• Title/Summary/Keyword: computing environment

Search Result 3,249, Processing Time 0.034 seconds

Dynamic Access Control for Personalized Environment in Ubiquitous Computing

  • Kim, Yuna;Shin, IlShik;Hong, Sung Je;Kim, Jong
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.2 no.4
    • /
    • pp.233-241
    • /
    • 2007
  • In an ubiquitous environment, for controlling user access according to environment of users, a number of access control models enforcing dynamic environment of users have been proposed. However, they do not support personalized environments of each user and have a run-time overhead of searching active roles. In this paper, we propose a new model, PE-RBAC, that extends the RBAC architecture by addition of a personalized environment component as a constraint to accommodate dynamic and mobile users. In this model, a dynamic role activation is presented by using a new role-to-environment structure instead of the conventional role hierarchy, which makes it efficient to find the active roles according to a user's personalized environment.

  • PDF

Context-Aware Framework Using Context Ontology for Supporting QoS-based Services (상황 온톨로지를 활용한 QoS 제공 상황인식 프레임워크)

  • Seo, Dong-Woo;Lee, Jae-Yeol
    • IE interfaces
    • /
    • v.21 no.1
    • /
    • pp.65-74
    • /
    • 2008
  • In the future, the ubiquitous computing environment will provide users with context-aware services, intelligently interacting with omnipresent resources and surrounding environments at any location and time. Therefore, the ubiquitous computing environment requires context-aware applications in order to gather and analyze context information in various situations. However, existing context-aware applications have mainly focused on providing services and adapting themselves to users based on user related contexts. But this environment requires not only user related contexts but also Quality-of-Service (QoS) related contexts. In this paper we propose a frame-work for supporting user-oriented QoS in ubiquitous environments. The proposed approach adopts a semantic ontology and a neural network algorithm in order to reason about explicit and uncertain contexts. We also show the possibility of applying the framework to real environments such as collaborative engineering service, automobile maintenance service and ubiquitous home service.

An Attack-based Filtering Scheme for Slow Rate Denial-of-Service Attack Detection in Cloud Environment

  • Gutierrez, Janitza Nicole Punto;Lee, Kilhung
    • Journal of Multimedia Information System
    • /
    • v.7 no.2
    • /
    • pp.125-136
    • /
    • 2020
  • Nowadays, cloud computing is becoming more popular among companies. However, the characteristics of cloud computing such as a virtualized environment, constantly changing, possible to modify easily and multi-tenancy with a distributed nature, it is difficult to perform attack detection with traditional tools. This work proposes a solution which aims to collect traffic packets data by using Flume and filter them with Spark Streaming so it is possible to only consider suspicious data related to HTTP Slow Rate Denial-of-Service attacks and reduce the data that will be stored in Hadoop Distributed File System for analysis with the FP-Growth algorithm. With the proposed system, we also aim to address the difficulties in attack detection in cloud environment, facilitating the data collection, reducing detection time and enabling an almost real-time attack detection.

Implementation of Context-Aware Middleware for Sensor Network in Ubiquitous Environment

  • Kim Bo-Seong;Lee Byoung-Hoon;Kim Jai-Hoon
    • International Journal of Contents
    • /
    • v.2 no.1
    • /
    • pp.9-16
    • /
    • 2006
  • Recently many researches are investigating for ubiquitous computing and network. In the real world many sensor devices must be equipped to provide many services for users. To make computing environment easy and more user friendly, middleware system not only hides all complexities (network, system, services, etc), but also needs to have efficient context inference scheme and system reconfiguration capability. In this paper we suggest context-aware middleware design for sensor network which provides efficient computing environment for end-users. We also present XML based implementation of our system.

  • PDF

An Application and Error Hooking running on Nested Session Management of Cloud Computing Collaboration Environment (클라우드 컴퓨팅 공동 환경의 네스티드 세션관리에서의 응용 및 오류 훅킹)

  • Ko, Eung-Nam
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.1
    • /
    • pp.145-150
    • /
    • 2012
  • This paper explains a performance analysis of an error detection system running on nested session management of cloud computing collaboration environment using rule-based DEVS modeling and simulation techniques. In DEVS, a system has a time base, inputs, states, outputs, and functions. This paper explains the design and implementation of the FDA(Fault Detection Agent). FDA is a system that is suitable for detecting software error for multimedia remote control based on nested session management of cloud computing collaboration environment.

