• Title/Summary/Keyword: exchange of information

Search Result 3,556, Processing Time 0.031 seconds

Design of XML Messaging System for Data Exchange of Heterogeneous P2P System (이기종 P2P 시스템 간의 자료 교환을 위한 XML 메세징 시스템 설계)

  • Jung, Hun;Park, Chong-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.9
    • /
    • pp.2147-2154
    • /
    • 2014
  • JXTA does not need to be managed by the central server, and has the property that can communicate with any device that is connected to the network. Thus, JXTA can be applied to the communication between heterogeneous P2P systems. This paper deals with the design of a data exchange system utilizing the JXTA's foregoing property, which is able to connect P2P systems with different protocols and APIs.

A Standardized Design Method of Weapon Information Exchange for Interoperability with Several Kinds of Command and Control System (이기종 지휘통제체계 연동을 위한 무장정보 처리 표준화 설계 방안)

  • Shin, JinBeom;Bae, JungIl;Lee, DongGowan;Koh, Hye-Seung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.6
    • /
    • pp.771-778
    • /
    • 2015
  • In this paper, we have proposed a design method for standardization of weapon information exchange between a weapon control computer of guided missile system and a high echelon command and control system. Because the weapon control computer based on diverse combat platforms is operated with several kinds of a high echelon system, it is necessary to provide a standardized design method for weapon information exchange between mutual system. In fact, it is possible to standardize a interface design specification of weapon information message because weapon information message is closely related to standard tactical data link message. It is essential that the interface design specification of weapon information is submitted to that of tactical data link information. It seems that this interface design specification is very useful in development process of the future weapon system.

Secure Distributed Cryptocurrency Transaction Model Through Personal Cold Wallet (개인용 보안장치를 통한 안전한 분산형 암호 화폐 거래 모델)

  • Lee, Chang Keun;Kim, In-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.187-194
    • /
    • 2019
  • Ever since the world's largest Bitcoin Echange, (Mt. Gox), was closed in March 2014 due to the series of hacking, still many other Exchages incl. recent Coinale in Korea have been attacked. Those hacking attempts never stopped and have caused significant threats to the overall industry of Crypto Currency and resulted in the loss of individual investors' asset. The DEX (Decentralized Exchange) has been proposed as a solution to fix the security problem at the Exchange, but still it is far away to resolve all issues. Therefore, this paper firstly analyzes security threats against existing Crypto Currency Exchanges and secondly derives security requirements for them. To do that it proposes a secure and distributed Crypto Currency Transaction Model through Personal Security devices as a solution. The paper also proves this new attempt by demonstrating its unique modelling; ultimately by adopting this modeling into Crypto Exchange is to avoid potential security threats.

A Study on the Information Exchange Technique among Electric Power Facilities and Monitoring Systems (전력 설비 감시 시스템들 간의 정보 교환 기법에 관한 연구)

  • Hong, Chang-Ho;Park, Chan-Eom;Lee, Seung-Chul;Hoon, Un-Chul
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2006.05a
    • /
    • pp.453-456
    • /
    • 2006
  • In this paper, we introduce the design and implementation of Information exchange technique among power system facilities and/or their monitoring systems based on Universal Description, Discovery and Integration Service and Simple Object Access Protocol. The rapid progresses in high speed network, 4G web language S/W and embedded H/W enabled faster and easier communications among electric power systems monitoring facilities. However, each facility or system has its own specific protocol like RS-232 and RS-486, which somewhat limits the capability of flexible information exchange among thor In this paper, we try to demonstrate the potential of utilizing the SOAP and UDDI services in exchanging the metadata and possibly high abstraction level informations among electric power facilities and/or their monitoring systems.

  • PDF

Customer Satisfaction Strategy managing the Power IT Customer Service Center (전력IT 고객서비스센터 운영을 통한 고객서비스 향상 방안)

  • Jeong, Sun-Ho;Choi, Bong-Soo;Lee, Chang-Gyu
    • Proceedings of the KIEE Conference
    • /
    • 2007.11b
    • /
    • pp.130-132
    • /
    • 2007
  • 전력산업 구조개편이 진행된 이후 전력IT 분야에도 많은 이해관계자들이 형성되었으며, 내 외부의 많은 고객들이 형성되었다. 또한 전력시장운영과 계통운영을 위한 IT설비는 고도로 발달하여 손쉽게 이해하고 사용하기 어려울 정도로 복잡해지고 고도화 되었다. 이러한 상황에서 전력IT 분야에 대한 고객서비스를 향상 전략으로 고객과의 최접점에서 고객을 알고 고객을 지원하기 위해 전력IT 고객서비스센터를 설치하여 운영하게 되었다. 많은 예산과 인력이 투입되는 본격적인 콜센터나 서비스 데스크를 도입하기에 앞서 기존의 업무체계와 인력재배치를 통해 전력IT 분야에 대한 콜센터인 "전력IT 고객서비스센터"를 운영하여 효과적으로 고객서비스 요청에 응대하여 고객만족도 향상을 기대할 수 있을 것이며, 또한 여러 조직에서 비용과 인력을 사용하지 않고 쉽게 적용해 볼 수 있는 모델이 될 수 있을 것이다.

