• Title/Summary/Keyword: Web technologies

Search Result 975, Processing Time 0.024 seconds

Stateless Randomized Token Authentication for Performance Improvement of OAuth 2.0 MAC Token Authentication (OAuth 2.0 MAC 토큰인증의 효율성 개선을 위한 무상태 난수화토큰인증)

  • Lee, Byoungcheon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1343-1354
    • /
    • 2018
  • OAuth 2.0 bearer token and JWT(JSON web token), current standard technologies for authentication and authorization, use the approach of sending fixed token repeatedly to server for authentication that they are subject to eavesdropping attack, thus they should be used in secure communication environment such as HTTPS. In OAuth 2.0 MAC token which was devised as an authentication scheme that can be used in non-secure communication environment, server issues shared secret key to authenticated client and the client uses it to compute MAC to prove the authenticity of request, but in this case server has to store and use the shared secret key to verify user's request. Therefore, it's hard to provide stateless authentication service. In this paper we present a randomized token authentication scheme which can provide stateless MAC token authentication without storing shared secret key in server side. To remove the use of HTTPS, we utilize secure communication using server certificate and simple signature-based login using client certificate together with the proposed randomized token authentication to achieve the fully stateless authentication service and we provide an implementation example.

A Meta-Model for Development Process of IoT Application by Using UML

  • Cho, Eun-Sook;Song, Chee-Yang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.1
    • /
    • pp.121-128
    • /
    • 2019
  • An Internet of Things(IoT) technology which provides intelligent services by combining context-awareness based intelligences, inter-communication is made of between things and things or between things and person through the network connected with intelligent things is spreading rapidly. Especially as this technology is converged into smart device, mobile, cloud, big data technologies, it is applied into various domains. Therefore, this is different from existing Web or Mobile Application. New types of IoT applications are emerging by adapting IoT into Web or mobile. Because IoT application is not only focused on software but also considering hardware or things aspect, there are limitations existing development process. Existing development processes don't consider analysis and design techniques considering both hardware and things. We propose not only a meta-model for development process which can support IoT application's development but also meta-models for main activities in this paper. Especially we define modeling elements by using UML's extension mechanisms, provide development process, and suggest design techniques how to apply those elements into IoT application's modeling phase. Because there are many types of IoT application's type, we propose an Android and Arduino-based on IoT application as a case study. We expect that proposed technique can be applied into many of various IoT application development and design with a form of flexible and extensible as well as main functionalities or elements are more concretely described. As a result, it brings IoT application's flexibility and the effect of quality improvement.

The Accessibility of Taif University Blackboard for Visually Impaired Students

  • Alnfiai, Mrim;Alhakami, Wajdi
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.258-268
    • /
    • 2021
  • Online learning systems are becoming an effective educational medium for many universities. The accessibility of online learning system in universities means that every student, including the visually impaired, is able use all the site's services. This research focuses on investigating the accessibility of online learning systems for visually impaired users. The paper purpose is to understand the perception of visually impaired undergraduate students towards Blackboard's accessibility and to make recommendations for a new Blackboard design with accessible features that support their needs. Impact of a new Blackboard design with accessible features on visually impaired students, using Taif University students as a case study is evaluated in this paper, as it is similar to most learning systems used by Saudi universities. A study on Taif University's utilization of Blackboard was conducted using mixed method approaches (an automatic tool and a user study). In the first phase, Taif's use of Blackboard was evaluated by the web accessibility tool called AChecker. In the second phase, we conducted a user study to verify previously discovered accessibility challenges to fully assess them according to the accessibility and usability guidelines. In this study, the accessibility of Taif University's Blackboard was evaluated by thirteen visually impaired undergraduate students. The results of the study show that Blackboard has accessibility issues, which are confusing navigation, incompatibility with assistive technologies, untitled pages or parts, unclear identification for visual elements, and inaccessible PDF files. This paper also introduces a set of recommendations that aim to improve the accessibility of Blackboard and other educational websites developed for this population. It also highlights the serious need for universities to enhance web accessibility for online learning systems for students with disabilities.

