• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.037 seconds

BDSS: Blockchain-based Data Sharing Scheme With Fine-grained Access Control And Permission Revocation In Medical Environment

  • Zhang, Lejun;Zou, Yanfei;Yousuf, Muhammad Hassam;Wang, Weizheng;Jin, Zilong;Su, Yansen;Kim, Seokhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1634-1652
    • /
    • 2022
  • Due to the increasing need for data sharing in the age of big data, how to achieve data access control and implement user permission revocation in the blockchain environment becomes an urgent problem. To solve the above problems, we propose a novel blockchain-based data sharing scheme (BDSS) with fine-grained access control and permission revocation in this paper, which regards the medical environment as the application scenario. In this scheme, we separate the public part and private part of the electronic medical record (EMR). Then, we use symmetric searchable encryption (SSE) technology to encrypt these two parts separately, and use attribute-based encryption (ABE) technology to encrypt symmetric keys which used in SSE technology separately. This guarantees better fine-grained access control and makes patients to share data at ease. In addition, we design a mechanism for EMR permission grant and revocation so that hospital can verify attribute set to determine whether to grant and revoke access permission through blockchain, so it is no longer necessary for ciphertext re-encryption and key update. Finally, security analysis, security proof and performance evaluation demonstrate that the proposed scheme is safe and effective in practical applications.

Design of a RDF Metadata System for the Searching of Application Programs (응용프로그램의 검색을 위한 RDF 메타데이터 시스템의 설계)

  • Yoo Weon-Hee;Kouh Hoon-Joon
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.6
    • /
    • pp.1-9
    • /
    • 2005
  • As the amount of data on the web increase, it is difficult to search what we want exactly. Therefore, much researches are attempted to search web resources efficiently. So, W3C established the standard that give meanings to resources on the web using RDF metadata. The RDF metadata had been mainly described a document data on the web. But it is difficult to create automatically the metadata for application programs than the document data. This paper proposes a method to use RDF metadata to search application programs. Firstly, we define RDF data model that stores the information of the application programs and RDF schema that references the RDF data model. And we design a prototype system to search application programs. This system meets expectation, getting the application to fullfill the needs of user, and has the efficiency of the searching function.

  • PDF

Development of a Web-Based Application for YWBS in Integrated Management Systems (세일요트 통합관리 시스템을 위한 웹기반 YWBS 설계 프로그램)

  • Lee, Dong Kun;Nam, Seung Hoon;Jeong, Yong Kuk;Shin, Jong Gye
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.39 no.1
    • /
    • pp.46-54
    • /
    • 2013
  • Recently, the marine leisure industry has begun to make a mark on the growth engines of the Korean economy. Hence, various government research projects are in progress to catch up with the fundamental yacht technologies of advanced countries. Research on the integrated management technologies of sail yachts is carried out as a part of those projects. Work Breakdown Structure (WBS) is a basic architecture for robust and high-level management systems. In this paper, we suggest a product-oriented Yacht Work Breakdown Structure (YWBS). General WBS has a drawback in that it can only follow the targeted purpose, but YWBS allows for a generic WBS approach. This concept allows us to apply WBS to multi-purpose uses. The YWBS is used as an infrastructure in information management and for data relationships in sail yacht management systems. YWBS is designed and managed by a web application, and the system is implemented with a website as a user interface. This application has not only a design function, but also a data transfer function that is based on the Microsoft Silverlight platform, a kind of Rich Internet Application (RIA) technology. Using this application, YWBS designers can communicate with the management system without added tasks like as uploading and updating.

