• Title/Summary/Keyword: Access 응용 프로그램

Search Result 187, Processing Time 0.023 seconds

WOBR : A WebDAV-Based OSGi Bundle Repository Supporting Effective Group Access (WOBR : 효과적인 그룹별 접근을 지원하는 웹데브 기반의 OSGi 번들 저장소)

  • Park, Jong-Moon;Park, Yang-Soo;Lee, Myung-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.521-533
    • /
    • 2010
  • The OSGi framework is a java-based service platform that can be remotely managed, providing an application life cycle management model, a service registry and an execution environment. Based on the framework, various OSGi layers, APIs, and services have been defined. A bundle is an application that can be executed in the OSGi framework, deployed through a bundle repository. Usually, bundles in the repository are accessible via a designated web page. Unfortunately, the current bundle repositories do not provide any kind of group access services and dynamic bundle installation and deployment. In this paper, we describe a WebDAV-Based OSGi bundle repository named WOBR, which supports effective group-based accesses. WOBR is composed of a WOBR bundle repository, a management bundle and an access bundle that interact with the bundle repository. The management bundle is for configuration of the WOBR bundle repository, managing group access facility to the repository. The access bundle provides access to the repository and search mechanism for the bundles. Additionally, it provides the life cycle management of the installed bundles on the local environment.

An Entity Attribute-Based Access Control Model in Cloud Environment (클라우드 환경에서 개체 속성 기반 접근제어 모델)

  • Choi, Eun-Bok
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.10
    • /
    • pp.32-39
    • /
    • 2020
  • In the large-scale infrastructure of cloud environment, illegal access rights are frequently caused by sharing applications and devices, so in order to actively respond to such attacks, a strengthened access control system is required to prepare for each situation. We proposed an entity attribute-based access control(EABAC) model based on security level and relation concept. This model has enhanced access control characteristics that give integrity and confidentiality to subjects and objects, and can provide different services to the same role. It has flexibility in authority management by assigning roles and rights to contexts, which are relations and context related to services. In addition, we have shown application cases of this model in multi service environment such as university.

Performance Comparison of Synchronization Methods for CC-NUMA Systems (CC-NUMA 시스템에서의 동기화 기법에 대한 성능 비교)

  • Moon, Eui-Sun;Jhang, Seong-Tae;Jhon, Chu-Shik
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.27 no.4
    • /
    • pp.394-400
    • /
    • 2000
  • The main goal of synchronization is to guarantee exclusive access to shared data and critical sections, and then it makes parallel programs work correctly and reliably. Exclusive access restricts parallelism of parallel programs, therefor efficient synchronization is essential to achieve high performance in shared-memory parallel programs. Many techniques are devised for efficient synchronization, which utilize features of systems and applications. This paper shows the simulation results that existing synchronization methods have inefficiency under CC-NUMA(Cache Coherent Non-Uniform Memory Access) system, and then compares the performance of Freeze&Melt synchronization that can remove the inefficiency. The simulation results present that Test-and-Test&Set synchronization has inefficiency caused by broadcast operation and the pre-defined order of Queue-On-Lock-Bit (QOLB) synchronization to execute a critical section causes inefficiency. Freeze&Melt synchronization, which removes these inefficiencies, has performance gain by decreasing the waiting time to execute a critical section and the execution time of a critical section, and by reducing the traffic between clusters.

  • PDF

Supporting X Applications through the Firewall (방화벽을 통한 X 응용프로그램의 지원에 관한 연구)

  • Lee, Dong-Heon;Hong, Chang-Yeol;Kim, Yeong-Gon;Park, Yang-Su;Lee, Myeong-Jun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.5
    • /
    • pp.1319-1326
    • /
    • 1997
  • The Internet is a very convenient neteork, but not always a So.many orvanizations often require administrative security policies when they want to connect with ther organizations thtough a pubic network.A firewall is one way of protecting an internal network from the untrusted extemal network with a mechanism for selectively permiting or blocking traffic between the intermal network and the extermal network. The firewall also provides some limited Intemet access such as Ftp.Telet, etc.Usually , through a firewall system, X applications running on the extermal network may not access an X display on the intermal network.Thus, X applications run-ning on the extemal network are not supported through the usual firewall.In this paper, we propose a method of suppoting X application programs effedtively dffectvely through the firewall, overcoming this restriction.

  • PDF

Implementation of an Integrated Access Control Rule Script Language and Graphical User Interface for Hybrid Firewalls (혼합형 침입차단시스템을 위한 통합 접근제어 규칙기술 언어 및 그래픽 사용자 인터페이스 구현)

  • 박찬정
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.1
    • /
    • pp.57-70
    • /
    • 1999
  • Since a hybrid firewall filters packets at a network layer along with providing gateway functionalities at an application layer, it has a better performance than an If filtering firewall. In addition, it provides both the various kinds of access control mechanisms and transparent services to users. However, the security policies of a network layer are different from those of an application layer. Thus, the user interfaces for managing a hybrid firewalls in a consistent manner are needed. In this paper, we implement a graphical user interface to provide access control mechanisms and management facilities for a hybrid firewall such as log analysis, a real-time monitor for network traffics, and the statisics on traffics. And we also propose a new rule script language for specifying access control rules. By using the script language, users can generate the various forma of access control rules which are adapted by the existing firewalls.

