but also solving the cold start problem. Extensive experiments have been conducted on MovieLense data to analyze the characteristics of our technique. The results show that our approach contributes to the improvement of prediction quality of the item-based collaborative filtering, especially for the cold start problem.

An Integrated File System for Guaranteeing the Quality of Service of Multimedia Stream (멀티미디어 스트림의 QoS를 보장하는 통합형 파일시스템)

  • 김태석;박경민;최정완;김두한;원유집;고건;박승민;김정기
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.9
    • /
    • pp.527-535
    • /
    • 2004
  • Handling mixed workload in digital set-top box or streaming server becomes an important issue as integrated file system gets momentum as the choice for the next generation file system. The next generation file system is required to handle real-time audio/video playback while being able to handle text requests such as web page, image file, etc. Legacy file system provides only best effort I/O service and thus cannot properly support the QoS of soft real-time I/O. In this paper, we would like to present our experience in developing the file system which fan guarantee the QoS of multimedia stream. We classify all application I/O requests into two category: periodic I/O and sporadic I/O. The QoS requirement of multimedia stream could be guaranteed by giving a higher priority to periodic requests than sporadic requests. The proto-type file system(Qosfs) is developed on Linux Operating System.

Verification of Machine Codes using an Effect Type System (효과 타입 시스템을 이용한 기계어 코드의 검증)

  • Chung, Jae-Youn;Ryu, Suk-Young;Yi, Kwang-Keun
    • Journal of KIISE:Software and Applications
    • /
    • v.27 no.8
    • /
    • pp.886-901
    • /
    • 2000
  • Verification of the safety of untrusted codes becomes an important issue in the mobile computing environment and the safety-critical software systems. Recently, it is very common to run the codes attached to the electronic mails or downloaded from the web browsers. We propose the verification method of the machine code property. The code producer delivers the machine code and its property, then the code consumer checks whether the delivered code satisfies the delivered property. The safety of source codes is verified by the well-defined compiler systems but the verification mechanism for machine codes is not well defined yet. We design an intermediate language etySECK and propose the verification method of the property of etySECK programs. And then we prove the soundness of our system which is the type system with effect extension.

  • PDF

A Study on Analyzing the Features of 2019 Revised RDA (2019 개정 RDA 특징 분석에 관한 연구)

  • Lee, Mihwa
    • Journal of Korean Library and Information Science Society
    • /
    • v.50 no.3
    • /
    • pp.97-116
    • /
    • 2019
  • This study is to analyze the characteristics of 2019 revised RDA and suggest the consideration in aspects of cataloging using the literature reviews. The following 3 things are suggested with analyzing the revised RDA. First, high quality data such as supplementing cataloging data and constructing vocabulary encoding schemes should be needed to transform bibliographic data to linked data for the semantic web. Second, MARC should be expanded to accept the new conept of LRM and linked data being reflected in revised RDA because MARC is the unique encoding format untile linked data will be transformed from MARC data. Third, the policy statement and the application profile are needed for describing resource consistently because each entity and element has own condition and option, and there are different elements for applying rules in revised RDA. Based on this study, the RDA related researches should be in progress such as exapanding BIBFRAME as well as MARC to accept the new concepts in revised RDA, and, also, reflecting and accepting RDA being able to use revised RDA rules and registries in libraries and nations that have been faced to revise their own cataloging rules.

Countermeasure of an Application Attack Scenario Using Spring Server Remote Code Execution Vulnerability (CVE-2018-1270) (스프링 서버 원격코드 실행 취약점(CVE-2018-1270)을 이용한 응용 공격 시나리오의 대응 방안)

  • Jung, Byeong-Mun;Jang, Jae-Youl;Choi, Chul-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.2
    • /
    • pp.303-308
    • /
    • 2019
  • Spring framework is widely used as a base technology for e-government frameworks and to the extent it is a standard for web service development tools of Korean public institutions. However, recently, a remote code execution vulnerability(CVE-2018-1270) was found in an application using a spring framework. This paper proposes a method of analyzing the vulnerability experiment using a hacking scenario, Proof Of Concept(POC), in which the spring framework is a hazard to the server. We propose the patch to version 4.3.16 and version 5.0.5 or later as an ultimate response. It is also expected that the proposed experiment analysis on vulnerability of hacking scenario will be used as a data for improving performance of security programs and establishing a new authentication system.

A Conformance Testing Method and its Implementation for XML Signature Products (XML전자서명 제품의 표준적합성 시험 방법 및 구현)

  • 김지현;이광수
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.4
    • /
    • pp.3-11
    • /
    • 2004
  • The XML has been becoming a basis of the related application and industry standards with proliferation of electronic transactions on the web, and the standardization on XML Signature, which can be applied to the digital contents including XML objects from one or more sources, is in the progress through a joint effort of W3C(World Wide Web Consortium) and IETF(Internet Engineering Task Force). Along with this trend, the development of products implementing XML Signature has been growing, and the XML Signature products are required to implement the relevant standards correctly to guarantee the interoperability among different XML Signature products. In this paper, we propose a conformance testing method for testing the XML Signature products, which includes a testing procedure and test cases. The test cases were obtained through analysis of XML Signature standards. Finally we describe the design and uses of our XML Signature conformance testing tools which implements our testing method.