• Title/Summary/Keyword: access server

Search Result 963, Processing Time 0.034 seconds

The Remote Access Algorithm by Object Replication (객체 복제 기법에 의한 원격 접근 알고리즘)

  • Yun, Dong-Sik;Lee, Byeong-Gwan
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.3
    • /
    • pp.799-807
    • /
    • 2000
  • In this paper, object replication Client/server under distributed computing system is design and implementation. Today many end-users have a computer communication by using internet in the distributed system of client/server. If many users request services to a specific remote server, the server should have got a overhead for hat service processing, delayed the speed for replay, and bring a bottleneck in communication network. Therefore object replication method was proposed to solve this problems. The growth of internet works and distributed applications has increased the need for large scale replicated systems. However, existing replication protocols do not address scale and autonomy issues adequately. Further, current application protocol require consistency of different levels, and therefore should be the selection function of consistency in them, in order to have particular semantics of each level. In this paper, server overhead and bottleneck happening in remote procedure call be using server object replication. Therefore access transparency can be improved by sharing object duplicately. So it will Keep up with the consistency within the replicated objects.

  • PDF

A Server-Independent Password Authentication Method for Access-Controlled Web Pages Using the SHA-1 Algorithm (SHA-1 방식을 이용한 제한된 웹 페이지에 접근하기 위한 서버 독립적인 패스워드 인정 방안)

  • 하창승;조익성
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.4
    • /
    • pp.146-153
    • /
    • 2001
  • A new password authentication method Is proposed in this paper for the purpose of providing web page authors the convenience in deploying password-protected Web realms at a web server. According to this method. a web realm is mapped to a secret directory at the web server. in which access-controlled web pages are stored. A password is used to construct the name of the secret directory. A javaScript code is embedded in a sign-in web pageoutside the secret directory, which converts the user-entered password into the directory name and forms a complete URL pointing to an access-controlled web page inside the secret directory. Thus, only users knowing the password can compose a valid URL and retrieve the access-controlled web page. Using this method, web page authors can deploy password-protected web realms in a server-independent manner.

  • PDF

Optimal TCP Segment Size for Mobile Contents Server Access over Wireless Links of Cellular Networks (이동통신망에서의 모바일 컨텐츠 서버 통신을 위한 최적의 TCP 세그먼트 길이)

  • Lee, Goo-Yeon;Jeong, Choong-Kyo;Kim, Hwa-Jong;Lee, Yong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.12 s.354
    • /
    • pp.31-41
    • /
    • 2006
  • Internet access from mobile phones over cellular networks suffer from severe bandwidth limitations and high bit error rates over wireless access links. Tailoring TCP connections to best fit the characteristics of this bottleneck link is thus very important for overall performance improvement. In this work, we propose a simple algorithm in deciding the optimal TCP segment size to maximize the utilization of the bottleneck wireless TCP connection for mobile contents server access, taking the dynamic TCP window variation into account. The proposed algorithm can be used when the product of the access rate and the propagation time is not large. With some numerical examples, it is shown that the optimal TCP segment size becomes a constant value when the TCP window size exceeds a threshold. One can set the maximum segment size of a wireless TCP connection to this optimal segment size for mobile contents server access for maximum efficiency on the expensive wireless link.

Extending VNC for Effective Collaboration (효과적인 협업을 위한 VNC 확장)

  • Lee, Tae-Ho;Lee, Hong-Chang;Park, Yang-Su;Lee, Myung-Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.6
    • /
    • pp.181-193
    • /
    • 2008
  • VNC is one of popular thin client computing systems, which supports cross-platform remote control using the RFB protocol. Unfortunately, since VNC does not provide functions specially designed for collaboration, it is difficult to collaborate effectively through the remote control function of VNC. In this paper, we present the extension of the UltraVNC server and the JavaViewer client which are one of open-source VNC systems. For effective real-time collaboration, the extended VNC provides three kinds of access authorities to control the collaboration server: administrator, worker, and spectator. The administrator can control the access authorities of the users through the access control tool, newly provided in the extended JavaViewer. The workers can access the resources of the remote server, whereas the spectator cannot handle those remote resources, only monitoring the remote server. In addition, the extended VNC provides the one-click connection facility for easy connection to the collaboration server from many collaboration participants.

  • PDF

An Access Code Key for Verification Service Model on the Blockchain in a Door Security (출입문 보안을 위한 블록체인 기반의 출입코드키 검증 서비스 모델)

  • Hong, Ki Hyeon;Lee, Byung Mun
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.10
    • /
    • pp.1416-1432
    • /
    • 2022
  • The access control system is a system that allows users to selectively enter the building by granting an access key to the user for security. Access keys with weak security are easily exposed to attackers and cannot properly perform the role that authenticates users. Access code keys should be protected from forgery or spoofing. For this reason, access key verification service models is important in security. However, most models manage all access keys on one central server. This method not only interrupts all services due to server errors, but also risks forgery and spoofing in the process of transmitting access keys. Therefore, blockchain algorithms are used to reduce this risk. This paper proposes a blockchain-based access key verification service model that used distributed stored blockchain gateways on storing access keys and authenticates the user's identity based on them. To evaluate the performance of this model, an experiment was conducted to confirm the performance of the access key forgery recovery rate and the blockchain network performance. As a result, the proposed method is 100% forgery recovery rate, and the registration and verification process is evaluated at 387.58 TPS and 136.66 TPS.

