• Title/Summary/Keyword: access server

Search Result 963, Processing Time 0.029 seconds

Multi-tier Database System for Wireless LAN Environment (무선 근거리 통신망 환경을 위한 다단계 데이터베이스 시스템)

  • 박제호
    • Journal of the Semiconductor & Display Technology
    • /
    • v.3 no.4
    • /
    • pp.13-17
    • /
    • 2004
  • As the usage of wireless LAN becomes common in working environment, the number of database systems that support both wired and wireless users increases rapidly. The characteristics of wireless LAN that its speed is slow relatively comparing to wired network and the users in its environment connects to different communication points as they moves creates another challenge to be resolved in database systems. In the environment of hybrid communication systems, wired and wireless for voluminous data amount and a number of users, the two layer architecture of the conventional client-server database systems has limitation in the system performance. This is due to that server is the only point of data service in client-server database systems. In this paper, we discuss a new extended database system architecture that data services are distributed among servers and clients based on user database access patterns in order to improve system performance. We analyze the expected system performance by using simulation technique and prove the practical utilization of the system by demonstrating experimental results.

  • PDF

Web GIS Server Using GML

  • Oh, B.W.;Kim, M.J.;Lee, E.K.;Jang, B.T.
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.656-658
    • /
    • 2003
  • Recently, loosely-coupled systems are widely used for distributed computing environment. We develop a web GIS server who conforms to the international standards developed by the Open GIS Consortium (OGC), such as web feature service (WFS) implementation specification, Geography Markup Language (GML) implementation specification, and the simple features specification for OLE/COM. The web GIS server provides interoperable access of spatial data among data formats in the distributed environment.

  • PDF

Key Management Server Design in Multiuser Environment for Critical File Protection

  • Sung-Hwa Han
    • Journal of information and communication convergence engineering
    • /
    • v.22 no.2
    • /
    • pp.121-126
    • /
    • 2024
  • In enterprise environments, file owners are often required to share critical files with other users, with encryption-based file delivery systems used to maintain confidentiality. However, important information might be leaked if the cryptokey used for encryption is exposed. To recover confidentiality, the file owner must then re-encrypt and redistribute the file along with its new encryption key, which requires considerable resources. To address this, we propose a key management server that minimizes the distribution of encryption keys when critical files are compromised, with unique encryption keys assigned for each registered user to access critical files. While providing the targeted functions, the server employs a level of system resources comparable to that of legacy digital rights management. Thus, when implemented in an enterprise environment, the proposed server minimizes cryptokey redistribution while maintaining accessibility to critical files in the event of an information breach.

The consistency properties for management of RBAC relationship informations on the LMUX server environments (리눅스 서버 환경에서 RBAC 관계정보 관리를 위한 일관성 특성)

  • 오석균;김성열
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 1999.05a
    • /
    • pp.91-96
    • /
    • 1999
  • Role-Based Access Control(RBAC) is an access control mechanism that reduce the cost of administering access control policies. The Admin Tool developed for RBAC Model manages relationship informations of user and role. In order to maintain the consistency of the information for these relationships, a set of properties defining consistency of the relationship informations is required. When it will be designed security systems applying RBAC policy on the Linux server system environments, this paper described consistency properties of relationship informations for information management of user and role relationships. It leads us to the development of minimal set obtainable the equivalent results of consistency properties for a more efficient Admin Tool implementation.

  • PDF

Design and Implementation of Mobile RFID Middleware based Pet Management System (모바일 RFID 미들웨어 기반 Pet 관리시스템의 설계 및 구현)

  • Park, Byoung-Seob
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.3
    • /
    • pp.19-26
    • /
    • 2010
  • The most critical element in the real-time operation of RFID application programs that are suitable for the mobile environment is the RFID middleware, made exclusively for mobile handsets, which processes collected data on a real-time basis and sends only the useful information to the application client. In this paper, we intend to design and implement the Pet management system for optimized mobile RFID middleware that supports real-time data processing. The proposed Pet management system consists of registration module, retrieval module, communication module, and display module in order to display retrieval result from server. Also, the captured data in the PDA is transmitted to the server and another client system using the mobile application interface that supports the SOAP application access protocol.

