• Title/Summary/Keyword: Software service

Search Result 2,457, Processing Time 0.03 seconds

A Study on a Framework for Customizing an Software as a Service (소프트웨어 서비스의 개별화 프레임워크)

  • Lee, Jihyun
    • Annual Conference of KIPS
    • /
    • 2013.11a
    • /
    • pp.918-920
    • /
    • 2013
  • 전통적인 소프트웨어 서비스 제공 환경에서는 응용 서비스 제공자가 테넌트들의 요구 사항에 맞춰진 서비스를 제공하기 위해 각각의 테넌트 별 응용을 개발하여 왔다. 그러나 소프트웨어 서비스(Software as a Service; SaaS) 환경에서는 테넌트마다 개별 응용을 생성하는 대신 공유되는 하나의 동일한 응용 객체와 결합할 수 있는 개별화 객체 생성 방법으로 테넌트들이 원하는 서비스를 제공하도록 서비스 제공 개념이 변하고 있다. 기업의 개별화 요구사항은 다양하기 때문에 SaaS 개별화에 관한 능숙한 이해가 필요하다. 현재까지의 SaaS 개별화에 관한 연구는 체계적이지 않고 초기 단계에 머물고 있는 상황이어서 본 논문은 SaaS 개별화에 대한 실직적 또는 개념적 구조를 제공하여 SaaS 개별화 연구의 확장 가능한 기초가 되고자 한다.

Content-based Movie Recommendation system based on demographic information and average ratings of genres. (사용자 정보 및 장르별 평균 평가를 이용한 내용 기반 영화 추천 시스템)

  • Ugli, Sadriddinov Ilkhomjon Rovshan;Park, Doo-Soon;Kim, Dae-Young
    • Annual Conference of KIPS
    • /
    • 2022.11a
    • /
    • pp.34-36
    • /
    • 2022
  • Over the last decades, information has increased exponentially due to SNS(Social Network Service), IoT devices, World Wide Web, and many others. Therefore, it was monumentally hard to offer a good service or set of recommendations to consumers. To surmount this obstacle numerous research has been conducted in the Data Mining field. Different and new recommendation models have emerged. In this paper, we proposed a Content-based movie recommendation system using demographic information of users and the average rating for genres. We used MovieLens Dataset to proceed with our experiment.

For the development of software industry, extensive software certification scheme (소프트웨어 산업의 발전을 위한 확장된 소프트웨어 인증체계)

  • Seo, Hee Suk;Kim, Sang Ho;Lee, Seung Jae
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.3
    • /
    • pp.121-129
    • /
    • 2010
  • For the development of software industry, offers an expanded software authentication scheme caused by the unauthorized copying of software is to reduce the damage to software developers, retail sales and to promote the development of the software industry was studied. Serial Number of the current software registration is conducted in such a simple verification procedure if the Serial Number only illegal and can be installed on multiple computers, such as program code to allow third parties to enter the Serial Number, or the extract can be used without is a reality. The proposed extension to the software authentication system when you install the software, my phone authentication and MAC Address Authentication Service introduced to distinguish normal user, the user of the MAC Address of the server and software development company that was sent to the registered MAC Address of the computer to be run only by the use of genuine software and to make unauthorized copies of software generated by the software developer can reduce the damage of the proposed plan.

A Ubiquitous Service Framework for Efficient Organizational Information Management (효율적인 기관 정보 관리를 위한 유비쿼터스 서비스 구조에 관한 연구)

  • Hwang Kwang-Il;Eom Doo-Seop;Hur Kyeong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.9B
    • /
    • pp.821-828
    • /
    • 2006
  • In this paper, we introduce a concrete, practical Ubiquitous Organizational Information (UOI) service framework, providing novice users intelligent and useful services respecting the environment. The UOI framework consists of hierarchical network architecture and is based on distributed sensor networks. To provide a rich array of services, the modular software framework and foundation software is designed. The UOI framework and foundation software is implemented on our hardware prototype. We define three representative UOI services and illustrate each service flow operating in our UOI network. In addition, we describe some details in the implementation of a distributed UOI network on the UOI test-bed.

An efficient and anonymous Chaotic Map based authenticated key agreement for multi-server architecture

  • Irshad, Azeem;Ahmad, Hafiz Farooq;Alzahrani, Bander A.;Sher, Muhammad;Chaudhry, Shehzad Ashraf
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5572-5595
    • /
    • 2016
  • Multi-server authentication enables the subscribers to enjoy an assortment of services from various service providers based on a single registration from any registration centre. Previously, a subscriber had to register from each service provider individually to avail respective services relying on single server authentication. In the past, a number of multi-server authentication techniques can be witnessed that employed lightweight and even computationally intensive cryptographic operations. In line with this, Zhu has presented a chaotic map based multi-server authentication scheme recently, which is not only vulnerable to denial-of-service attack, stolen-verifier attack, but also lacks anonymity. This research aims at improving the Zhu's protocol in terms of cost and efficiency. Moreover, the comparative study is presented for the performance of improved model against the existing scheme, and the security of proposed model is formally proved using BAN Logic.

