• Title/Summary/Keyword: User Property

Search Result 380, Processing Time 0.025 seconds

DavSUDP: A Simple Protocol for Utilizing WebDAV User-defined Properties (DavSUDP: 웹데브 사용자 정의 속성의 활성화를 위한 단순 프로토콜)

  • Jung Hye-Young;Ahn Geon-Tae;Yu Yang-Woo;Park Yang-Soo;Lee Myung-Joon
    • The KIPS Transactions:PartC
    • /
    • v.12C no.1 s.97
    • /
    • pp.129-136
    • /
    • 2005
  • WebDAV extends the web communication protocol HTTP/1.1 to provide a distributed authoring and versioning across the Internet. A property management, the principal ability of WebDAV, has many advantages for managing and utilizing additional information of server resources as well as supports a role of storage. Most WebDAV Application systems currently available are using WebDAV for providing simple storage space, not for the functionality of property management. However, to develop an advanced application such as a collaborative system based on WebDAV, it is very important to design and utilize user-defined WebDAV properties. In this paper, we propose DavSUDP(WebDAV Simple User-defined Property Definition Protocol) that describes XML-based configurations representing WebDAV user-defined properties and their processing steps. DavSUDP enables WebDAV servers to effectively manage user-defined properties in developing WebDAV-based applications. To show this, we extended the Apache mod_dav module to support DavSVDP and developed the OpenSpace in the iPlace collaborative system using the extended Apache web server.

Perception and Evaluation of Quality of Hospital Information System (병원정보시스템 품질에 대한 인식 및 평가)

  • Lim, Jung-Do
    • The Korean Journal of Health Service Management
    • /
    • v.8 no.1
    • /
    • pp.1-13
    • /
    • 2014
  • The purpose of this study is to investigate the perception of quality property of hospital information system, the quality level, and its effects. The participants were 730 employees who are using hospital information system in hospitals. In order to analyze the relationship, the quality property regulates the consideration of user's taste and the state of user's favor for the design of hospital information system, and the quality level regulates user's convenience and properness. The main results from this study can be summarized as follows, First, the perception of quality property for hospital information system showed few significance level between occupation, but revealed significance level between position. The evaluation of quality level showed significance level depending on the occupation and position. Second, quality property which generally affects to the quality level of the hospital information system were different between types of occupation and quality factor.

A Study on the Need of the Usable Security in the Corelation between IT Security and User Experience

  • Lee, Soowook
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.9 no.4
    • /
    • pp.14-18
    • /
    • 2017
  • In this paper, an contemplate the direction for Usable Security in IT security and User Experience. To evaluate how the user interface is convenient to use, we examine the components such as the property, learnable property, memory simplicity, faults and satisfaction level. By considering for the security, we should bring positive effects on the user experience. By emphasizing usability and security at the same time, we should increase the satisfaction level of the user experience and then produce the valuable experience through participation, use and observation. The positive user experience is the important task for the software engineering, business administration and others., and this will result satisfaction of the users, brand trust, and success in the market. On the other hand, for the negative user experience, the users cannot achieve their desired goal and therefore, are unsatisfied due to emotional, rational and economic inconvenience. Due to this, we should try to maintain a certain level of usability and security of the system in IT security and User Experience.

USER-DEFINED PROPERTY SETS-BASED IFC EXTENSION FOR BRIDGE APPLICATION INFORMATION MODEL

  • Sang-Ho Lee;Sang Il Park;Munsu Yang
    • International conference on construction engineering and project management
    • /
    • 2013.01a
    • /
    • pp.433-436
    • /
    • 2013
  • This study suggests IFC-based bridge information modeling methods and its application model in BIM environment. Data model extension for bridge structure was achieved using user-defined property sets based on IFC framework. First, identification information was added. Bridge members are identified through physical and spatial semantic information added as property sets. Instances for semantic information were assigned according to standardized rules. Second, CO2 related factors were added for application information model. It can play a role to calculate and manage the quantity of CO2 emission. Third, properties for temporary structure to estimate and manage the construction cost were added. Finally, we investigated proposed methods through implementing the application information model of bridges.

  • PDF

Anonymity-Based Authenticated Key Agreement with Full Binding Property

  • Hwang, Jung Yeon;Eom, Sungwook;Chang, Ku-Young;Lee, Pil Joong;Nyang, DaeHun
    • Journal of Communications and Networks
    • /
    • v.18 no.2
    • /
    • pp.190-200
    • /
    • 2016
  • In this paper, we consider some aspects of binding properties that bind an anonymous user with messages. According to whether all the messages or some part of the messages are bound with an anonymous user, the protocol is said to satisfy the full binding property or the partial binding property, respectively. We propose methods to combine binding properties and anonymity-based authenticated key agreement protocols. Our protocol with the full binding property guarantees that while no participant's identity is revealed, a participant completes a key agreement protocol confirming that all the received messages came from the other participant. Our main idea is to use an anonymous signature scheme with a signer-controlled yet partially enforced linkability. Our protocols can be modified to provide additional properties, such as revocable anonymity. We formally prove that the constructed protocols are secure.

