• Title/Summary/Keyword: PROV 모델

Search Result 6, Processing Time 0.024 seconds

A Study on Developing a Provenance Conceptual Model for Data-driven Electronic Records Based on Extending W3C PROV (PROV의 확장에 기초한 데이터형 전자기록의 출처 모델 연구)

  • Hyun, Moonsoo
    • The Korean Journal of Archival Studies
    • /
    • no.80
    • /
    • pp.5-41
    • /
    • 2024
  • This study was conducted to develop a provenance representation model for data-type electronic records. It supports the distinction between provenance and context for the creation and management of data-type electronic records. To express both, it aims to design an extensible provenance model. For this purpose, W3C PROV is utilized as a basic model, with P-Plan and ProvONE for designing prospective provenance area. Afterward, the provenance model was extended by mapping the record management requirements. The provenance model proposed in this study is designed to represent and connect both retrospective and prospective provenance of data-type electronic records. Based on this study, it is expected to discussing the concept of provenance in the records management and archival studies area and to extending the model in the future.

Trust Evaluation Scheme of Web Data Based on Provenance in Social Semantic Web Environments (소셜 시맨틱 웹 환경에서 프로버넌스 기반의 웹 데이터 신뢰도 평가 기법)

  • Yoon, Sangwon;Choi, Kitae;Park, Jaeyeol;Lim, Jongtae;Bok, Kyoungsoo;Yoo, Jaesoo
    • Journal of KIISE
    • /
    • v.43 no.1
    • /
    • pp.106-118
    • /
    • 2016
  • Recently, as the generation and sharing of web data have increased, the importance of a social semantic web that combines the semantic web and the social web has also been increasing. In this paper, we propose a trust evaluation scheme based on provenance by extending the PROV model in the social semantic web environment. The proposed scheme manages the provenance of web data and adds the necessary elements for trust evaluation in the PROV model of W3C. The extended PROV model supports data management and provenance tracing. The proposed trust evaluation scheme considers various parameters such as user trust, original data trust, and user evaluation. The evaluated trust is managed as provenance. When processing a query, the proposed scheme generates a result by considering the trust. Therefore, the proposed scheme can manage the provenance of web data and compute data trust correctly by using such various parameters. The evaluated trust becomes a criterion to determine whether the query result can be trusted or not. In order to show the validity of the proposed scheme, we verify its performance using SPARQL queries.

Provenance Compression Scheme Considering RDF Graph Patterns (RDF 그래프 패턴을 고려한 프로버넌스 압축 기법)

  • Bok, kyoungsoo;Han, Jieun;Noh, Yeonwoo;Yook, Misun;Lim, Jongtae;Lee, Seok-Hee;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.2
    • /
    • pp.374-386
    • /
    • 2016
  • Provenance means the meta data that represents the history or lineage of a data in collaboration storage environments. Therefore, as provenance has been accruing over time, it takes several ten times as large as the original data. The schemes for effciently compressing huge amounts of provenance are required. In this paper, we propose a provenance compression scheme considering the RDF graph patterns. The proposed scheme represents provenance based on a standard PROV model and encodes provenance in numeric data through the text encoding. We compress provenance and RDF data using the graph patterns. Unlike conventional provenance compression techniques, we compress provenance by considering RDF documents on the semantic web. In order to show the superiority of the proposed scheme, we compare it with the existing scheme in terms of compression ratio and the processing time.

Development of Vehicle LDW Application Service using AUTOSAR Platform on Multi-Core MCU (멀티코어 상의 AUTOSAR 플랫폼을 활용한 차량용 LDW 응용 서비스 개발)

  • Park, Mi-Ryong;Kim, Dongwon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.113-120
    • /
    • 2014
  • In this paper, we examine Asymmetric Multi-Processing Environment to provide LDW service. Asymmetric Multi-Processing Environment consists of high-speed MCU to support rapid image processing and low-speed MCU for controlling with other ECU at the control domain. Also we designed rapid image process application and LDW application Software Component(SW-C) according to the development process rule of AUTOSAR. To communicate between two MCUs, timer based polling based IPC was designed. Also to communicate with other ECUs(Electronic Control Units), we designed CAN messages to provide alarm information and receiving CAN message to catch the Turn signal. We confirm the possibility of the various ADAS development using an Asymmetric Multi-Processing Environment and AUTOSAR platform. We also expect providing ISO 26262 functional safety.

A Study on Application of Time-Triggered Ethernet for Vehicle Network (타임-트리거드 이더넷의 차량네트워크 적용 연구)

  • Park, Mi-Ryong;Yoon, Mihee;Na, Ke-Yeol;Kim, Dongwon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.79-88
    • /
    • 2015
  • In this paper, we examine Ethernet based vehicle network which is recently emerging technology. Current MOST for entertainment will be soon replaced with the emerging Ethernet based vehicle network. Although legacy standard Ethernet has several advantages it is not suitable for vehicle backbone network without any modification. As a result, many researches are happening on extending and modification of the Ethernet function for realtime and reliability. Time-triggered Ethernet, one of many trials known as AS6802, is investigated on the architecture and functionalities. We design the traffic model on Time-triggered Ethernet and analyse the latency of the network. We also consider the QoS requirement and environment of operating configuration for vehicle network.

A Traceback-Based Authentication Model for Active Phishing Site Detection for Service Users (서비스 사용자의 능동적 피싱 사이트 탐지를 위한 트레이스 백 기반 인증 모델)

  • Baek Yong Jin;Kim Hyun Ju
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.19-25
    • /
    • 2023
  • The current network environment provides a real-time interactive service from an initial one-way information prov ision service. Depending on the form of web-based information sharing, it is possible to provide various knowledge a nd services between users. However, in this web-based real-time information sharing environment, cases of damage by illegal attackers who exploit network vulnerabilities are increasing rapidly. In particular, for attackers who attempt a phishing attack, a link to the corresponding web page is induced after actively generating a forged web page to a user who needs a specific web page service. In this paper, we analyze whether users directly and actively forge a sp ecific site rather than a passive server-based detection method. For this purpose, it is possible to prevent leakage of important personal information of general users by detecting a disguised webpage of an attacker who induces illegal webpage access using traceback information