• 제목/요약/키워드: Digital Access

Search Result 1,444, Processing Time 0.022 seconds

An Enhancing Caching Technique by the SOP(Shared Object Page) for Content Adaptation Systems (콘텐츠 적응화 시스템에 SOP(Shared Object Page)를 도입한 개선된 캐싱 기법)

  • Jang, Seo-Young;Jeong, Ho-Yeong;Kang, Su-Yong;Cha, Jae-Hyeok
    • Journal of Digital Contents Society
    • /
    • v.8 no.1
    • /
    • pp.41-50
    • /
    • 2007
  • People access web contain via PC and many other devices. In other words, not only they access information by a PC connected internet, but also they get information through a mobile phone, a PDA even D-TV. In this article, to resolve the problem, we suppose new web caching mechanism called 'SOP(Shared Object Page)'based on applying of meta data of web page information and storing adapted objects.

  • PDF

Developing Trend of an Ubiquitous Interface Technologies (유비쿼터스 인터페이스 기술의 개발 동향)

  • Lee, Hyeon-Jae;O, Chang-Heon
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2005.11a
    • /
    • pp.299-311
    • /
    • 2005
  • This article introduces developing trends of an "Ubiquitous Interface" as an access method for use of various network resources, such as public wireless networks and un-licensed wireless networks in ubiquitous sensor network environments, without troublesome settings or operations by users. "Ubiquitous Interface" is include a relatively wide sense meaning not only physical interface of specified device or between processors, but anything method for access USN. These "Ubiquitous Interface" able to provide seamless services that adapt autonomously to the user's movements and changes in the state of wireless resources. Recently, strongly recommended candidates are RFID, NFC, Multi-mode mobile terminal, Wearable computer and OSGi for integrated digital home networking system as a future ubiquitous interface. These candidates are have to have flexibility and multiple physical communication channel for seamless service hand over and serve easy connection at huge USN to user. And, must have flexible software structure and multi-functional middleware. Consequently, for more enhance performance of an ubiquitous interface and developing, need more structured and integrated future plan.

  • PDF

Broadcasting and Communication Convergent Network Based on MPEG-21: Design and Implementation of Multimedia Service Framework

  • Cho, Yong-Ju;Kim, Jae-Gon;Hong, Jin-Woo
    • ETRI Journal
    • /
    • v.28 no.5
    • /
    • pp.561-573
    • /
    • 2006
  • In this paper, we present a practical implementation of the MPEG-21 multimedia framework for broadcasting and communication convergent services. MPEG-21 standard technology was exploited to build a convergent service framework. Using this framework, a service model and several scenarios have been successfully designed and implemented. In addition, interoperability, which is the main objective of a multimedia framework, especially in a convergent environment consisting of heterogeneous networks and various types of devices, has been addressed in detail. The experimental results show that the implemented test bed provides a next-generation multimedia service; that is, universal multimedia access (UMA), meeting the requirements of a broadcasting and communication convergent environment.

  • PDF

Research Trends Analysis of Information Security using Text Mining (텍스트마이닝을 이용한 정보보호 연구동향 분석)

  • Kim, Taekyung;Kim, Changsik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.2
    • /
    • pp.19-25
    • /
    • 2018
  • With the development of IT technology, various services such as artificial intelligence and autonomous vehicles are being introduced, and many changes are taking place in our lives. However, if secure security is not provided, it will cause many risks, so the information security becomes more important. In this paper, we analyzed the research trends of main themes of information security over time. In order to conduct the research, 'Information Security' was searched in the Web of Science database. Using the abstracts of theses published from 1991 to 2016, we derived main research topics through topic modeling and time series regression analysis. The topic modeling results showed that the research topics were Information technology, system access, attack, threat, risk management, network type, security management, security awareness, certification level, information protection organization, security policy, access control, personal information, security investment, computing environment, investment cost, system structure, authentication method, user behavior, encryption. The time series regression results indicated that all the topics were hot topics.

A Study on Smart-Card Based User Authentication (스마트카드 기반의 사용자 인증 기법에 관한 연구)

  • Lee, Jaeyoung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.2
    • /
    • pp.27-33
    • /
    • 2018
  • User authentication scheme is a method for controlling unauthorized users' access to securely share the services and resources provided by the server and for verifying users with access rights. Initial user authentication scheme was based on passwords. Nowadays, various authentication schemes such as ID based, smart-card based, and attribute based are being researched. The study of Lee et al. suggested a user authentication scheme that provides forward secrecy and protects anonymity of users. However, it is vulnerable to attacks by outsiders and attackers who have acquired smart-cards. In this paper, we propose a modified smart-card authentication scheme to complement the weakness of the previous studies. The proposed user authentication scheme provides the security for the ID guessing attack and the password guessing attacks of the attacker who obtained the login request message and the user's smart-card.