Implementation of Distributed Computing Environment using Java Agent (자바 에이젼트를 이용한 분산컴퓨팅 환경 구현)

  • 서건원;이길흥
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.2
    • /
    • pp.199-208
    • /
    • 2002
  • Because of the change of computing environment, an agent technology is spotlighted recently. By deploying agent distributedly in network and offering the necessary service quickly in place easing realization of service, the enlargement of the effectiveness of network is necessary more and more. In this paper, agents programmed in java are distributed in place easing realization of service in network. And a manager connects to agents and informs URL of service code of the agent. This paper implements distributed computing environment in which agent downloads service code from URL of service code, executes the code, and returns the result of execution to manager.

  • PDF

Server-Aided Delegation in Ubiquitous Computing Environment

  • Shim Mi Sun;Yang Jong-Phil;Rhee Kyung Hyune
    • Proceedings of the IEEK Conference
    • /
    • summer
    • /
    • pp.52-56
    • /
    • 2004
  • Computing today is becoming ubiquitous. In such ubiquitous computing environments, entities expect to access resources and services at any time from anywhere. Therefore, the question rises of how to establish trust relationship in previously unknown devices or resources with such environment. After reviewing a model to delegate trust to communicating entities in ubiquitous environment and its security problems, we present a new model for secure delegation over communication entities. We adopt two-party signature scheme as cryptographic primitives. Additionally, we apply threshold cryptosystems to our model for more secure enhancement.

  • PDF

Fuzzy Inference of Large Volumes in Parallel Computing Environment (병렬컴퓨팅 환경에서의 대용량 퍼지 추론)

  • 김진일;박찬량;이동철;이상구
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2000.05a
    • /
    • pp.13-16
    • /
    • 2000
  • In fuzzy expert systems or database systems that have huge volumes of fuzzy data or large fuzzy rules, the inference time is much increased. Therefore, a high performance parallel fuzzy computing environment is needed. In this paper, we propose a parallel fuzzy inference mechanism in parallel computing environment. In this, fuzzy rules are distributed and executed simultaneously. The ONE_TO_ALL algorithm is used to broadcast the fuzzy input vector to the all nodes. The results of the MIN/MAX operations are transferred to the output processor by the ALL_TO_ONE algorithm. By parallel processing of fuzzy rules or data, the parallel fuzzy inference algorithm extracts effective parallel ism and achieves a good speed factor.

  • PDF

A Study of the Ubiquitous Computing and Network Security (유비쿼터스 컴퓨팅 및 네트워크의 보안연구)

  • Lee, Dae-Sik;Yun, Dong-Sic
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.59-65
    • /
    • 2005
  • Ubiquitous Computing is gradually accepting in our real society. Already some Advanced State has studying of Ubiquitous for more convenience Ubiquitous environment. Anywhere, Anytime user can be provided information and service that he want, but it has some problem such as Rogue AP, IP spoofing, DoS attack, Warm which can causing social confusion in Ubiquitous society. In this paper we must analysis that security requirement in the Ubiquitous network environment and investigate 'Ad hoc' and RFID which is main technique for network infra construction.

  • PDF

A Case Study on EAI Implementation for Enterprise Process Integration: Focusing on EAI Project in Deakyo Co (기업 프로세스 통합을 위한 EAI 구축사례: 대교(주)의 EAI 프로젝트를 중심으로)

  • Yoon, Cheol-Ho;Choi, Hea-Seong
    • Journal of Information Technology Services
    • /
    • v.5 no.3
    • /
    • pp.109-119
    • /
    • 2006
  • The company cannot optimize its computing environment just with individual solutions such as ERP(enterprise resource planning), SCM(supply chain management), CRM(customer relationship management), and KM(knowledge management). EAI(enterprise application integration) has emerged as an alternative that can optimize computing environment of the company through integrating such solutions and systems of distributed computing and mainframe environment. This paper reports the case study of Deakyo Co. in successfully implementing EAI. It describes project goal, project organization, project plan, the implemented EAI configuration and its features, the EAI effectiveness to the firm, and the critical success factors of the EAI project. This case study is thought to be useful as a practical guideline in carrying out EAI project of the company and to provide significant basis for constructing the theoretical framework of EAI project methodology.