• Title/Summary/Keyword: Service-oriented System

Search Result 730, Processing Time 0.024 seconds

Construction of Environment Management System Based on ubiquitous (유비쿼터스기반의 환경 관제 시스템 구축)

  • Jeong, Chang-Won;Jang, Hyung-Geun;Joo, Su-Chong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.11
    • /
    • pp.195-204
    • /
    • 2010
  • In this paper, we propose an efficient indoor environment management system which provides the environment management service in ubiquitous computing environment. It is designed to gather data from the user's environment and keep it pleasant with respect to indoor air quality regulation. In order to offer such service Ubiquitous Computing Environment used distributed framework based on the active model for its development and support, while supporting service integration and also we used service oriented architecture. In order to verify the performance of the environment management system, components showed operation while environment management service showed the result through GUI screen.

A Study on the Integrated Civil Service Model of the Next e-Government (차세대 전자정부의 대민통합서비스 모델 연구)

  • Noh, Kyoo-Sung;Jung, Jin-Taek
    • Journal of Digital Convergence
    • /
    • v.6 no.2
    • /
    • pp.13-21
    • /
    • 2008
  • The e-Government in Korea has made such good results as improvement of official work productivity and citizen service quality. However, e-Government in Korea involves many problems and subjects to must solve, especially, at the side of citizen services. Every public organization as supplier provides each service of themselves to the civilians. Citizens feel inconvenience yet, because they must visit and are supplied various civil services to one public affair from several public institutions. When we consider the paradigm shift of the e-Government service, the status and problems of the e-Government in Korea required more better service model to the citizen. To realize the citizen oriented service, the integration and linkage of the system infrastructure and applications among governmental organizations are required. In this changed situation, when new one/non-stop service model of the digital government is developed and launched, the e-Government can supply better service to the citizens. In this study, the model that we suggest is among the new service models of the e-Government, named the Integrated Civil Service Model. The e-Government involving the Integrated Civil Service Model can make more outcome, such as better civil life convenience, cost-effective results by processing time and cost reduction for public affairs of citizens.

  • PDF

Performance Testing of Composite Web-Service with Aspect-Based WS-BPEL Extension

  • Kim, Jong-Phil;Sung, Dong-Hyuk;Hong, Jang-Eui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.10
    • /
    • pp.1841-1861
    • /
    • 2011
  • The advance in Service-Oriented Architecture (SOA) and web services has led to the development of new types of a system in which heterogeneous service components can connect and compose to solve a complex business problem. In the SOA, even though these service components are valid in their functionality, there is a need to test their behaviors when those services are composited. In recent years, WS-BPEL has received a wide acceptance as a means of integrating distributed service components. To test the composite service, the existing testing techniques have been focused on the functional features based on the WS-BPEL process. However as SOA approach is applying to real-time software development, the performance of composite service becomes one of important issues. This paper proposes a technique to the performance testing of a composite service with WS-BPEL extension which combined with the concept of aspect. Our WS-BPEL extension has been made towards annotating aspect component which is measuring the response time of the composite service. This paper also explains the procedure of performance testing with on-line transaction system. Our technique can apply to choose an adequate component in service composition with considering the performance among several candidate web service components.

Web-based Information Systems and Service Quality of IS Department

  • Lee Woongkyu
    • Proceedings of the Korea Association of Information Systems Conference
    • /
    • 2003.05a
    • /
    • pp.169-181
    • /
    • 2003
  • As growth of the web-based applications, the requirements of the users who have been very familiar to the web-based user interfaces and customer-oriented services on the Internet would become more knowledge-intensive and higher technology involved in a more convenient and polite way of service delivery. Therefore, the service quality of information system department should be considered as a very important factor influencing success of information systems. The objective of this study is to provide the relationship between service quality of IS department and its impacts such as use, user satisfaction and job performance. For this purpose, we provide a research model for it and test it empirically for the users of the corporate portal in one of main telecommunication service providers in Korea. In result, our model with satisfiable validity and reliability shows not only importance of IS departments' service quality but also two-faced characteristics of service quality. That is, while technical competence which means with knowledge and expertise of IS department staffs is more related with user satisfaction on information systems, personal service which means the way and manner of service delivery is more related with use of it.

  • PDF

A Business-Logic Separated Security Framework for Smart Banking (스마트 금융을 위한 비즈니스 로직과 분리된 보안프레임워크)

  • Seo, Dong-Hyun;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.4
    • /
    • pp.669-679
    • /
    • 2014
  • This study introduces server-side security-oriented framework for smart financial service. Most of domestic financial institutions providing e-banking services have employed server-side framework which implement service-oriented architecture. Because such architecture accommodates business and security requirements at the same time, institutions are struggling to cope with the security incidents efficiently. The thesis suggests that separating security areas from business areas in the frameworks makes users to be able to apply security policies in real time without considering how these policies may affect business transactions. Security-oriented frameworks support rapid and effective countermeasures against security threats. Furthermore, plans to avoid significant changes on existing system when institutions implement these frameworks are discussed in the report.

