• Title/Summary/Keyword: JCA

Search Result 14, Processing Time 0.032 seconds

JCA(Java Connector Architecture) and the method to access databases using transaction optimization (JCA(Java Connector Architecture)와 트랜잭션 최적화를 통한 데이터베이스 접근 방법)

  • 서범수;김중배
    • Proceedings of the IEEK Conference
    • /
    • 2003.11b
    • /
    • pp.203-206
    • /
    • 2003
  • JCA(Java Connector Architecture)는 다양한 형태의 데이터 리소스들을 하나의 J2EE 서버에서 사용하기 위해 SUN 에서 제안한 리소스 연동 방안이다. JCA 는 J2EE 서버와 데이터베이스, ERP 등의 레거시 시스템을 연동하기 위해 필요한 다양한 인터페이스들을 제공한다. 이러한 인터페이스들은 데이터 소스로부터 커넥션을 얻기 위한 규약, 이때 필요한 접근 제어 및 인증 관련 규약, 그리고 커넥션과 연관된 트랜잭션에 대한 처리 방안을 제시하는 규약들로 구분된다. 본 논문에서는 JCA의 아키텍처에 대한 설명과 함께 데이터베이스 커넥션에 초점을 맞추어, 트랜잭션의 유무와 상이한 데이터베이스 접근에 따른 3가지 모델에 대해 논의한다.

  • PDF

Design and Implementation of Multi-functional Java Card for AMR (원격검침을 위한 다기능 자바카드 설계 및 구현)

  • Kang, Hwan-Soo;Cho, Jin-Hyung;Kwon, Kwi-Seok;Lee, Jong-Man;Kang, Hwan-Il
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.8
    • /
    • pp.64-72
    • /
    • 2009
  • AMR(Automatic Meter Reading), which means that it reads the meter of electricity, gas, or water, etc at a remote place automatically through wired or wireless communication, has been studied in terms of Power Line Communication method and Local Area Wireless Communication method, etc. In this paper, we designed and implemented JCA(Java Card for AMR) capable of AMR, which is based on java Card technology indispensable to the ubiquitous world. In this paper, JCA follows standard transactional procedures offered by power supply company and manages power usage log and billing data, and is designed in order to satisfy EMV multi-functional specifications. Because JCA is a multi-functional smart card capable of post-issuance applets as an open platform, it is installed into other applications of affiliated concerns as well as credit card and traffic card applications. Not only the proposed JCA is a low cost system, compared to other AMR systems, but is capable of paying rates in advance or later by applying authentication and security function of java Card. In addition the proposed JCA system can create value added services such as affiliated services with corporate alliance.

A Natural L-Arginine Analog, L-Canavanine-Induced Apoptosis is Suppressed by Protein Tyrosine Kinase p56lck in Human Acute Leukemia Jurkat T Cells (인체 급성백혈병 Jurkat T 세포에 있어서 L-canavanine에 의해 유도되는 세포자살기전에 미치는 단백질 티로신 키나아제 p56lck의 저해 효과)

  • Park, Hae-Sun;Jun, Do-Youn;Woo, Hyun-Ju;Rue, Seok-Woo;Kim, Sang-Kook;Kim, Kyung-Min;Park, Wan;Moon, Byung-Jo;Kim, Young-Ho
    • Journal of Life Science
    • /
    • v.19 no.11
    • /
    • pp.1529-1537
    • /
    • 2009
  • To elucidate further the antitumor effects of a natural L-arginine analogue, L-canavanine, the mechanism underlying apoptogenic activity of L-canavanine and its modulation by protein tyrosine kinase $p56^{lck}$ was investigated in human Jurkat T cells. When the cells were treated with 1.25 to 2.5 mM L-canavanine for 36 h, several apoptotic events including mitochondrial membrane potential (${\Delta\Psi}m$) loss, activation of caspase-9, -3, -8, and -7, poly (ADP-ribose) polymerase (PARP) degradation, and DNA fragmentation were induced without alteration in the levels of Fas or FasL. These apoptotic changes were more significant in $p56^{lck}$-deficient Jurkat clone JCaM1.6 than in $p56^{lck}$-positive Jurkat clone E6.1. The L-canavanine-induced apoptosis observed in $p56^{lck}$-deficient JCaM1.6 cells was significantly reduced by introducing $p56^{lck}$ gene into JCaM1.6 cells by stable transfection. Treatment of JCaM1.6/lck cells with L-canavanine caused a transient 1.6-fold increase in the kinase activity of $p56^{lck}$. Both FADD-positive wild-type Jurkat T cell clone A3 and FADD-deficient Jurkat T cell clone I2.1 exhibited a similar susceptibility to the cytotoxicity of L-canavanine, excluding involvement of Fas/FasL system in triggering L-canavanine-induced apoptosis. The L-canavanine-induced apoptotic sub-$G_1$ peak and activation of caspase-3, -8, and -7 were abrogated by pan-caspase inhibitor (z-VAD-fmk), whereas L-canavanine-induced activation of caspase-9 was not affected. These results demonstrated that L-canavanine caused apoptosis of Jurkat T cells via the loss of ${\Delta\Psi}m$, and the activation of caspase-9, -3, -8, and -7, leading to PARP degradation, and that the $p56^{lck}$ kinase attenuated the ${\Delta\Psi}m$ loss and activation of caspases, and thus contributed as a negative regulator to L-canavanine-induced apoptosis.