Development of a Building Energy Demand Estimator (건물 단지에 대한 에너지 수요 예측 프로그램 개발)

  • Chung, Mo;Park, Hwa-Choon;Im, Yong-Hoon
    • 한국태양에너지학회:학술대회논문집
    • /
    • 2009.04a
    • /
    • pp.127-132
    • /
    • 2009
  • A Microsoft Access application program is developed to calculate energy demands for a Community Energy System (CES) composed of various types of buildings. The field-measured heating, hot water, cooling, and electricity energy consumptions for 14 types of building are systematically organized in forms of database and hourly loads for a span of year (8760 hours) are generated through an automated statistical procedure. User-friendly standard windows interfaces are provided to assist non-expert end users.

  • PDF

Cache Sensitive T-tree Index Structure (캐시를 고려한 T-트리 인덱스 구조)

  • Lee Ig-hoon;Kim Hyun Chul;Hur Jae Yung;Lee Snag-goo;Shim JunHo;Chang Juho
    • Journal of KIISE:Databases
    • /
    • v.32 no.1
    • /
    • pp.12-23
    • /
    • 2005
  • In the past decade, advances in speed of commodity CPUs have iu out-paced advances in memory latency Main-memory access is therefore increasingly a performance bottleneck for many computer applications, including database systems. To reduce memory access latency, cache memory incorporated in the memory subsystem. but cache memories can reduce the memory latency only when the requested data is found in the cache. This mainly depends on the memory access pattern of the application. At this point, previous research has shown that B+ trees perform much faster than T-trees because B+ trees are more cache conscious than T-trees, and also proposed 'Cache Sensitive B+trees' (CSB. trees) that are more cache conscious than B+trees. The goal of this paper is to make T-trees be cache conscious as CSB-trees. We propose a new index structure called a 'Cache Sensitive T-trees (CST-trees)'. We implemented CST-trees and compared performance of CST-trees with performance of other index structures.

Page replication mechanism using adjustable DELAY counter in NUMA multiprocessors (NUMA 다중처리기에서 조정가능한 지연 카운터를 이용한 페이집 복사 기법)

  • 이종우;조유곤
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.33B no.6
    • /
    • pp.23-33
    • /
    • 1996
  • The exploitation of locality of reference in shared memory NUMA multiprocessors is one of the improtant problems in parallel processing today. In this paper, we propose a revised hardeare reference counter to help operating system to manage locality. In contrast to the previous one, the value of counter can abe adjusted dynamically and periodically to adapt the page replication policy to the various memory reference patterns of processors. We use execution-driven simulation of real applications to evaluate the effectiveness of our adjustable DELAY counter. Our main conclusijon is that by using the adjustable DELAY counter the t normalized average memory access costs and the variance of them become smaller for most applications than the previous one and more robust memory management policies can be provided for the operating systems.

  • PDF

Handheld Automation Hacking Tool Development Using Raspberry Pi 4 (라즈베리 파이 4를 이용한 소형 자동화 해킹 툴 개발)

  • Sang-Hoon Han;Byeong-Jo Kang;Yeong-Seop Lee;Eun-Soo Lee
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2024.01a
    • /
    • pp.477-478
    • /
    • 2024
  • 본 논문에서는 관련 지식이 없더라도 취약한 비밀번호를 사용하는 AP(Access Point)를 빠르고 편하게 점검할 수 있는 소형 해킹 장치를 제안한다. 터치 디스플레이를 이용한 입출력 장치의 통합으로 휴대성을 극대화시켰다. 필요한 정보를 특정하여 출력하고, 숫자 입력만으로 프로그램을 제어하며, AP의 보안 프로토콜 유형을 자동으로 인식하여 그에 맞는 공격을 시도하는 등의 사용자의 편의성을 고려한 프로그램 설계로 입력장치의 제한으로 인해 생길 수 있는 불편함을 해소하였다.

  • PDF

A 3D Memory System Allowing Multi-Access (다중접근을 허용하는 3차원 메모리 시스템)

  • 이형
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.9
    • /
    • pp.457-464
    • /
    • 2005
  • In this paper a 3D memory system that allows 17 access types at an arbitrary position is introduced. The proposed memory system is based on two main functions: memory module assignment function and address assignment function. Based on them, the memory system supports 17 access types: 13 Lines, 3 Rectangles, and 1 Hexahedron. That is, the memory system allows simultaneous access to multiple data in any access types at an arbitrary position with a constant interval. In order to allow 17 access types the memory system consists of memory module selection circuitry, data routing circuitry for READ/WRITE, and address calculation/routing circuitry In the point of view of a developer and a programmer, the memory system proposed in this paper supports easy hardware extension according to the applications and both of them to deal with it as a logical three-dimensional away In addition, multiple data in various across types can be simultaneously accessed with a constant interval. Therefore, the memory system is suitable for building systems related to ,3D applications (e.g. volume rendering and volume clipping) and a frame buffer for multi-resolution.