  • PDF

An Implementation and Evaluation of Improved Anti-DoS IKE Protocol Engine for Interaction with IPsec System (IPsec과 연동되는 개선된 Anti-DoS IKE 프로토콜 엔진의 구현 및 평가)

  • Kim, Sung-Chan;Choun, Jun-Ho;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.11B
    • /
    • pp.1005-1016
    • /
    • 2006
  • As the increment usage of Internet, the security systems's importance is emphasized. The current Internet Key Exchange protocol(IKE) which has been used for key exchange of security system, was pointed out a problem of efficiency and stability. In this research, we try to resolve those problems, and evaluate the newly designed Key Exchange protocol in the IPsec interaction test bed system environment. In this research we implemented the new Key Exchange Protocol as a recommendation of RFC proposal, so as to resolve the problem which was pointed out the key exchange complexity and the speed of authentication process. We also designed the defense mechanism against the Denial of Service attack. We improved the key exchange speed as a result of simplification of complex key exchange phase, and increased efficiency as a result of reuse the preexistence state value when it's renegotiated.

Design of Viterbi Decoders Using a Modified Register Exchange Method (변형된 레지스터 교환 방식의 비터비 디코더 설계)

  • 이찬호;노승효
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.40 no.1
    • /
    • pp.36-44
    • /
    • 2003
  • This paper proposes a Viterbi decoding scheme without trace-back operations to reduce the amount of memory storing the survivor path information, and to increase the decoding speed. The proposed decoding scheme is a modified register exchange scheme, and is verified by a simulation to give the same results as those of the conventional decoders. It is compared with the conventional decoding schemes such as the trace-back and the register exchange scheme. The memory size of the proposed scheme is reduced to 1/(5 x constraint length) of that of the register exchange scheme, and the throughput is doubled compared with that of the trace-back scheme. A decoder with a code rate of 2/3, a constraint length, K=3 and a trace-back depth of 15 is designed using VHDL and implemented in an FPGA. It is also shown that the modified register exchange scheme can be applied to a block decoding scheme.

Multi-Server Authenticated Key Exchange Protocol (다중서버를 이용한 인증된 키교환 프로토콜)

  • 이정현;김현정;이동훈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.87-97
    • /
    • 2003
  • In this paper, we define two security concepts, “non-computable security” and “distribution security”, about authentication information committed to a authentication server without any trustee, and propose an authenticatied key exchange protocol based on password, satisfying “distribution security”. We call it MAP(Muti-Server Authentication Protocol based on Password) and show that SSSO(Secure Single Sign On) using MAP solves a problem of SSO(Single Sign On) using authentication protocol based on password with a trustee.

Institutional Approach to Healthcare Information Exchange: Focused on Medical Law (의료법상 진료정보교류를 위한 법제도적 고찰)

  • Kim, Soomin;Park, Jong Son
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.10
    • /
    • pp.483-491
    • /
    • 2017
  • Compared to penetration of Electronic Medical Record(EMR) system, Healthcare Information Exchange(HIE) has been less active in South Korea. The aim of this study is to explore medical law newly legislated to introduce HIE through the nation. The important insights are that the medical institutions exchange the patient's healthcare information based on the consent of the patient, and it is expected to be set up and managed the medical record exchange support system by the government and a consignment organization. In addition, the certification program for standardization and interoperability on the EMR system would be conducted. Nevertheless, continued policy developments and researches for the promotion of HIE will be urgently needed such as the education for the vendors and developers, developments of the certification programs and the incentive payment programs and the public relations.

An Effective Data Exchange of Curves (곡선의 효율적 자료 교환)

  • 김혁진
    • Journal of the Korea Society of Computer and Information
    • /
    • v.3 no.3
    • /
    • pp.31-40
    • /
    • 1998
  • Recently computer graphics and CAD systems of many kinds have been developed. and this trends will be more increased in the future because the application fields are diverse However, data exchange problems between these systems will be occurred as the system kinds increase. Standards for solving these problems are made by IGES and STEP. etc, Nevertheless, it is unsatisfactory now because data exchange between different systems is not running well with reliability and efficiency. Because vendors implement with different ways, data exchange of the curves and surfaces between different systems which are based in the geometric modeling system, does not satisfy. This paper is a research for curve conversion in the data exchange between different systems. Also this paper analyzed the transferring data which are effectively conversed the curves among the four different types of curves in the less important curve shape environment.

  • PDF