The Database Connection Management Architecture for E504 EJB Container System (E504 EJB 컨테이너 시스템의 데이터베이스 커넥션 관리 방법)

  • 서범수;김성훈;장철수;김중배
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10e
    • /
    • pp.148-150
    • /
    • 2002
  • EJB(Enterprise Java Bean)에서는 데이터베이스나 JMS(Java Message Service), 메일, ERP와 같은 외부 시스템 자원을 사용하기 위해 EJB 스펙은 JCA(Java Connector Architecture) 사용을 권장하고 있다. 본 논문에서는 E504(Enterprise 504) EJB 컨테이너가사용하는 여러 가지 자원 중 데이터베이스 커넥션에 초점을 맞추어 EJB 스펙에서 논의하고있는 리소스 관리 요구 사항과 JCA를 이용한 데이터베이스 커넥션 관리 방법 및 빈에서 발생 가능한 커넥션 요청 모델에 대해 논의한다.

  • PDF

ITU-T JCA-NID

  • Kim, Yong-Un;Kim, Hyeong-Jun;Lee, Jae-Seop
    • TTA Journal
    • /
    • s.107
    • /
    • pp.148-152
    • /
    • 2006
  • PDF

A study on a conceptual model of AI Capability's role to optimize duplication of defense AI requirements (국방 AI 소요의 중복 최적화를 위한 AI 능력(Capability)의 역할 개념모델 연구)

  • Seung Kyu Park;Joong Yoon Lee;Joo Yeoun Lee
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.19 no.1
    • /
    • pp.91-106
    • /
    • 2023
  • Multidimensional efforts such as budgeting, organizing, and institutionalizing are being carried out for the adoption of defense AI. However, there is little interest in eliminating duplication of defense resources that may occur during the AI adoption. In this study, we propose a theoretical conceptual model to optimize duplication of AI technology that may occur during the AI adoption in the vast defense field. For a systematic approach, the JCA of the US DoD and system abstraction method are applied, and the IMO logical structure is used to decompose AI requirements and identify duplication. As a result of analyzing the effectiveness of our conceptual model through six example defense AI requirements, it was found that the amount of requirements of data and AI technologies could be reduced by up to 41.7% and 70%, respectively, and estimated costs could be reduced by up to 35.5%.

Design and Implementation of Java Crypto Provider for Android Platform (안드로이드 플랫폼을 위한 자바 보안 프로바이더 설계 및 구현)

  • Son, Mikyung;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.9
    • /
    • pp.851-858
    • /
    • 2012
  • Java crypto library such as SUN JCA/JCE or BC JCE is generally used to implement secure applications for smart devices using Android platform. Programming functions written by Java language are launched and executed inside Java Virtual Machine (JVM), thereby difficult to use system hardware specific functionalities and degrading performance as well. In case of crypto primitive, few secure applications can use crypto primitive executing in JVM because both amount of computing and complexity of such primitives are very high. From the aspect of performance, in particular, time sensitive real time applications such as streaming services or secure application frequently applying public key based crypto algorithm cannot use Java crypto library. To solve the problem, we design and implement crypto library which employ JNI and NDK methods to directly access functions that implemented by native language such as C or C++. The proposed Java Crypto provider supports faster execution. Also developer can use our provider in the same way by writing traditional Java crypto library.

A Proposal for Establishing and Applying of the Joint Capability Management System (JCMS) (합동능력 관리체계 구축 및 활용 방안)

  • Lee, Jin-Woo;Lim, Byung-Youn;Lee, Tae-Gong;Park, Byung-Jin;Choi, Hangjoon
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.2
    • /
    • pp.187-199
    • /
    • 2014
  • The DoD of United State, the MoD of United Kingdom and NATO have developed and implemented not only the concepts of joint capability but also management system for the joint capability to respond the future uncertain operations effectively. The resources of the DoD in United State have been efficiently planning, programming, budgeting, execution and evaluation using the PPBEE system which developed based on the concept of joint capability. The joint capability of the DoD has been managing through the JCAMS (Joint Capability Area Management System) which constructed based on JCA, UJTL and so on. Recently the MND of Korea eager to try introducing concept of the JCMS and developing the JCMS like the JCAMS of DoD for the future joint operation in the uncertain environment. We propose the holistic mechanism to develop the JCMS (Joint Capability Management System) of MND which can implement during the constructing the JCMS of Korea efficiently and effectively.

The implementation of Block Cipher Algorithm Correctness Test Module (블록 암호 알고리즘 정확성 테스트 모듈 구현)

  • 정성민;박성근;김석우;서창호;김일준
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.564-568
    • /
    • 2002
  • 정보보호 평가는 크게 시스템 평가인 CC평가와 암호모듈 평가인 CMVP평가고 나눌 수 있다. 본 논문은 암호모듈 평가 방법으로 북미 CMVP의 3가지 블록 알고리즘시험방법인 KAT(Known Answer Test), MCT(Monte Calro Test), MMT(Multi-block Message Test)를 JAVA환경에 적용하여 시범 구현하였다. 대상 알고리즘은 CMVP의 4가지 블록 알고리즘(DES, TDES, AES, Skipjack)을, 테스트 방법으로 MOVS, TMOVS, AESAVS를 선정하여 FIPS표준을 적용하였다. 구현 환경으로는 JCA기반의 Cryptix를 채택하여 CMVP의 블록 암호 알고리즘 테스트 시스템 중 일부를 구현하였다.

  • PDF