File-System-Level SSD Caching for Improving Application Launch Time (응용프로그램의 기동시간 단축을 위한 파일 시스템 수준의 SSD 캐싱 기법)

  • Han, Changhee;Ryu, Junhee;Lee, Dongeun;Kang, Kyungtae;Shin, Heonshik
    • Journal of KIISE
    • /
    • v.42 no.6
    • /
    • pp.691-698
    • /
    • 2015
  • Application launch time is an important performance metric to user experience in desktop and laptop environment, which mostly depends on the performance of secondary storage. Application launch times can be reduced by utilizing solid-state drive (SSD) instead of hard disk drive (HDD). However, considering a cost-performance trade-off, utilizing SSDs as caches for slow HDDs is a practicable alternative in reducing the application launch times. We propose a new SSD caching scheme which migrates data blocks from HDDs to SSDs. Our scheme operates entirely in the file system level and does not require an extra layer for mapping SSD-cached data that is essential in most other schemes. In particular, our scheme does not incur mapping overheads that cause significant burdens on the main memory, CPU, and SSD space for mapping table. Experimental results conducted with 8 popular applications demonstrate our scheme yields 56% of performance gain in application launch, when data blocks along with metadata are migrated.

An Efficient Design Pattern Framework for Automatic Code Generation based on XML (코드 자동 생성을 위한 XML 기반의 효율적인 디자인패턴 구조)

  • Kim, Un-Yong;Kim, Yeong-Cheol;Ju, Bok-Gyu;Choe, Yeong-Geun
    • The KIPS Transactions:PartD
    • /
    • v.8D no.6
    • /
    • pp.753-760
    • /
    • 2001
  • Design Patterns are design knowledge for solving issues related to extensibility and maintainability which are independent from problems concerned by application, but despite vast interest in design pattern, the specification and application of patterns is generally assumed to rely on manual implementation. As a result, we need to spend a lot of time to develop software program not only because of being difficult to analyze and apply to a consistent pattern, but also because of happening the frequent programing faults. In this paper, we propose a notation using XML for describing design pattern and a framework using design pattern. We will also suggest a source code generation support system, and show a example of the application through this notation and the application framework. We may construct more stable system and be generated a compact source code to a user based on the application of structured documentations with XML.

  • PDF

Air-conditioning and Heating Time Prediction Based on Artificial Neural Network and Its Application in IoT System (냉난방 시간을 예측하는 인공신경망의 구축 및 IoT 시스템에서의 활용)

  • Kim, Jun-soo;Lee, Ju-ik;Kim, Dongho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.347-350
    • /
    • 2018
  • In order for an IoT system to automatically make the house temperature pleasant for the user, the system needs to predict the optimal start-up time of air-conditioner or heater to get to the temperature that the user has set. Predicting the optimal start-up time is important because it prevents extra fee from the unnecessary operation of the air-conditioner and heater. This paper introduces an ANN(Artificial Neural Network) and an IoT system that predicts the cooling and heating time in households using air-conditioner and heater. Many variables such as house structure, house size, and external weather condition affect the cooling and heating. Out of the many variables, measurable variables such as house temperature, house humidity, outdoor temperature, outdoor humidity, wind speed, wind direction, and wind chill was used to create training data for constructing the model. After constructing the ANN model, an IoT system that uses the model was developed. The IoT system comprises of a main system powered by Raspberry Pi 3 and a mobile application powered by Android. The mobile's GPS sensor and an developed feature used to predict user's return.

  • PDF

Development of The Controller for Taking Out Injection Molded Body in Fast (고속 사출물 취출을 위한 제어기 개발)

  • Song, Hwa-Jung;Lew, Kyeung-Seek;Kim, Tong-Deak
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.47 no.5
    • /
    • pp.1-8
    • /
    • 2010
  • Clients require easy to use of product and operating and industry safety according to the change of a market and a factory. For overcoming it, this paper developed controller of take-out robots that take high speed and superprecision and supplement a week point as use the system based on network. development controller classify teaching pendant and center server PC. Center server PC service the information about all process to supervisor. Teaching pendant is the bridge that service various faculties such as control, user recognition, metallic pattern operation to the user using injection molding. The controller development for taking out injection molded body classify software and hardware. The development of software is divided into three step which is application program, user interface and device driver. the simple device driver is not classified and included in application program. The hardware induce the touch panel and wireless network and construct the effective process control and internet connection. The inject ion cycle of existing system was five second but advanced system has the inner four cycle, process efficiency and product operation through wireless network.