Visualization of the Intellectual Structure on the Internet of Things Focuses on the Industry 4.0 (제 4차 산업혁명 중심의 사물인터넷 지적 구조 시각화)

  • Hyaejung, Lim;Chang-Kyo, Suh
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.27 no.6
    • /
    • pp.127-140
    • /
    • 2022
  • With the recent development of the ICT (information and communication technology), the revolution of the industry has moved on from the third industry to the fourth. There is no doubt that the companies would not survive in the future without adopting these technologies. The purpose of this research is to analyze the intellectual structure of the internet of things(IoT) literature for the Industry 4.0 to suggest a better insight for the field. The data for this research is extracted from the Web of Science database. Total of 1,631 documents and 72,754 references are used for the research with the analysis program CiteSpace. Author co-citation analysis is used to analyze the intellectual structure and performed clustering, timeline and burst detection analysis. We identified 12 sub-areas of IoT for the Industry 4.0 which are 'Supply Chain', 'Digital Twin', 'Smart Manufacturing System' and etc. Through the timeline analysis we can find out which clusters will increase or decrease its reputation. As concluding remarks, limitations and further research suggestions are discussed.

Introducing Smart Learning Framework in the Digital World: Towards the Enhancement of Technology-Driven Innovation of Arabic Smart Learning

  • Alkhammash, Eman H.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.331-337
    • /
    • 2022
  • Smart learning is augmented with digital, context-aware, and adaptable technologies to encourage students to learn better and faster. To ensure that digital learning is successful and that implementation is efficient, it is critical that the dimensions of digital learning are arranged correctly and that interactions between the various elements are merged in an efficient and optimal manner. This paper builds and discusses a basic framework for smart learning in the digital age, aimed to improve students' abilities and performance in learning. The proposed framework consists of five dimensions: Teacher, Technology, Learner, Digital content, and Evaluation. The Teacher and Learner dimensions operate on two levels: (a) an abstract level to fit in knowledge and skills or interpersonal characteristics and (b) a concrete level in the form of digital devices used by teachers and learners. Moreover, this paper proposes asynchronous online course delivery model. An Arabic smart learning platform has been developed, based on these smart learning core dimensions and the asynchronous online course delivery model, because despite the official status of this language in many countries, there is a lack of Arabic platforms to teach Arabic. Moreover, many non-native Arabic speakers around the world have expressed an interest in learning it. The Arabic digital platform consists of over 70 lessons classified into three competence levels: beginner, intermediate, and advanced, delivered by Arabic experts and Arabic linguists from various Arab countries. The five dimensions are described for the Arabic platform in this paper. Learner dimension is the Arabic and non-Arabic speakers, Teacher dimension is Arabic experts and Arabic linguistics, Technology dimension consists of technology for Arabic platform that includes web design, cloud computing, big data, etc. The digital contents dimension consists of web-based video, records, etc. The evaluation dimension consists of Teachers rating, comments, and surveys.

A Study on eGovFrame Security Analysis and Countermeasures (eGovFrame 보안 분석 및 대응 방안에 관한 연구)

  • Joong-oh Park
    • Journal of Industrial Convergence
    • /
    • v.21 no.3
    • /
    • pp.181-188
    • /
    • 2023
  • The e-Government standard framework provides overall technologies such as reuse of common components for web environment development such as domestic government/public institutions, connection of standard modules, and resolution of dependencies. However, in a standardized development environment, there is a possibility of updating old versions according to core versions and leakage of personal and confidential information due to hacking or computer viruses. This study directly analyzes security vulnerabilities focusing on websites that operate eGovFrame in Korea. As a result of analyzing/classifying vulnerabilities at the internal programming language source code level, five items associated with representative security vulnerabilities could be extracted again. As a countermeasure against this, the security settings and functions through the 2 steps (1st and 2nd steps) and security policy will be explained. This study aims to improve the security function of the e-government framework and contribute to the vitalization of the service.

