• Title/Summary/Keyword: 3-tier web application

Search Result 13, Processing Time 0.023 seconds

Design and Implementation of Secure 3-Tier Web Application with Open Source Software

  • Kim, Chang Su;Low, Hooi Yin;Lee, Yong Ju
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.1
    • /
    • pp.33-54
    • /
    • 2010
  • Providing a secure 3-tier Web application has become a high priority for companies as e-businesses have increased the amount and the sensitivity of corporate information that can be accessed through the web. Web applications become more difficult to secure with this very increase in online traffic and transactions. This paper first reviews the 3-tier of web application, types of attacks that can threaten web application services and security principles. We then are designing and implementing a secure web application with open source software that able to mitigate the web application vulnerable to attack.

E-commerce Architecture Evaluation Through Web Stress Test (웹 스트레스 테스트를 통한 전자상거래 아키텍쳐 평가)

  • Lee, Young-Hwan;Park, Jong-Soon
    • Information Systems Review
    • /
    • v.3 no.2
    • /
    • pp.277-288
    • /
    • 2001
  • Of critical importance to the success of any e-commerce site are the two factors: rapid application development and quick response time. A three-tier architecture composed of presentation layer, business layer, and data access layer emerges to allow rapid changes in user interface, business logic, and database structures. Too often, such a logical three-tier architecture is considered as requiring a three-tier physical architecture: Web server, application server, and database server running on separate computers. Contrary to the common belief, a Web stress test reveals that the three-tier logical architecture implemented on a two-tier physical platform guarantees a quicker response time due to the reduction in cross-machine communications. This would lead business firms to economize their spending on e-commerce: increasing the number of physical servers to expedite transaction is not necessarily the best solution. Before selecting a particular hardware configuration, a Web stress test needs to be conducted to compare the relative merits of alternative physical architectures. Together with capacity planning, Web stress test emerges as a powerful tool to build robust, yet economical e-commerce sites.

  • PDF

A Framework for Java-based Web Database Applications (JaVa를 기반으로 한 웹 데이타베이스 응용을 위한 프레임워크)

  • 구흥서
    • The Journal of Information Technology and Database
    • /
    • v.7 no.2
    • /
    • pp.1-15
    • /
    • 2000
  • The World-Wide-Web have many advantages as a front-end of database systems. Hence in Internet applications, such as E-Commerce systems, the requirements for Web-based database applications have been increasing. In this work we propose a framework for java-based Web database applications-JaWAF(Java-based Web Application Framework). JaWAF has the 3-tier architecture of Client/Server, and consists of database gateway, application server, and communication and message component. When this framework is applied to the database applications developments, it can provide advantages, such as ease understanding and fast implementations of the Web applications. Thus we can build 3-tier Web-based database application systems with high scalability and distributed processing capability. Database gateway in JaWAF works as a daemon process that connects to the database systems and waits for requests from clients, and supports state-oriented service between clients and database servers. Hence the performance of Web applications could be increasing.

  • PDF

A Non-Agent based Identification Scheme for Identifying Database Users in 3-tier System Environments (3-tier 시스템 환경에서 비 에이전트 방식의 데이터베이스 사용자 식별 방안)

  • Han, Jung Sang;Shin, Dong Cheon
    • Journal of Information Technology Applications and Management
    • /
    • v.25 no.2
    • /
    • pp.147-159
    • /
    • 2018
  • The changes of internet environment have made services through web application server (WAS) popular. Accordingly, technical difficulties in identifying users who access databases through WAS were incurred. In order to solve these problems, many companies adopt an agent-based approach for identifying users by installing additional software on WAS. However, this approach must submit to some disadvantages in terms of cost, maintenance, and development process. In this paper, we devise an non-agent based approach for identifying database users in 3-tier environments.

Study of an Effective 3-Tier Structured Web Application Test (3-Tier 웹 어플리케이션에서의 효율적인 테스트에 관한 연구)

  • Lee, Jae-Won;Choi, Eun Man
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.273-276
    • /
    • 2004
  • 웹이 일상생활에서 널리 활용되고 웹 어플리케이션이 종래에 오프라인에서 이루어졌던 다양한 분야를 대신하면서 웹 어플리케이션에 접속하는 사용자가 급속히 증가되었다. 사용자의 급속한 증가는 다시금 웹 어플리케이션을 3-Tier 구조로 구성하여 안정적인 서비스 제공의 기반을 마련하게 만들었다. 그리고 개발된 3-Tier 웹 어플리케이션이 실질적으로 다수의 사용자에게 안정된 서비스를 제공할 수 있는지에 대한 테스트가 널리 수행되고 있다. 이러한 배경 하에서 이 논문은 3-Tier 웹 어플리케이션 테스트 수행 시 고려해야 할 요소들을 분석하고 3-Tier 웹 어플리케이션의 효율적인 성능 테스트 방안을 제시한다.

