• Title/Summary/Keyword: Remote access

Search Result 663, Processing Time 0.028 seconds

DEVELOPMENT OF ON-LINE DATA VISUALIZATION PROGRAM AND ITS APPLICATION (온-라인 데이터 가시화 프로그램의 개발과 그 적용)

  • Kang, S.H.;Kim, B.S.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2008.10a
    • /
    • pp.290-296
    • /
    • 2008
  • In this paper development of on-line data visualization program is described and some examples of data postprocessing are shown. The program is written in JAVA language and runs as a JAVA applet on the web browser such as Internet Explorer or Firefox. Remote users can use the program to visualize and analyze their own flow data by accessing the program server through the internet and loading data files in proper formats from their local computers. This paper describes briefly about algorithms for data visualization, structure and available functions of the program, and web sever system. The mechanism of how the JAVA applet can access and process local data files and relevant coding techniques are explained as well. Also explained is what is required for the remote users and client computers to access the program on-line. Some visualization examples performed on a local computer are illustrated by accessing the server remotely.

  • PDF

Integration of RPD Modules Using SOAP (SOAP을 이용한 쾌속제품개발모듈의 통합)

  • 김호찬;최홍태;김준안;이석희
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2003.06a
    • /
    • pp.38-41
    • /
    • 2003
  • Better understanding and sharing information are getting important to manage interdisciplinary product development team in a globally-distributed company. This study propose a solution to implement RPD(Rapid Product Development) system, focusing on rapid production process, for better understanding between development team members in different place and easy sharing of product information. The system developed by this research shows that SOAP(Simple Object Access Protocol) operates in distributed environment more efficiently than other RPC(Remote Procedure Call) techniques and it does not respond sensitively to firewall. And SOAP is an excellent RPC and messaging technique to exchange structured data. Procedures developed with use of SOAP are worked together with web, and users can use remote services as an application program in their computer.

  • PDF

Implementation of Storage Service Protocol on Infiniband based Network (인피니밴드 네트웍에서 RDMA 기반의 저장장치 서비스 프로토콜개발)

  • Joen Ki-Man;Park Chang-Won;Kim Young-Hwan
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2006.08a
    • /
    • pp.77-81
    • /
    • 2006
  • Because of the rapid increasing of network user, there are some problems to tolerate the network overhead. Recently, the research and technology of the user-level for high performance and low latency than TCP/IP which relied upon the kernel for processing the messages. For example, there is an Infiniband technology. The Infiniband Trade Association (IBTA) has been proposed as an industry standard for both communication between processing node and I/O devices and for inter-processor communication. It replaces the traditional bus-based interconnect with a switch-based network for connecting processing node and I/O devices. Also Infiniband uses RDMA (Remote DMA) for low latency of CPU and OS to communicate between Remote nodes. In this paper, we develop the SRP (SCSI RDMA Protocol) which is Storage Access Protocol on Infiniband network. And will compare to FC (Fibre Channle) based I-SCSI (Internet SCSI) that it is used to access storage on Etherent Fabric.

  • PDF

A Remote Password Authentication scheme for Multiple Centers on Network (네트워크내의 다중센타를 위한 원격 암호 인증기법)

  • Jo, In-June
    • The Journal of Natural Sciences
    • /
    • v.8 no.1
    • /
    • pp.131-136
    • /
    • 1995
  • In this paper, We propose an efficient remote password authentication scheme that enables network users to access and open distributed network. Our authentication Scheme provides a pair of a center-supplied password and a user key for a network user. The center-supplied password is generated on the center, and the user key can be chosen by the network user. Each network user can access multiple centers through the open and distributed network by using single super smart card. The passwords generated by network centers are sent to the network users via secure channel, and put into their own supper smart card by themselves.

  • PDF

Remote user Access control Mechanism in Smart Grid environments (스마트 그리드 환경을 위한 원격 사용자 접근제어 메커니즘)

  • Oh, Soo-Hyun;Eun, Sun-Ki
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.60 no.2
    • /
    • pp.416-422
    • /
    • 2011
  • Smart grid is the next generation intelligent power grid that combines the existing electric power infrastructure and information infrastructure. It can optimize the energy efficiency in both directions, suppliers and power consumers to exchange information in real time. In smart grid environments, with existing network security threats due to the smart grid characteristics, there are additional security threats. In this paper, we propose a security mechanism that provides mutual authentication and key agreement between a remote user and the device. The proposed mechanism has some advantages that provides secure mutual authentication and key agreement and secure against a replay attack and impersonation attacks.

