• Title/Summary/Keyword: access server

Search Result 963, Processing Time 0.027 seconds

Building an Electronic Approval Module Using Multi-Level Security (다중등급 보안 정책을 적용한 전자결재 모듈의 개발)

  • 김진성;안병혁
    • The Journal of Information Systems
    • /
    • v.11 no.1
    • /
    • pp.175-198
    • /
    • 2002
  • This paper is to develop a security module for electronic approval systems. Electronic documents are created, transmitted and saved in the company's intranet computer network. Transmitting electronic documents, however, brings us a security problem. Communications among various computer systems are exposed to many security threats. Those threats are eavesdropping, repudiation, replay back etc. The main purpose of this paper is to develop a module which provides the security of electronic documents while they are passed from one place to another This paper applies Multi-Level security to the electronic approval system that guarantees security of electronic documents from many threats. Multi-Level security controls the access to the documents by granting security level to subject users and object electronic documents. To prevent possible replay back attacks, this paper also uses one time password to the system. The security module is composed of client program and server one. The module was developed using Microsoft Visual Basic 6.0 and Microsoft SQL Server 7.0. The code uses Richard Bondi's WCCO(Wiley CryptoAPI COM Objects) library functions which enables Visual Basic to access Microsoft CryptoAPI.

  • PDF

DEVELOPMENT OF ON-LINE DATA VISUALIZATION PROGRAM AND ITS APPLICATION (온-라인 데이터 가시화 프로그램의 개발과 그 적용)

  • Kang, S.H.;Kim, B.S.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2008.03a
    • /
    • pp.290-296
    • /
    • 2008
  • In this paper development of on-line data visualization program is described and some examples of data postprocessing are shown. The program is written in JAVA language and runs as a JAVA applet on the web browser such as Internet Explorer or Firefox. Remote users can use the program to visualize and analyze their own flow data by accessing the program server through the internet and loading data files in proper formats from their local computers. This paper describes briefly about algorithms for data visualization, structure and available functions of the program, and web sever system. The mechanism of how the JAVA applet can access and process local data files and relevant coding techniques are explained as well. Also explained is what is required for the remote users and client computers to access the program on-line. Some visualization examples performed on a local computer are illustrated by accessing the server remotely.

  • PDF

DEVELOPMENT OF ON-LINE DATA VISUALIZATION PROGRAM AND ITS APPLICATION (온-라인 데이터 가시화 프로그램의 개발과 그 적용)

  • Kang, S.H.;Kim, B.S.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2008.10a
    • /
    • pp.290-296
    • /
    • 2008
  • In this paper development of on-line data visualization program is described and some examples of data postprocessing are shown. The program is written in JAVA language and runs as a JAVA applet on the web browser such as Internet Explorer or Firefox. Remote users can use the program to visualize and analyze their own flow data by accessing the program server through the internet and loading data files in proper formats from their local computers. This paper describes briefly about algorithms for data visualization, structure and available functions of the program, and web sever system. The mechanism of how the JAVA applet can access and process local data files and relevant coding techniques are explained as well. Also explained is what is required for the remote users and client computers to access the program on-line. Some visualization examples performed on a local computer are illustrated by accessing the server remotely.

  • PDF

A Key Distribution Protocols Ensure the Privacy for PHR (PHR의 프라이버시를 보장한 키 분배 프로토콜)

  • Cho, Young-bok;Woo, Sung-Hee;Lee, Sang-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.831-833
    • /
    • 2013
  • PHR is integrated into the server, so the problem has managed. Thus, the highly sensitive information stored on the server. PHR should be limited to the access rights. In this paper, the access rights of PHR as a way to distinguish the role of each approach based on a distributed hierarchical key to ensuring the privacy of PHR by key distribution protocol is proposed.

  • PDF

The Design of an Efficient Proxy-Based Framework for Mobile Cloud Computing

  • Zhang, Zhijun;Lim, HyoTaek;Lee, Hoon Jae
    • Journal of information and communication convergence engineering
    • /
    • v.13 no.1
    • /
    • pp.15-20
    • /
    • 2015
  • The limited battery power in the mobile environment, lack of sufficient wireless bandwidth, limited resources of mobile terminals, and frequent breakdowns of the wireless network have become major hurdles in the development of mobile cloud computing (MCC). In order to solve the abovementioned problems, This paper propose a proxy-based MCC framework by adding a proxy server between mobile devices and cloud services to optimize the access to cloud services by mobile devices on the network transmission, application support, and service mode levels. Finally, we verify the effectiveness of the developed framework through an experimental analysis. This framework can ensure that mobile users have efficient access to cloud services.

