• Title/Summary/Keyword: XML Message-based

Search Result 89, Processing Time 0.025 seconds

Implementing a Virtual Shopping Mall for the Cheapest Price using MOM(Message-Oriented Middleware) based on XML (XML 기반의 MOM(Message-Oriented Middleware)을 이용한 최저 가격 보장을 위한 가상 쇼핑몰 구현)

  • 임종선;주경수
    • Journal of Information Technology Applications and Management
    • /
    • v.9 no.1
    • /
    • pp.61-70
    • /
    • 2002
  • There are a lot of shopping malls in Internet and most of consumers want to buy good goods in cheap price through the shopping malls. To support them, many sites for price comparison are constructed. But man or woman search many shopping malls and insert their price informations into database that the price comparison sites own. To overcome this disadvantage, virtual shopping malls are builded. These virtual shopping malls are connected and cooperated a lot of affiliated existing shopping malls for the cheapest price information. But, these virtual shopping mall are connected to those existing shopping malls in synchronous. So If they are connected to many existing shopping malls, we have to wait long time because of searching for many existing shopping malls. In this paper, we designed and implemented a virtual shopping mall that connect to many existing shopping malls in asynchronous. For a asynchronous communication between this virtual shopping mall and many existing shopping malls, we used JMS (Java Message Service) that is a standard Java API for MOM (Message-Oriented Middleware).

  • PDF

Design and Implementation of a Component and Context based Business Message for Creating a Single Global Electronic Market (단일 글로벌 전자상거래 시장을 만들기 위한 컴포넌트와 컨텍스트 기탄의 전자문서 설계 및 구현)

  • 김완평
    • Journal of Information Technology Applications and Management
    • /
    • v.9 no.3
    • /
    • pp.13-30
    • /
    • 2002
  • ebXML (Electronic Business using extensible Markup language), sponsored by UN/CEFACT and OASIS, is a modular suite of specifications that enables enterprises of any size and in any geographical location to conduct business over the Internet. Using ebXML, companies now have a standard method to exchange business messages, conduct trading relationships, communicate data In common terms and define and resistor business processes. It is the mission of ebXML that provides an open XML-based infrastructure enabling the global use of electronic business information in an interoperable, secure and consistent manner by all parties for creating a single e1ectronic electronic market. This paper briefly overviews the concept of core component, context, assembly rule and context rule. Then, It designs by standard specifications of ebXML core component commonly used in an industry and among industries, and assembles business messages by using XML schema. Therefore, it suggests the mechanism which effectively exchanges business messages among the trading partners. This paper designs core component by using only three business messages of retail industry : orders, dispatch report, sales report.

  • PDF

XML Signature System on Mobile Environment (모바일 환경에서 XML 전자서명 시스템)

  • Cao, Ke-Rang;Kim, Chang-Su;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.8
    • /
    • pp.1441-1447
    • /
    • 2008
  • It is possible to transfer huge data in mobile device by advancing mobile technology, and so in this base, various services are offered. Especially, E-commerce service is offering on mobile environment, and this service is based on XML(eXtensible Markup Language) Signature. XML Signature assure that process integrity, message authentication, and/or signer authentication. And WIPI(Wireless Internet Protocol for Interoperability) that is mobile internet integration platform was proposed to integrate mobile device platform. However, because WIPI transmits and exchanges message by tort of XML base, encryption of XML document and necessity of XML signature are increasing because of weakness of security. Therefor in this paper, Encryption and XML signature module of XML document that satisfy standard requirement in WIPI platform base design and implementation. System that was proposed in this paper used standard encryption and XML signature algorithm and supports safe encryption and XML signature through doing security simulation applied various algorithm for XML document of mobile environment.

Interoperable XML Messaging System for Tactical Data Link (전술데이터링크 상호운용을 위한 XML 기반 메시징 시스템)

  • Kim, Hong-Jae;Oh, Sang-Yoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.3
    • /
    • pp.75-87
    • /
    • 2011
  • Tactical Data Links are standardized radio communication data links for military armed forces and used to transmit and receive data. Because they are the core elements of achieving information superiority in a NCW environment, various kinds of TDL are used by the Korean armed forces. Operating various types of TDL is very helpful in getting more information; however, at the same time, it is hard to integrate and make them co-operate with other TDLs or C4ISR systems. In this paper, we propose a XML based messaging system to make various types of TDL interoperable in a NCW environment. For the messaging system between TDL and C4ISR systems, we define XML message processing interfaces and suggest binary XML for serialization to save transmission loads over constrained military communication bandwidth. Our experiment results show that the TDL message can be transformed into generalized XML data that is interoperable with other TDLs and binary XML serialization, and it saves parsing and transmission time.

A XML Based Conversion System for Secure Message Exchange (안전한 메시지교환을 위한 XML 기반의 변환시스템)

  • 오대균;홍창범;송정길
    • Journal of Internet Computing and Services
    • /
    • v.3 no.4
    • /
    • pp.1-9
    • /
    • 2002
  • As a XML Schema has been settled to W3C as standard at May. 2001 and technologies like as XML. Xpath and NameSpace related with XML has been developing. XML is becoming the standard of the new document exchanging. Due to the ability expressing various types of documentstructure through XML, ebXML, RosettaNet, and BizTalk are using XML as a core technology in the part of e-Business, To make the task automatically in the B2B EC now, a standard XML document is needed. Internal documents in each company should be transformed differently without any loss to work with other companies. In this paper, transforming XML document based on JAVA servlet is considered as realization of a XML system to exchange documents safely.