Empirical Research on Search model of Web Service Repository (웹서비스 저장소의 검색기법에 관한 실증적 연구)

  • Hwang, You-Sub
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.4
    • /
    • pp.173-193
    • /
    • 2010
  • The World Wide Web is transitioning from being a mere collection of documents that contain useful information toward providing a collection of services that perform useful tasks. The emerging Web service technology has been envisioned as the next technological wave and is expected to play an important role in this recent transformation of the Web. By providing interoperable interface standards for application-to-application communication, Web services can be combined with component-based software development to promote application interaction and integration within and across enterprises. To make Web services for service-oriented computing operational, it is important that Web services repositories not only be well-structured but also provide efficient tools for an environment supporting reusable software components for both service providers and consumers. As the potential of Web services for service-oriented computing is becoming widely recognized, the demand for an integrated framework that facilitates service discovery and publishing is concomitantly growing. In our research, we propose a framework that facilitates Web service discovery and publishing by combining clustering techniques and leveraging the semantics of the XML-based service specification in WSDL files. We believe that this is one of the first attempts at applying unsupervised artificial neural network-based machine-learning techniques in the Web service domain. We have developed a Web service discovery tool based on the proposed approach using an unsupervised artificial neural network and empirically evaluated the proposed approach and tool using real Web service descriptions drawn from operational Web services repositories. We believe that both service providers and consumers in a service-oriented computing environment can benefit from our Web service discovery approach.

A Study on the Intrustion Tolerance System Applied To the Security System

  • Shin Seung-jung;Kim Jung-tae;Ryu Dae-hyun;Na Jong-Whoa
    • Journal of information and communication convergence engineering
    • /
    • v.3 no.1
    • /
    • pp.38-42
    • /
    • 2005
  • The cyber attacks on the computer system in nowadays are focused on works that do not operate specific application. The main key point that we protect information security system has an access control to keep an application. Most of system has a main function to protect an infrastructure such as hardware, network and operating system. In this paper, we have presented an intrusion tolerance system that can service an application in spite of cyber attacks. The proposed system is based on the middle ware integrating security mechanism and separate function of application and intrusion tolerance. The main factor we use security system in nowadays is service to keep a persistency. The proposed intrusion tolerance system is applicable to such as medical, national defense and banking system.

A Study on the Intrusion Tolerance System Applied to the Object Oriented Middleware Environment

  • Shin Seung Jung;Kim Young Soo;Kim Jung Tae;Ryu Dae Hyun;Na Jong Whoa
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.693-698
    • /
    • 2004
  • The cyber attacks on the computer system in nowadays are focused on works that do not operate specific application. The main key point that we protect information security system has an access control to keep an application. Most of system has a main function to protect an infrastructure such as hardware, network and operating system. In this paper, we have presented an intrusion tolerance system that can service an application in spite of cyber attacks. The proposed system is based on the middle ware integrating security mechanism and separate function of application and intrusion tolerance. The main factor we use security system in nowadays is service to keep a persistency. The proposed intrusion tolerance system is applicable to such as medical, national defense and banking system.

  • PDF

Extended Use Case Modeling for Service-Oriented Computing (서비스 지향 컴퓨팅을 위한 확장 유스케이스 모델링)

  • Cho, Jun-Soo;Chong, Ki-Won
    • Journal of Internet Computing and Services
    • /
    • v.10 no.5
    • /
    • pp.153-163
    • /
    • 2009
  • It is necessary to identify the use cases of the supplier systems in order to define new service using their functions. Current use case modeling techniques, however, do not represent the external use cases clearly, because the external system is represented only by an actor. This ambiguity of the modeling technique declines the comprehensiveness of the model, and does not limit the scope of the target system explicitly. In this paper, we propose the extended use case modeling technique for service-oriented computing. This modeling technique enables the definition of external use cases and components. They are used to limit the boundary of the target system, and the relationship between them are modeled by the realization of external use cases. The proposed technique uses UML stereotype extension mechanism. so the compatibility with current use case modeling technique is preserved.

  • PDF

A Study on System Applications of e-CRM to Enforcement of consumer Service (e-Commerce 쇼핑몰의 소비자 서비스 강화를 위한 활용연구)

  • Kim Yeonjeong
    • Journal of the Korean Home Economics Association
    • /
    • v.43 no.3 s.205
    • /
    • pp.1-10
    • /
    • 2005
  • The purpose of this study was to investigate the enforcement strategy for Consumer Service marketing of an e-Commerce shopping mall. An e-CRM for a Cosmetic e-Commerce shopping mall, Data Warehousing(DW) component, analysis of data mining of the DW, and web applications and strategies had to developed for marketing of consumer service satisfaction. The major findings were as follows: An RFM analysis was used for consumer classification, which is a fundamental process of e-CRM application. The components of the DW were web sales data and consumer data fields. The visual process of consumer segmentations (superior consumer class) for e-CRM solutions is presented. The association analysis algorithm of data mining to up-selling and cross-selling indicates an association rule. These e-CRM results apply web DB marketing and operating principles to a shopping mall. Therefore, the system applications of e-CRM to Consumer services indicate a marketing strategy for consumer-oriented management.