Implementation of ROS-Based Intelligent Unmanned Delivery Robot System (ROS 기반 지능형 무인 배송 로봇 시스템의 구현)

  • Seong-Jin Kong;Won-Chang Lee
    • Journal of IKEEE
    • /
    • v.27 no.4
    • /
    • pp.610-616
    • /
    • 2023
  • In this paper, we implement an unmanned delivery robot system with Robot Operating System(ROS)-based mobile manipulator, and introduce the technologies employed for the system implementation. The robot consists of a mobile robot capable of autonomous navigation inside the building using an elevator and a Selective Compliance Assembly Robot Arm(SCARA)-Type manipulator equipped with a vacuum pump. The robot can determines the position and orientation for picking up a package through image segmentation and corner detection using the camera on the manipulator. The proposed system has a user interface implemented to check the delivery status and determine the real-time location of the robot through a web server linked to the application and ROS, and recognizes the shipment and address at the delivery station through You Only Look Once(YOLO) and Optical Character Recognition(OCR). The effectiveness of the system is validated through delivery experiments conducted within a 4-story building.

Research of applied u-Health system using Inference Algorithm (추론 알고리즘을 적용한 유헬스 시스템 연구)

  • Shin, Su-Hong;Kim, Woo-Sung;Choi, Suny
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.11
    • /
    • pp.5518-5524
    • /
    • 2012
  • The world today, has come to an age of diverse paradigms and technologies being developed, and technology of a new field is realized by merging technologies of different fields.One of such, u-Health system refers to a system which can monitor its users, regardless of time and place, using many body sensor datas based on USN (Ubiquitous Sensor Network). In the past, this kind of u-Health system was able to collect sensor datas through wires and could be monitored only by using PC (Personal Computer), but with development in technology, the system is now becoming possible to collect sensor datas wireless and monitor unhindered by time and place. This research aims to collect sensor datas of the user, and through Jena inference network, provide web service and smartphone application which enables checking of user's body datas in times of emergency, whenever, wherever.

A Roadmap Establishment for the Acceptance of Land Development Earthwork Construction Automation Technology (단지조성 토공분야 건설 자동화 기술 도입을 위한 로드맵 수립)

  • Im, Dong Heui;Yun, Hee-Cheon;Kim, Seok-Kyu;Seo, Jongwon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.39 no.6
    • /
    • pp.893-901
    • /
    • 2019
  • Land development is an essential process to provide lands for housing, industrial, and tourism complex. The development and application of construction automation technology in land development construction are, however, not matured yet. Since land development requires massive investment in terms of cost and effort, the benefits of implementing earthwork construction automation technology could also be enormous. As such, the deployment of advanced technology needs to be assessed. In this paper, by investigating domestic and international advanced earthwork technology, 8 candidate technologies to be developed is derived. These technologies are then prioritized using AHP and web-based survey that distributed to experts in the field of civil and infrastructure. As a result, advanced earthwork fleet management platformization and tele-operation systems for unmanned earthwork are identified as the top priority. Besides through sensitivity analysis, the trends of the technology rank by the weight distribution of the evaluation factor is investigated. Consequently, the research and development processes for the earthwork construction automation technology in land development are explored and based on the results, the research and development road map plan is established.

The Research for Cyber Security Experts (사이버보안 전문가 양성을 위한 연구)

  • Kim, Seul-gi;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.6
    • /
    • pp.1137-1142
    • /
    • 2017
  • Cyber hacking attacks and cyber terrorism are damaging to the lives of the people, and in the end, national security is threatened. Cyber-hacking attacks leaked nuclear power cooling system design drawings, cyber accidents such as hacking of Cheongwadae's homepage and hacking of KBS stations occurred. The Act on Information and Communication Infrastructure Protection, Promotion of Information and Communication Network Utilization and Information Protection, and the Personal Information Protection Act remove the responsibility for cyber attacks, but it is difficult to prevent attacks by hackers armed with new technologies. This paper studies the development of cyber security experts for cyber security. Build a Knowledge Data Base for cyber security professionals. Web hacking, System hacking, and Network hacking technologies and evaluation. Through researches on the operation and acquisition of cyber security expert certification, we hope to help nurture cyber security experts for national cyber security.