A Comparative Analysis of Service Charge and Discount Scheme of ISDN Operators (ISDN 사업자들간 서비스 요금 및 할인체계 비교)

  • 김문수
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.9B
    • /
    • pp.1618-1634
    • /
    • 2000
  • ISDN, the beginning of broadband and multimedia service, is a digital network that provides integrated end-to-end digital telecommunication services for transmissions of different kinds of information, from voice and facsimiles to data and images. In Japan, Britain and U. S there has been shown the demand of ISDN is considerable and ISDN technology is becoming quite stable. Furthermore,their ISDN service experience helps them to set up and carry out the marketing strategies for Internet access services such as ADSL, Cable Modem and WLL, etc. This paper examines and compares services, charge and discount scheme of ISDN across 14 telecommunication carriers. It can be utilize as a reference for diffusing ISDN as well as developing Internet access services and marketing strategies.

  • PDF

Enhancement of Internal Control by expanding Security Information Event Management System

  • Im, DongSung;Kim, Yongmin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.8
    • /
    • pp.35-43
    • /
    • 2015
  • Recently, internal information leaks is increasing rapidly by internal employees and authorized outsourcing personnel. In this paper, we propose a method to integrate internal control systems like system access control system and Digital Rights Managements and so on through expansion model of SIEM(Security Information Event Management system). this model performs a analysis step of security event link type and validation process. It develops unit scenarios to react illegal acts for personal information processing system and acts to bypass the internal security system through 5W1H view. It has a feature that derives systematic integration scenarios by integrating unit scenarios. we integrated internal control systems like access control system and Digital Rights Managements and so on through expansion model of Security Information Event Management system to defend leakage of internal information and customer information. We compared existing defense system with the case of the expansion model construction. It shows that expanding SIEM was more effectively.

A Study on Database Access Control using Least-Privilege Account Separation Model (최소 권한 계정 분리 모델을 이용한 데이터베이스 엑세스 제어 연구)

  • Jang, Youngsu
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.3
    • /
    • pp.101-109
    • /
    • 2019
  • In addition to enabling access, database accounts play a protective role by defending the database from external attacks. However, because only a single account is used in the database, the account becomes the subject of vulnerability attacks. This common practice is due to the lack of database support, large numbers of users, and row-based database permissions. Therefore if the logic of the application is wrong or vulnerable, there is a risk of exposing the entire database. In this paper, we propose a Least-Privilege Account Separation Model (LPASM) that serves as an information guardian to protect the database from attacks. We separate database accounts depending on the role of application services. This model can protect the database from malicious attacks and prevent damage caused by privilege escalation by an attacker. We classify the account control policies into four categories and propose detailed roles and operating plans for each account.

A Model for Illegal File Access Tracking Using Windows Logs and Elastic Stack

  • Kim, Jisun;Jo, Eulhan;Lee, Sungwon;Cho, Taenam
    • Journal of Information Processing Systems
    • /
    • v.17 no.4
    • /
    • pp.772-786
    • /
    • 2021
  • The process of tracking suspicious behavior manually on a system and gathering evidence are labor-intensive, variable, and experience-dependent. The system logs are the most important sources for evidences in this process. However, in the Microsoft Windows operating system, the action events are irregular and the log structure is difficult to audit. In this paper, we propose a model that overcomes these problems and efficiently analyzes Microsoft Windows logs. The proposed model extracts lists of both common and key events from the Microsoft Windows logs to determine detailed actions. In addition, we show an approach based on the proposed model applied to track illegal file access. The proposed approach employs three-step tracking templates using Elastic Stack as well as key-event, common-event lists and identify event lists, which enables visualization of the data for analysis. Using the three-step model, analysts can adjust the depth of their analysis.

Augmented Reality Framework for Efficient Access to Schedule Information on Construction Sites (증강현실 기술을 통한 건설 현장에서의 공정 정보 활용도 제고 방안)

  • Lee, Yong-Ju;Kim, Jin-Young;Pham, Hung;Park, Man-Woo
    • Journal of KIBIM
    • /
    • v.10 no.4
    • /
    • pp.60-69
    • /
    • 2020
  • Allowing on-site workers to access information of the construction process can enable task control, data integration, material and resource control. However, in the current practice of the construction industry, the existing methods and scope is quite limited, leading to inefficient management during the construction process. In this research, by adopting cutting edge technologies such as Augmented Reality(AR), digital twins, deep learning and computer vision with wearable AR devices, the authors proposed an AR visualization framework made of virtual components to help on-site workers to obtain information of the construction process with ease of use. Also, this paper investigates wearable AR devices and object detection algorithms, which are critical factors in the proposed framework, to test their suitability.