DRL based Dynamic Service Mobility for Marginal Downtime in Multi-access Edge Computing

  • Mwasinga, Lusungu Josh;Raza, Syed Muhammad;Chu, Hyeon-Seung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.05a
    • /
    • pp.114-116
    • /
    • 2022
  • The advent of the Multi-access Edge Computing (MEC) paradigm allows mobile users to offload resource-intensive and delay-stringent services to nearby servers, thereby significantly enhancing the quality of experience. Due to erratic roaming of mobile users in the network environment, maintaining maximum quality of experience becomes challenging as they move farther away from the serving edge server, particularly due to the increased latency resulting from the extended distance. The services could be migrated, under policies obtained using Deep Reinforcement Learning (DRL) techniques, to an optimal edge server, however, this operation incurs significant costs in terms of service downtime, thereby adversely affecting service quality of experience. Thus, this study addresses the service mobility problem of deciding whether to migrate and where to migrate the service instance for maximized migration benefits and marginal service downtime.

The Architecture of Tool server in MPEG-21

  • Kim, Kwang-Yong;Hong, Jin-Woo;Kim, Jin-Woong
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.272-275
    • /
    • 2003
  • This paper presents the role and its function of Tool server. MPEG-21 means multimedia framework for delivery and consumption of multimedia which is being discussed in ISO/IEC 21000. A view of MPEC-21 aims to define multimedia framework to enable transparent use of multimedia resource across a wide range of networks and devices used by different communities. MPEG-21 will enable all-electronic creation delivery and trade of digital multimedia content and transparent usage of various content types on network device. Therefore, we can provide access to information and services from almost anywhere at anytime with various terminals and networks. In order to support multimedia delivery chain that contains content creation, production, delivery and consumption, we need many standards(elements) for identify, describe, manage and protect the content. Thus, we define Digital Item Player(DIP), Digital Item Adaptation(DIA) server and Tool server as primary objects of MPEG-21 multimedia framework. DIP provides a function which creates and consumes Digital Item(DI) as a kind of a digital object by user. A DI contains both media resources and metadata including rights information. DIA server deals with the usage environment description schema of the user characteristics, terminal and network characteristics and natural environments. DIA server adapts the original DI to the usage environment description sent from the terminal and transmits the adapted DI to the terminal. Tool server searches for a tool requested from DIP or DIA and downloads the best tool to DIP or DIA server. In this paper, we present how Tool sewer is organized and is used among 2 primary objects. The paper is structured as followings: Section 1 briefly describes why MPEG-21 is needed and what MPEG-21 wants. We see requirement that tool server must equip functionally in section 2. The proposed tool server,its structure and its functionality are presented in section 3. Section 4 explains a scenario that tool server transmits tool to DIP and shows the experimental result. The paper concludes in section 5.

  • PDF

Oil Spill Response System using Server-client GIS

  • Kim, Hye-Jin;Lee, Moon-Jin;Oh, Se-Woong
    • Journal of Navigation and Port Research
    • /
    • v.35 no.9
    • /
    • pp.735-740
    • /
    • 2011
  • It is necessary to develop the one stop system in order to protect our marine environment rapidly from oil spill accident. The purpose of this study is to develop real time database for oil spill prediction modeling and implement real time prediction modelling with ESI and server-client GIS based user interface. The existing oil spill prediction model cannot provide one stop information system for public and government who should protect sea from oil spill accident. The development of multi user based information system permits integrated handling of real time meteorological data from external ftp. A server-client GIS based model is integrated on the basis of real time database and ESI map to provide the result of the oil spill prediction model. End users can access through the client interface and request analysis such as oil spill prediction and GIS functions on the network as their own purpose.

Implementation of an E-Book Exchange Server based on Open E-Book Fourm (Open E-Book 포럼에 기반한 전자책 교환 서버 구현)

  • Kim, Jeong-Won
    • The KIPS Transactions:PartA
    • /
    • v.10A no.4
    • /
    • pp.405-410
    • /
    • 2003
  • In this paper, we have designed and implemented an E-Book Exchange System which is based on the Open E-Book Exchange protocol of Open E-book forum. The ebook is described digital contents composed of variable media and should require secured ebook server for copyright guarantee. Also, contents manufactures, circulation company, and user must access the ebook contents easily. So, Linux-based ebook server and reader can satisfy this requirements. Therefore, this research has developed Linux-based ebook server and reader which is cost-effective.

An Implementation of Best Match Algorithm for Korean Text Retrieval in the Client/Server Environment (클라이언트 서버 환경에서 한글텍스트 검색을 위한 베스티매치 알고리즘의 구현)

    • Journal of Korean Library and Information Science Society
    • /
    • v.32 no.1
    • /
    • pp.249-260
    • /
    • 2001
  • This paper presents the application of best match search algorithm in the client/server system for natural language access to Web-based database. For this purpose, the procedures to process Korean word variants as well as to execute probabilistic weighting scheme have been implemented in the client/server system. The experimental runs have been done using a Korean test set which included documents, queries and relevance judgements. The experimental results demonstrate that best match retrieval with relevance information is better than the retrieval without it.

  • PDF