• Title/Summary/Keyword: Weaknesses

Search Result 1,178, Processing Time 0.036 seconds

A Study on Librarians' Perspectives of Cloud Computing Service (사서의 클라우드 컴퓨팅서비스에 대한 인식 연구)

  • Kim, Se-Young;Kim, Seong-Hun;Oh, Sam-Gyun
    • Journal of Korean Library and Information Science Society
    • /
    • v.43 no.1
    • /
    • pp.241-259
    • /
    • 2012
  • The purpose of this study is to identify the notion, types and best practices of cloud computing service through a literature review and to analyze the librarians' perceptions of cloud computing service on the basis of a survey. The survey sought to check the strengths and weaknesses of cloud computing service from librarians' perspectives and to find the specific areas where cloud computing service may be effective in libraries. Some key considerations in the application of cloud computing services to library systems are also suggested.

Scratchpad Memory Architectures and Allocation Algorithms for Hard Real-Time Multicore Processors

  • Liu, Yu;Zhang, Wei
    • Journal of Computing Science and Engineering
    • /
    • v.9 no.2
    • /
    • pp.51-72
    • /
    • 2015
  • Time predictability is crucial in hard real-time and safety-critical systems. Cache memories, while useful for improving the average-case memory performance, are not time predictable, especially when they are shared in multicore processors. To achieve time predictability while minimizing the impact on performance, this paper explores several time-predictable scratch-pad memory (SPM) based architectures for multicore processors. To support these architectures, we propose the dynamic memory objects allocation based partition, the static allocation based partition, and the static allocation based priority L2 SPM strategy to retain the characteristic of time predictability while attempting to maximize the performance and energy efficiency. The SPM based multicore architectural design and the related allocation methods thus form a comprehensive solution to hard real-time multicore based computing. Our experimental results indicate the strengths and weaknesses of each proposed architecture and the allocation method, which offers interesting on-chip memory design options to enable multicore platforms for hard real-time systems.

Analysis of Security Weakness on Secure Deduplication Schemes in Cloud Storage (클라우드 스토리지에서 안전한 중복 제거 기법들에 대한 보안 취약점 분석)

  • Park, Ji Sun;Shin, Sang Uk
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.8
    • /
    • pp.909-916
    • /
    • 2018
  • Cloud storage services have many advantages. As a result, the amount of data stored in the storage of the cloud service provider is increasing rapidly. This increase in demand forces cloud storage providers to apply deduplication technology for efficient use of storages. However, deduplication technology has inherent security and privacy concerns. Several schemes have been proposed to solve these problems, but there are still some vulnerabilities to well-known attacks on deduplication techniques. In this paper, we examine some of the existing schemes and analyze their security weaknesses.

A Study on an Evaluation Model of Computer Aided Software Engineering Tools by Combining Data Envelopment Analysis With Analytic Hierarchy Process (DEA와 AHP를 혼용한 소프트웨어공학 지원도구 평가 모형 연구)

  • Lee, Jung-Sook;Kim, Woo-Je
    • Journal of Information Technology Services
    • /
    • v.8 no.2
    • /
    • pp.173-187
    • /
    • 2009
  • CASE tools are complex software products offering many different features. Systems professionals have evaluated various CASE products from a feature and attribute basis. Each product has a different mix of strengths and weaknesses as perceived by the end user. Specific CASE tools support different steps of the applications development process as well as varying methodologies. In this paper we develop a method for evaluating CASE tools. The model has an analytic hierarchy process for evaluating CASE tools in terms of functionality, management efficiency, and support ability of provider, and a data envelopment analysis for overall evaluation considering cost and AHP results. We applied the developed model to a real world case study.

A Study for Effectiveness of Preliminary Security Assessment on Online Game Service Domain (온라인게임 서비스 분야에 정보보호 사전진단 적용시 효과성에 관한 연구)

  • Yoo, Dong-Young;Seo, Dong-Nam;Kim, Huy-Kang;Choi, Jin-Young
    • Journal of Information Technology Services
    • /
    • v.10 no.2
    • /
    • pp.293-308
    • /
    • 2011
  • The preliminary security assessment is an information security process to analyze security weaknesses before beginning of services. Discovering security weakness through preliminary security assessment is highly required because it costs much when security incident occur in the middle of service operation. However, this assessment is not widely spread in the online game service domain yet. In this paper, we summarize the security risk existed in the online game service, and we classify the security requirements related to the each risk. Also, through the case study, we evaluated the effectiveness of preliminary security assessment in this domain. In addition, we suggest checklists that should be reviewed once in game-client side, network-side and game-server side for the purpose of security enhancement.