An Exploratory Study on the Relationships of ASP Usage Pattern, Satisfaction, and Firm Performance: User Perspective in Korean Small Businesses (ASP 서비스 활용유형, 만족도, 기업성과의 관계에 대한 탐색적 연구: 국내 소기업 사용자 관점)

  • Kim, Sung-Hong;Kim, Jin-Han;Lee, Sang-Gun
    • Information Systems Review
    • /
    • v.7 no.1
    • /
    • pp.173-193
    • /
    • 2005
  • ASP service that is emerging as a new form of application outsourcing has the advantage of lower cost and risk. Therefore, ASP service may be attractive for small firms and even some new companies. However, studies about ASP service are rare in academic and professional journals, and most of the articles about outsourcing were considering mainly large enterprises. The purpose of this article is to analyze the effects of the some context variables of Korean small businesses on ASP service usage pattern, and the effect of ASP service usage pattern on user satisfaction and firm performance. The analysis results show that firm size has a positive impact on IT need of small businesses, and IT need of small businesses have a positive impact on training period and past usage period. Also, firm size, IT need, training period has an positive impact on ASP service usage pattern. However, ASP service usage period has no relationship on ASP service usage pattern. Finally, ASP service usage pattern has a positive impact on firm performance and user satisfaction, and user satisfaction has an impact on firm performance.

Password-Based Authentication Protocol for Remote Access using Public Key Cryptography (공개키 암호 기법을 이용한 패스워드 기반의 원거리 사용자 인증 프로토콜)

  • 최은정;김찬오;송주석
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.75-81
    • /
    • 2003
  • User authentication, including confidentiality, integrity over untrusted networks, is an important part of security for systems that allow remote access. Using human-memorable Password for remote user authentication is not easy due to the low entropy of the password, which constrained by the memory of the user. This paper presents a new password authentication and key agreement protocol suitable for authenticating users and exchanging keys over an insecure channel. The new protocol resists the dictionary attack and offers perfect forward secrecy, which means that revealing the password to an attacher does not help him obtain the session keys of past sessions against future compromises. Additionally user passwords are stored in a form that is not plaintext-equivalent to the password itself, so an attacker who captures the password database cannot use it directly to compromise security and gain immediate access to the server. It does not have to resort to a PKI or trusted third party such as a key server or arbitrator So no keys and certificates stored on the users computer. Further desirable properties are to minimize setup time by keeping the number of flows and the computation time. This is very useful in application which secure password authentication is required such as home banking through web, SSL, SET, IPSEC, telnet, ftp, and user mobile situation.

A Study of Web Application Attack Detection extended ESM Agent (통합보안관리 에이전트를 확장한 웹 어플리케이션 공격 탐지 연구)

  • Kim, Sung-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.161-168
    • /
    • 2007
  • Web attack uses structural, logical and coding error or web application rather than vulnerability to Web server itself. According to the Open Web Application Security Project (OWASP) published about ten types of the web application vulnerability to show the causes of hacking, the risk of hacking and the severity of damage are well known. The detection ability and response is important to deal with web hacking. Filtering methods like pattern matching and code modification are used for defense but these methods can not detect new types of attacks. Also though the security unit product like IDS or web application firewall can be used, these require a lot of money and efforts to operate and maintain, and security unit product is likely to generate false positive detection. In this research profiling method that attracts the structure of web application and the attributes of input parameters such as types and length is used, and by installing structural database of web application in advance it is possible that the lack of the validation of user input value check and the verification and attack detection is solved through using profiling identifier of database against illegal request. Integral security management system has been used in most institutes. Therefore even if additional unit security product is not applied, attacks against the web application will be able to be detected by showing the model, which the security monitoring log gathering agent of the integral security management system and the function of the detection of web application attack are combined.

  • PDF