Study on APT Penetration Analysis and Plan of Reaction for Secure XaaS (안전한 XaaS 구현을 위한 APT 공격 분석과 대응방안에 관한 연구)

  • Lee, Sun Ho;Kim, DaeYoub
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.5
    • /
    • pp.841-850
    • /
    • 2015
  • XaaS (Everything as a Service) provides re-usable, fine-grained software components like software, platform, infra across a network. Then users usually pay a fee to get access to the software components. It is a subset of cloud computing. Since XaaS is provided by centralized service providers, it can be a target of various security attacks. Specially, if XaaS becomes the target of APT (Advanced Persistent Threat) attack, many users utilizing XaaS as well as XaaS system can be exposed to serious danger. So various solutions against APT attack are proposed. However, they do not consider all aspects of security control, synthetically. In this paper, we propose overall security checkup considering technical aspect and policy aspect to securely operate XaaS.

A software-assisted comparative assessment of the effect of cement type on concrete carbonation and chloride ingress

  • Demis, S.;Papadakis, V.G.
    • Computers and Concrete
    • /
    • v.10 no.4
    • /
    • pp.391-407
    • /
    • 2012
  • Utilization of supplementary cementing materials (SCM) by the cement industry, as a highly promising solution of sustainable cement development aiming to reduce carbon dioxide emissions, necessitates a more thorough evaluation of these types of materials on concrete durability. In this study a comparative assessment of the effect of SCM on concrete durability, of every cement type as defined in the European Standard EN 197-1 is taking place, using a software tool, based on proven predictive models (according to performance-related methods for assessing durability) developed and wide-validated for the estimation of concrete service life when designing for durability under harsh environments. The effect of Type II additives (fly ash, silica fume) on CEM I type of cement, as well as the effect of every Portland-composite type of cement (and others) are evaluated in terms of their performance in carbonation and chloride exposure, for a service life of 50 years. The main aim is to portray a unified and comprehensive evaluation of the efficiency of SCM in order to create the basis for future consideration of more types of cement to enter the production line in industry.

End-to-End Quality of Service Constrained Routing and Admission Control for MPLS Networks

  • Oulai, Desire;Chamberland, Steven;Pierre, Samuel
    • Journal of Communications and Networks
    • /
    • v.11 no.3
    • /
    • pp.297-305
    • /
    • 2009
  • Multiprotocol label switching (MPLS) networks require dynamic flow admission control to guarantee end-to-end quality of service (QoS) for each Internet protocol (IP) traffic flow. In this paper, we propose to tackle the joint routing and admission control problem for the IP traffic flows in MPLS networks without rerouting already admitted flows. We propose two mathematical programming models for this problem. The first model includes end-to-end delay constraints and the second one, end-to-end packet loss constraints. These end-to-end QoS constraints are imposed not only for the new traffic flow, but also for all already admitted flows in the network. The objective function of both models is to minimize the end-to-end delay for the new flow. Numerical results show that considering end-to-end delay (or packet loss) constraints for all flows has a small impact on the flow blocking rate. Moreover, we reduces significantly the mean end-to-end delay (or the mean packet loss rate) and the proposed approach is able to make its decision within 250 msec.

Structural Analysis and Derivation of Vulnerability for BlockChain based System (블록체인 기반 시스템의 구조적 분석과 취약점 도출)

  • Kim, Jang-Hwan
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.1
    • /
    • pp.115-121
    • /
    • 2019
  • I analyzed the structure of a block-chain system and a block-chain-based service system. It is a decentralized book encryption system software technology that does not require a third party to secure trust between the two parties. Block chains are structured in a linked list structure. The block chain manage transaction information by blocking the transaction information, in conjunction with other blocks. As a result, I have discovered structural weaknesses in current block-chain systems and block-chain-based service systems. Once these possible structural problems are resolved, I expect that the block-chain-based service system will make various industrial contributions.

Development of the Reliability Evaluation Model and the Analysis Tool for Embedded Softwares (임베디드 소프트웨어 신뢰성 평가 모델 분석 툴 개발)

  • Seo, Jang-Hoon;Kim, Sun-Ho
    • IE interfaces
    • /
    • v.21 no.1
    • /
    • pp.109-119
    • /
    • 2008
  • Reliability of embedded softwares, as one of factors which affect system reliability, is the probability of failure-free software operation for a specified period of time in a specified environment. and Embedded software is different from general package software because hardware and operating system are tightly coupled to each other. Reliability evaluation models for embedded softwares currently used do not separate estimation and prediction models clearly, and even a standard model has not been proposed yet. In this respect, we choose a reliability estimation model suitable for embedded softwares among software evaluation models being used, and modified the model so as to accomodate recent software environments. In addtion, based on the model, the web-based reliability prediction tool RPX is developed. Finally, an embedded software is analyzed using the tool.