A Study on the Problem and Improvement of the Distribution System of Pharmaceuticals in Korea

  • Su, Shuai;Yun, Ye-Sol
    • The Journal of Industrial Distribution & Business
    • /
    • v.3 no.1
    • /
    • pp.25-29
    • /
    • 2012
  • The purpose of this study is to examine the development of the pharmaceutical distribution industry. The pharmaceutical industry is are expected to suffer a heavy blow when the Free Trade Agreement (FTA) is introduced, despite its best efforts. Therefore, adequate solutions must be found. Section II introduces the Korean pharmaceutical distribution system and its current situation; Section III explores the distribution system's strengths and weaknesses. Section IV, identifies the problem and possible solutions for the Korean pharmaceutical distribution system; Section V summarizes and concludes this paper and acknowledges its limitations. Finally, this paper has a clear limitation. The lack of objective information and scientific analysis due to the data being based on interviews with company representatives is its most significant shortcoming. However, it offers implications for new directions for future research.

  • PDF

Symmetric Key-Based Remote User Authentication Scheme With Forward Secrecy (순방향 안전성을 제공하는 대칭키 기반의 원격 사용자 인증 방식)

  • Lee, SungYup;Park, KiSung;Park, YoHan;Park, YoungHo
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.3
    • /
    • pp.585-594
    • /
    • 2016
  • Recently because of development of remote network technology, users are able to access the network freely without constraints of time and space. As users are getting more frequent to access the remote server in a computing environment, they are increasingly being exposed to various risk factors such as forward secrecy and server impersonation attack. Therefore, researches for remote user authentication scheme have been studying actively. This paper overcomes the weaknesses of many authentication schemes proposed recently. This paper suggests an improved authentication scheme that protects user's anonymity with preserving variable more safe and also provides forward secrecy.

The Strategy of Overseas Market Entry of Medical Device (의료기기의 해외시장 진출방안에 관한 연구)

  • Chung, Jaeho
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.1210-1215
    • /
    • 2009
  • The domestic medical device industry compared by advanced nations continues a quick growth, also the level of technique is gradually improving. However, the high import percentage, low investment, shortage of professional manpower and etc. are remained as weaknesses in the competitive circumstance. In this paper I researched world medical device market and industry, and tried to find the development plan of the domestic medical device. The approach could be in mid-long term rather than short-term, The institutional improvement and support of the government, the production complex, the market segmentation and overseas marketing reinforcement and etc. are necessary for export expansion plan.

  • PDF

ZigBee Device Management System using Web (웹을 이용한 지그비 디바이스 관리 시스템)

  • Choi, Yong-Soon;Kim, S.H.;Park, H.S.
    • Proceedings of the KIEE Conference
    • /
    • 2006.10c
    • /
    • pp.157-159
    • /
    • 2006
  • ZigBee technology that is observed to radio network of low electric power with latest WPAN's IEEE 802.15 .4 technologies is evaluated as best technology for sensor network and digital home network construction. This need exclusive use application for monitoring, managing, controlling and organizing this nodes. However, these program has weaknesses that is hard to construct flexible system with Internet. This paper will use web server linked with gateway to manage sensor network that is consisted of ZigBee node and design system that manages ZigBee device with relative fast responsibility using AJAX web technology.

  • PDF

Cryptanalysis of Improved Password Authentication Scheme with Smart Cards (스마트 카드에서 향상된 비밀번호 인증 암호해독기법)

  • Pathan, Al-Sakib Khan;Hong, Choong-Seon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06d
    • /
    • pp.101-104
    • /
    • 2008
  • The intent of this paper is to present the flaws and weaknesses of Kim et al.'s timestamp-based password authentication scheme using smart cards. We prove that, in spite of the improvement of Yang-Wang-Chang's scheme, Kim et al.'s solution is still vulnerable to a type of forgery attack. We also note down how the flaw could be overcome to ensure better level of security in remote client-server communication procedure.

  • PDF