Development of Very Large Image Data Service System with Web Image Processing Technology

  • Lee, Sang-Ik;Shin, Sang-Hee
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.1200-1202
    • /
    • 2003
  • Satellite and aerial images are very useful means to monitor ecological and environmental situation. Nowadays more and more officials at Ministry of Environment in Korea need to access and use these image data through networks like internet or intranet. However it is very hard to manage and service these image data through internet or intranet, because of its size problem. In this paper very large image data service system for Ministry of Environment is constructed on web environment using image compression and web based image processing technology. Through this system, not only can officials in Ministry of Environment access and use all the image data but also can achieve several image processing effects on web environment. Moreover officials can retrieve attribute information from vector GIS data that are also integrated with the system.

  • PDF

A Study on Zero Trust Building Process (제로 트러스트 구축 프로세스에 관한 연구)

  • Lee, Daesung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.464-466
    • /
    • 2021
  • Currently, most companies have security solutions such as firewalls or WAF (Web Application Firewall) for web services, cloud systems, and data centers. Recently, as the need for remote access increases, the task of overcoming the security vulnerabilities of remote access control is becoming more important. In this paper, the concept of the network security model from the perspective of zero trust and the strategy and security system using it will be reviewed.

  • PDF

Implementation of a Realtime Wireless Remote Control and Monitoring Systems (실시간 무선 원격 제어 및 모니터링 시스템의 구현)

  • Seong, Hae-Kyung;Lee, Moon-Goo
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.6
    • /
    • pp.93-102
    • /
    • 2010
  • Existing web based information service system solutions show limitations in mobile information services, as well as problems such as uncertain error messages, and difficulty providing swift assistance or real time emergency support. In order to solve these deficiencies, a realtime wireless remote control system has been designed and implemented in this thesis, which is capable of managing and monitoring remote systems using mobile communication devices (Mobile Phone, PDA, Smart Phone) for realtime control. Proposed systems are applied at remote places, for instance 'office building', and a nursery school like 'kindergarten'. In the case of implemented at office building, it can be managing and controlling at real time all sorts of the sensor information that are installed at office building system environment through wire(web environment) or wireless(mobile device). In the other case at kindergarten system that are providing the real-time wireless remote control and monitoring system can be monitoring activity of kindergarten children with a mobile phone of authentication user. The security functions of proposed systems include mobile device user authentication and target system access control. The proposed systems allow real-time user authentication function and system access control function that improve the security of resource administrators and mobile device users, and provides not only uninterrupted services, but also real time mobile service environments.

Biometric-based key management for satisfying patient's control over health information in the HIPAA regulations

  • Bui, Quy-Anh;Lee, Wei-Bin;Lee, Jung-San;Wu, Hsiao-Ling;Liu, Jo-Yun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.437-454
    • /
    • 2020
  • According to the privacy regulations of the health insurance portability and accountability act (HIPAA), patients' control over electronic health data is one of the major concern issues. Currently, remote access authorization is considered as the best solution to guarantee the patients' control over their health data. In this paper, a new biometric-based key management scheme is proposed to facilitate remote access authorization anytime and anywhere. First, patients and doctors can use their biometric information to verify the authenticity of communication partners through real-time video communication technology. Second, a safety channel is provided in delivering their access authorization and secret data between patient and doctor. In the designed scheme, the user's public key is authenticated by the corresponding biometric information without the help of public key infrastructure (PKI). Therefore, our proposed scheme does not have the costs of certificate storage, certificate delivery, and certificate revocation. In addition, the implementation time of our proposed system can be significantly reduced.

e-Science Technologies in Synchrotron Radiation Beamline - Remote Access and Automation (A Case Study for High Throughput Protein Crystallography)

  • Wang Xiao Dong;Gleaves Michael;Meredith David;Allan Rob;Nave Colin
    • Macromolecular Research
    • /
    • v.14 no.2
    • /
    • pp.140-145
    • /
    • 2006
  • E-science refers to the large-scale science that will increasingly be carried out through distributed global collaborations enabled by the Internet. The Grid is a service-oriented architecture proposed to provide access to very large data collections, very large scale computing resources and remote facilities. Web services, which are server applications, enable online access to service providers. Web portal interfaces can further hide the complexity of accessing facility's services. The main use of synchrotron radiation (SR) facilities by protein crystallographers is to collect the best possible diffraction data for reasonably well defined problems. Significant effort is therefore being made throughout the world to automate SR protein crystallography facilities so scientists can achieve high throughput, even if they are not expert in all the techniques. By applying the above technologies, the e-HTPX project, a distributed computing infrastructure, was designed to help scientists remotely plan, initiate and monitor experiments for protein crystallographic structure determination. A description of both the hardware and control software is given together in this paper.