  • PDF

Automatic Generator for Component-Based Web Database Applications (컴포넌트 기반 웹 데이터베이스 응용의 자동 생성기)

  • Eum, Doo-Hun;Ko, Min-Jeung;Kang, I-Zzy
    • The KIPS Transactions:PartD
    • /
    • v.11D no.2
    • /
    • pp.371-380
    • /
    • 2004
  • E-commerce is in wide use with the rapid advance of internet technology. The main component of an e-commerce application is a Web-based database application. Currently, it takes a lot of time in developing Web applications since developers should write codes manually or semi-automatically for user interface forms and query processing of an application. Therefore, the productivity increase of Web-based database applications has been demanded. In this paper, we introduce a software tool, which we call the WebSiteGen2, that automatically generates the forms that we used as user interfaces and the EJB/JSP components that process the query made through the forms for an application that needs a new database or uses an existing database. The WebSiteGen2 thus increases the productivity, reusability, expandibility, and portability of an application by automatically generating a 3-tier application based on component technology. Moreover, one user interface form that are generated by the WebSiteGen2 provides information on an interested entity as well as information on all the directly or indirectly related entities with the interested one. In this paper, we explain the functionality and implementation of the WebSiteGen2 and then show the merits by comparing the WebSiteGen2 to the other commercial Web application generators.

Development of GIS Application using Web-based CAD (Web기반 CAD를 이용한 지리정보시스템 구현)

  • Kim, Han-Su;Im, Jun-Hong;Kim, Jae-Deuk;Shin, So-Eun
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.3 no.3
    • /
    • pp.69-76
    • /
    • 2000
  • This study deals with development GIS application using web-based CAD, this application serves to user, designer, manager that more convenient and various functions. Development to this application, collect attribute data from fieldwork and geographic data from cadastral map and aerial survey map and then development to user interface using HTML, JavaScript, ASP, Whip ActiveX control. This application's characters are as follows ; First, system designer designed that anyone who have basic knowledge about web and CAD can develop this application. A system structure simplification by 2-Tier. Geographic information use DWF(drawing web format) file and attribute information use DBMS in consideration of extension. Second, system manager can service independently GIS in Web need not high priced GIS engine, so more economical. Third, internet user get service GIS information and function that search of information, zoom in/out, pan, print etc., if you need more functions, add function without difficultly. Developed application as above, not only save volume but fast of speed as use vector data exclude character and image data. Also, this application can used by means of commercial and travel information service but also various GIS service of public institution and private in web.

  • PDF

An Analysis and Testing Method for Interoperability of Web Applications (웹 응용프로그램의 상호운용성 분석과 테스팅 방법)

  • Kim, Ik Su;Choi, Jong Myung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.1
    • /
    • pp.23-31
    • /
    • 2010
  • As the web technologies advance, most of applications have being developed as web applications. The web has advantages of high interoperability due to the web standards though the applications run on heterogenous platforms. However, as the systems are growing and have some interoperability problems, the government and the big companies require interoperability testing for new systems. In this paper, we introduce some interoperability issues for web applications and classify them into three groups according to 3-tier client/server architecture. We also propose interoperability testing process and tasks to be performed at each step in the process.

A Comparison Study for Optimal Implementation of the EDI Systems of Port Logistics (항만물류 EDI 시스템의 최적 구현을 위한 비교 분석)

  • 김현수;박남규;한계섭;최형림;조재형
    • The Journal of Information Systems
    • /
    • v.10 no.2
    • /
    • pp.103-128
    • /
    • 2001
  • At present, the EDI systems are indispensable software in port logistics industry. Currently, a monopolistic VAN/EDI service provider operates the EDI services. The current EDI client software has the 2-tier fat client/server architecture. However, the current EDI software is lack of Web interface and causes lots of cost for maintenance. Therefore, a variety of implementation architecture has been being tried by using script, XML and distributed object-oriented technology. Web/EDI and XML/EDI are the new EDI systems, However, the EDI systems have some limitations such as speed. This study intends to compare the variety implementation architecture for the EDI systems in the users' perspective and explore the strong and weak points of each architecture. We compared the EDI systems based on our experience of more than 2-years of implementation project for the EDI systems of port logistics. We categorized the EDI systems as client application EDI, Web EDI using script, XML/EDI, and 3-tier distributed object-oriented EDI system. We compared them with criteria such as speed, program maintenance, easiness of implementation and usage, security, and load balancing and fail-over. Finally we discuss the direction of optimal EDI system architecture for the future.

  • PDF

A Study on Traceback by WAS Bypass Access Query Information of DataBase (DBMS WAS 우회접속의 쿼리정보 역추적 연구)

  • Baek, Jong-Il;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.181-190
    • /
    • 2009
  • DBMS access that used high speed internet web service through WAS is increasing. Need application of DB security technology for 3-Tier about DBMS by unspecified majority and access about roundabout way connection and competence control. If do roundabout way connection to DBMS through WAS, DBMS server stores WAS's information that is user who do not store roundabout way connection user's IP information, and connects to verge system. To DBMS in this investigation roundabout way connection through WAS do curie information that know chasing station security thanks recording and Forensic data study. Store session about user and query information that do login through web constructing MetaDB in communication route, and to DBMS server log storing done query information time stamp query because do comparison mapping actuality user discriminate. Apply making Rule after Pattern analysis receiving log by elevation method of security authoritativeness, and develop Module and keep in the data storing place through collection and compression of information. Kept information can minimize false positives of station chase through control of analysis and policy base administration module that utilize intelligence style DBMS security client.