Memory Management for Improving User Response Time in Web Server Clusters (웹 서버 클러스터에서 사용자 응답시간 개선을 위한 메모리 관리)

  • Chung, Ji-Yeong;Kim, Sung-Soo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.28 no.9
    • /
    • pp.434-441
    • /
    • 2001
  • The concept of network memory was introduced for the efficient exploitation of main memory in a cluster. Network memory can be used to speed up applications that frequently access large amount of disk data. In this paper, we present a memory a management algorithm that does not require prior knowledge of access patterns and that is practical to implement under the web server cluster, In addition, our scheme has a good user response time for various access distributions of web documents. Through a detailed simulation, we evaluate the performance of our memory managment algorithms.

  • PDF

Security Access Control of Home System Through Authentication Server and Web Server (인증서버와 웹서버를 통한 홈 시스템의 보안 접근 제어)

  • Lee, Gang-Sik;Cho, Sung-Mok
    • Proceedings of the KAIS Fall Conference
    • /
    • 2011.12b
    • /
    • pp.558-561
    • /
    • 2011
  • 본 논문은 임베디드 타겟 보드의 시스템을 활용하여 웹서버를 운용하고, 웹페이지를 통해 임베디드타겟 보드 내의 신호를 제어할 수 있도록 제작한 신호 감지 시스템을 통해 제어 신호를 받아 실제 작동여부를 확인할 수 있는 조형물을 구성하였다. 또한, Linux 커널을 컴파일하여 포팅한 임베디스 시스템과 Linux OS기반의 인증 서버를 구축하여 안전한 홈 시스템의 보안접근 제어가 가능하도록 하였다.

  • PDF

차세대 엔터프라이즈웨어 마이포스 소개

  • 정창현
    • Proceedings of the Korea Database Society Conference
    • /
    • 1995.12a
    • /
    • pp.3-19
    • /
    • 1995
  • 시스템 Technology ★ Server Technology - 운영환경구축 ★ Network 구성설계 - ATM, FDDI, NMS ★ Client/Server시스템 구성별 Bench Marking ★ Windows 메뉴 및 GUI 설계 ★다기능 PC 운영환경 설정 시스템 Technology ★ Data Base Technology - DB Administration - BB Performance Tuning ★ System Integration Technology - Application Integration - System Flow Control - Task Control - Applicational Interface - S/W Down Load 시스템 Technology ★ Memory Optimization ★ IBM/Facom Host API ★ 영상전화 Customizing - Intel Proshare ★ Auto Dialing - CTI Link ★ IC-Card Interface 시스템 Technology ★ Sound 처리 - Voice Mail - 음절 처리 ★ Image 처리 ★도움말 처리 - Hyper Text 시스템 Technology ★ Socket Programming - 긴급메일 - Peer to peer message switching ★ Set Up Programming -Install Shield ★ DB Access Programming - DB-Library ★ TCP/IP Programming(중략)

  • PDF

A Provable One-way Authentication Key Agreement Scheme with User Anonymity for Multi-server Environment

  • Zhu, Hongfeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.2
    • /
    • pp.811-829
    • /
    • 2015
  • One-way authenticated key agreement protocols, aiming at solving the problems to establish secure communications over public insecure networks, can achieve one-way authentication of communicating entities for giving a specific user strong anonymity and confidentiality of transmitted data. Public Key Infrastructure can design one-way authenticated key agreement protocols, but it will consume a large amount of computation. Because one-way authenticated key agreement protocols mainly concern on authentication and key agreement, we adopt multi-server architecture to realize these goals. About multi-server architecture, which allow the user to register at the registration center (RC) once and can access all the permitted services provided by the eligible servers. The combination of above-mentioned ideas can lead to a high-practical scheme in the universal client/server architecture. Based on these motivations, the paper firstly proposed a new one-way authenticated key agreement scheme based on multi-server architecture. Compared with the related literatures recently, our proposed scheme can not only own high efficiency and unique functionality, but is also robust to various attacks and achieves perfect forward secrecy. Finally, we give the security proof and the efficiency analysis of our proposed scheme.