Extending a WebDAV Protocol to Efficiently Support the Management of User Properties (사용자 속성 관리의 효율적 지원을 위한 WebDAV 프로토콜의 확장)

  • Jung Hye-Young;Kim Dong-Ho;Ahn Geon-Tae;Lee Myung-Joon
    • The KIPS Transactions:PartC
    • /
    • v.12C no.7 s.103
    • /
    • pp.1057-1066
    • /
    • 2005
  • WebDAV(Web-based Distributed Authoring and Versioning), a protocol which supports web-based distributed authoring and versioning, provides a standard infrastructure for asynchronous collaboration on various contents through the Internet. A WebDAV property management is a function to set and manage the main information of the resources as properties, and a user property, one kind of the WebDAV properties, has the ability to be freely defined by users. This free definition of user property makes it very useful to develop web-based applications like a collaboration system based on WebDAV However, with an existing WebDAV property management scheme, there is a limit to develop various applications. This paper describes a DavUP(WebDAV User property design Protocol) protocol which extended the original WebDAV and its uti-lization which efficiently supports management of WebDAV user properties. DavUP needs the definition of the collection structure and type definition properties for an application. To do this, we added a new header md appropriated WebDAV method functions to the WebDAV protocol. To show the usefulness of DavUP protocols, we extended our DAVinci WebDAV server to support DavUP Protocols and experimentally implemented a general Open Workspace, which provides effective functions to share and exchange open data among general users, on the DAVinci.

Developing a User Property Metadata to Support Cognitive and Emotional Product Design (인지·감성적 제품설계 지원을 위한 사용자 특성정보 메타데이터 구축)

  • Oh, Kyuhyup;Park, Kwang Il;Kim, Hee-Chan;Kim, Woo Ju;Lee, Soo-Hong;Ji, Young Gu;Jung, Jae-Yoon
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.4
    • /
    • pp.69-80
    • /
    • 2016
  • Cognitive and emotional product design is becoming crucial because the technology gap decreases more and more. Product design guidelines and the corresponding database are therefore needed to support sensing (e.g. sight, hearing, touch), cognition (e.g. attention, memory) and emotion (e.g. aesthetics, functionality) which users feel differently according to their genders and ages. The user property information which is extracted from various experiments can be used as critical criteria in product design and evaluation, and it is necessary to develop the integrated database of cognition and emotion where to store the user property information. In this research, we design the user property metadata for supporting cognitive and emotional product design and then develop a prototype system. The metadata is designed to reflect the classification of cognition and emotion by investigating and classifying the previous studies related to sensing, cognition and emotion. The user property information is designed in RDF (Resource Description Framework), and a prototype system is developed to store user property information of cognition and emotion based on the designed metadata.

Development of a Computer Program to Calculate Thermodynamic Properties of Nitrogen (질소의 열역학 상태량 계산을 위한 전산 프로그램 개발)

  • Park, Kyoung-Kyhn
    • Proceedings of the KSME Conference
    • /
    • 2003.04a
    • /
    • pp.1667-1671
    • /
    • 2003
  • A computer program to calculate properties of nitrogen is developed. Procedures for the calculation is briefly discussed. The program calculates unknown thermodynamic properties fixing the state with two independent input properties. If input value by user is inappropriate, it displays an error message and replaces the input value with an appropriate one. In addition user can change units with easy. The program developed in this work can be utilized to calculate parameters required for the simulation and design of an equipment using nitrogen.

  • PDF

Development of a Computer Program to Calculate Thermodynamic Properties of Oxygen (산소의 열역학 상태량 계산을 위한 전산 프로그램 개발)

  • Park, Kyoung-Kuhn
    • Proceedings of the KSME Conference
    • /
    • 2003.11a
    • /
    • pp.256-260
    • /
    • 2003
  • A computer program to calculate thermodynamic properties of oxygen is developed. Procedures for the calculation is briefly discussed. The program calculates unknown thermodynamic properties fixing the state with two independent input properties. If input value by user is inappropriate, it displays an error message. In addition user can change units with easy. The program developed in this work can be utilized to calculate parameters required for the simulation and design of an equipment using oxygen.

  • PDF

Remote Login Authentication Scheme based on Bilinear Pairing and Fingerprint

  • Kumari, Shipra;Om, Hari
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.4987-5014
    • /
    • 2015
  • The bilinear pairing, also known as Weil pairing or Tate pairing, is widely used in cryptography and its properties help to construct cryptographic schemes for different applications in which the security of the transmitted data is a major concern. In remote login authentication schemes, there are two major requirements: i) proving the identity of a user and the server for legitimacy without exposing their private keys and ii) freedom for a user to choose and change his password (private key) efficiently. Most of the existing methods based on the bilinear property have some security breaches due to the lack of features and the design issues. In this paper, we develop a new scheme using the bilinear property of an elliptic point and the biometric characteristics. Our method provides many features along with three major goals. a) Checking the correctness of the password before sending the authentication message, which prevents the wastage of communication cost; b) Efficient password change phase in which the user is asked to give a new password after checking the correctness of the current password without involving the server; c) User anonymity - enforcing the suitability of our scheme for applications in which a user does not want to disclose his identity. We use BAN logic to ensure the mutual authentication and session key agreement properties. The paper provides informal security analysis to illustrate that our scheme resists all the security attacks. Furthermore, we use the AVISPA tool for formal security verification of our scheme.