Design of Thin-Client Framework for Application Sharing & Optimization of Data Access (애플리케이션 공유 및 데이터 접근 최적화를 위한 씬-클라이언트 프레임워크 설계)

  • Song, Min-Gyu
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.5
    • /
    • pp.19-32
    • /
    • 2009
  • In this paper, we design thin-client framework capable of application sharing & data access on the Internet, and apply related skills, such as X windows system, pseudo server, CODA file system, MPI(Message Passing Interface). We suggest a framework for the thin client to access data produced by working on a server optimally as well as to run server side application, even in the case of network down. Additionally, it needed to reflect all local computing changes to remote server when network is restored. To design thin client framework with these characteristics, in this paper, we apply distributed pseudo server and CODA file system to our framework, also utilize MPI for the purpose of more efficient computing & management. It allows for implementation of network independent computing environment of thin client, also provide scalable application service to numerous user through the elimination of bottleneck on caused by server overload. In this paper, we discuss the implementing method of thin client framework in detail.

A Study on Cooperation between Kerberos system and Credit-Control Server

  • Choi, Bae-Young;Lim, Hyung-Jin;Chung, Tai-Myoung
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.281-284
    • /
    • 2005
  • Kerberos is system that offer authorization in internet and authentication service. Can speak that put each server between client and user in distributed environment and is security system of symmetry height encryption base that offer authentication base mutually. Kerberos authentication is based entirely on the knowledge of passwords that are stored on the Kerberos Server. A user proves her identity to the Kerberos Server by demonstrating Knowledge of the key. The fact that the Kerberos Server has access to the user's decrypted password is a rwsult of the fact that Kerberos does not use public key cryptogrphy. It is a serious disadvantage of the Kerbercs System. The Server must be physically secure to prevent an attacker from stealing the Kerberos Server and learning all of the user passwords. Kerberos was designend so that the server can be stateless. The Kerberos Server simply answers requests from users and issues tickets. This study focused on designing a SIP procy for interworking with AAA server with respect to user authentication and Kerberos System. Kerberos is security system of encryption base that offer certification function mutually between client application element and server application element in distributed network environment. Kerberos provides service necessary to control whether is going to approve also so that certain client may access to certain server. This paper does Credit-Control Server's function in AAA system of Diameter base so that can include Accounting information that is connected to Rating inside certification information message in Rating process with Kerberos system.

  • PDF

Asymmetric distributed multi server architecture for efficient method of client connection process at online game servers (온라인게임 서버에서의 효율적인 클라이언트 접속 처리를 위한 비대칭 분산형 다중 서버 구조)

  • Hwang Doh-Yeun;Lee Nam-Jae;Kwak Hoon-Sung
    • The KIPS Transactions:PartB
    • /
    • v.12B no.4 s.100
    • /
    • pp.459-464
    • /
    • 2005
  • The online game system could be largely divided into two parts: servers and clients. Clients accesses to a game server and analyzes the packets transmitted from a server. A game server manages users information and database. U a game server allows a new client to access the server to execute a game, it should accept the access request of the new client maintaining the online connection of the existing users. In this paper, we compare Process method and Thread method within the multiple jobs process methods of a server. Then we propose an asymmetric distributed multi server architecture that is adequate to asymmetric distributed architecture that is widely applied to most game servers. The proposed asymmetric distributed multi server architecture includes login server, game server, communication server and database server to perform its own feature independently. Comparing its other architectures, it shows better performance economically and technically. Especially it improves the stability and expandability of a server.

Implementation of the Authorization Model for the Database Server of BADA-III system (바다-III 시스템의 데이타베이스 서버를 위한 권한부여 모델의 구현)

  • Kim, Young-Kyun;Cho, Ok-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.6 no.3
    • /
    • pp.41-56
    • /
    • 1996
  • Database servers that are used to provide multimedia information services in World Wide Web(WWW) environment have to support the access control mechanism that allows authorized users to access the constructed databases. In this paper, we define an authorization model as well as authorization policies to enforce the proper access control on databases in the BADA-III object-oriented database server and propose an access evaluation algorithm. Also we implement this model and the algorithm in the BADA-III database server. Considering the service environment of the WWW, we expect that database service providers can simply and effectively protect their data using the proposed model.

Analysis of Commercial Continuous Media Server Workloads on Internet (인터넷 환경에서의 상용 연속미디어 서버의 부하 분석)

  • Kim, Ki-Wan;Lee, Seung-Won;Park, Seong-Ho;Chung, Ki-Dong
    • The KIPS Transactions:PartB
    • /
    • v.10B no.1
    • /
    • pp.87-94
    • /
    • 2003
  • A study on the characteristics of server workloads based on user access pattern offers insights for the strategies on continuous media caching and network workloads distribution. This paper analyses characteristics of continuous media filet in each fervor and user access requests to each of them, using log data of three commercial sites, which are providing continuous media files in the form of real time streaming on the Internet. These servers have more continuous files than ones in the previously reported studies and are processing very large number of user access requests. We analyse the characteristics of continuous media files in each server by the size of files. playback time and encoding bandwidth. We also analyse the characteristics of user access requests by the distribution of user requests to continuous media files, user access time, access rate based on the popularity of the files and the number if access requests to serial continuous media files.