  • PDF

Modeling Components for mapping from XML DTD to RDB schema (XML DTD의 관계형 데이터베이스 스키마로의 자동변환을 위한 컴포넌트 모델링)

  • 이정수;방승윤;주경수
    • Journal of Internet Computing and Services
    • /
    • v.2 no.5
    • /
    • pp.81-91
    • /
    • 2001
  • XML is a standard markup language for exchange and storage of formed or well-formed information in World Wide Web, Because the source data of XML message for exchange of information in World Woo Web Is stored in legacy database systems. it is necessary the easier connection between XML application and database systems, In Oracle8i. 9i. informix and SQL2000. DBMS vendors extend their DBMSs for XML. This approach for the connection between XML application and database system is Platform-dependent and DBMS-dependent. Therefore it is necessary the platform- and DBMS-independent approach for the connection between XML application and database system, In this paper. we modeled a set of middleware components for relational database design based on XML DTD is modeled, Those components are modeled on object-based algorithm for connection between XML application and database system.

  • PDF

Design and Implementation of a new XML-Signcryption scheme to protect the XML document (XML 문서 보안을 위한 새로운 XML-Signcryption scheme 설계 및 구현)

  • Han, Myung-Jin;Lee, Young-Kyung;Shin, Jung-Hwa;Rhee, Kyung-Hyung
    • The KIPS Transactions:PartC
    • /
    • v.10C no.4
    • /
    • pp.405-412
    • /
    • 2003
  • As the XML is approved standard language by the UN, the progress which complemented the XML security has being processed rapidly. In this paper, we design and implement the "XML-Signcryption" as a security mechanism to protect the XML document that can operate between other platforms. The signature and encryption which is the standard specification in W3C needs to be able to proceed them separately. Generally the signature and encryption require four times modular exponential operation, however the signcryption only needed three times modular exponential operation. This will benefit overall system effectiveness in terms of cost. And this scheme offers to convenient the user, because the signature and encryption implement as a single XML format. This tool can save the parsing time as a number of tags is few within a document. And also, in this paper, based on a research of Web Services security, we can apply XML-Signcryption to the SOAP message to provide the security services. Based on the XML-Signcryption scheme which provides confidentiality, integrity, authentication and non-repudiation to the XML document and Web Service security simultaneously.

Transforming XML DTD to SQL Schema based on JDBC (XML DTD의 JDBC 기반 SQL 스키마로의 변환)

  • 이상태;주경수
    • Journal of Internet Computing and Services
    • /
    • v.3 no.1
    • /
    • pp.29-40
    • /
    • 2002
  • The information exchange on the using of XML such as B2B electronic is common. So the efficient method to store XML message in database is needed. Because the ORDBMS is extended to ORDBMS for supporting multimedia application such as Oracle8i, 9i, Informix and SQL2000 server, SQL2, the standard RDB is extended to SQL3 for ORDB, And the XML application based on java such as J2EE is extended. Therefor it is necessary for the efficient connection methods based on JDBC between XML application and database system. In this paper, the methodology a transformation XML DTD to SQL3 schema is proposed. For the transformation, first the methods of transformation XML DTD to object model in UML class diagram are proposed. And then the methods of mapping transferred object models to SQL3 schema are proposed. This approach for transform::1lion XML. DTD to SQL3 schema such as Oracle8i, 9i, Informix and SQL2000 server based on java is proposed in this paper, can be used in database design to build XML applications based on ORDB.

  • PDF

Design of EMR Sharing System based on HL7 Message over Web Environment (웹 환경에서 HL7 메시지 기반 전자의무기록 공유 시스템 설계)

  • Yoo JaeMyeong;Lee SungChul;Kim IlKon;Cho Hune;Bum HeeSeung;Lee GueeSang
    • Proceedings of the IEEK Conference
    • /
    • 2004.06a
    • /
    • pp.285-288
    • /
    • 2004
  • This paper has been studied a EMR Sharing System using HL7 Message and CDA Document. HL7 Message is a Transaction for clinical data sharing between hospital-based. The CDA for document exchange supports shared care between hospital-based and community-based physicians, knowledge integration by permitting external links to other documents, and outcomes research through the capture of discrete and coded clinical data. And then this paper has designed XML based CDA for document exchange and interactive Hospital-based Transaction based on HL7 Message.

  • PDF

An Ontology Based Security Protection of SOAP Messages

  • Nasridinov, Aziz;Byun, Jeong-Yong
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06d
    • /
    • pp.131-134
    • /
    • 2011
  • Several Web Service security standards are widely utilized aiming at securing exchanges of SOAP messages among partners in a collaborative environment. Although such standards are suitable for ensuring end-to-end message level security, certain attacks such as XML rewriting may still occur and lead to significant security vulnerabilities. This paper explores the security vulnerabilities of SOAP messages and proposes an ontology-based approach that can successfully combat the security threats. We develop ontology-based schema to include SOAP structure information in outgoing SOAP message and validate this information in the receiving end. Thus, allow to detect XML rewriting attacks early in the validating process.