• Title/Summary/Keyword: directory server

Search Result 49, Processing Time 0.029 seconds

The design of AIN SDF Server about the application of the X.500 for supporting the SCF/SDF in AIN (AIN에서 SCF/SDF 인터페이스에 X.500 적용을 위한 AIN SDF Server 설계)

  • Park, Mun-Seong;O, Ju-Byeong;Jin, Byeong-Un;Kim, Hye-Gyu;Park, Seong-Yeol
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.5
    • /
    • pp.655-666
    • /
    • 1995
  • Advanced Intelligent Network(AIN) and X.500 directory service have similarity in between. X.500 capabilities and the requirements for the Service Control Function(SCF) to Service Data Function(SDF) in AIN. As an interface, SCF can be mapping as a Directory User Agent(DUA) and SDF can be mapping as a Directory System Agent(DSA). Based on the concepts, X.500 directory can be applied to AIN. In this paper we suggest to apply the X.500 DSP to the SDF/SDF interface to perform a distribution function. Also we show that the SCF-SDF/SDF-SDF relationship can be possible under applying X.500 DAP/DSP within the set of Capability Set 1 (CS1),CS2 and CS3. Finally, based on the above contents, we introduce the designed schematic of AIN SDF Server System for a distributed processing in AIN and design the X.500 schema of Universal Personal Telecommunication(UPT) service for supporting AIN SDF Server.

  • PDF

Vulnerability of Directory List and Countermeasures (디렉토리 리스팅 취약점 및 대응책)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.259-264
    • /
    • 2014
  • The web server is configured to display the list of files contained in this directory. This is not recommended because the directory may contain files that are not normally exposed through links on the web site. The directory list have some serious vulnerability to show internal files and directory to outsider attackers. Therefore, the proposed countermeasure of directory list is presented to prevent unnecessary valuable information from outsider attackers.

A Study on Secure Kerberos Authentication using Trusted Authority in Network Structure (네트웍 환경에서 안전한 Kerberos 인증 메커니즘에 관한 연구)

  • 신광철;정진욱
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.123-133
    • /
    • 2002
  • In Network Environment, Kerberos certification mechanism to require Kerberos server in other area unconditionally belief. Also, Kerberos server in cooperation area must be share server of other area and secret key. To solve these two problems, this paper proposed safe security mechanism of doing to ably IETF CAT's PKINIT/PKCROSS a1gorithm with Public Key Infrastructure and use Directory System and service between realms do trust and prove each Kerberos trust center base. Also, Although Kerberos server of each area must be foreknowing each server's secret key and public key, Obtain through Trust center and acquire each area's public key and common symmetric key, Application server excluded process that must register key in Key Distribution Center.

A Server-Independent Password Authentication Method for Access-Controlled Web Pages Using the SHA-1 Algorithm (SHA-1 방식을 이용한 제한된 웹 페이지에 접근하기 위한 서버 독립적인 패스워드 인정 방안)

  • 하창승;조익성
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.4
    • /
    • pp.146-153
    • /
    • 2001
  • A new password authentication method Is proposed in this paper for the purpose of providing web page authors the convenience in deploying password-protected Web realms at a web server. According to this method. a web realm is mapped to a secret directory at the web server. in which access-controlled web pages are stored. A password is used to construct the name of the secret directory. A javaScript code is embedded in a sign-in web pageoutside the secret directory, which converts the user-entered password into the directory name and forms a complete URL pointing to an access-controlled web page inside the secret directory. Thus, only users knowing the password can compose a valid URL and retrieve the access-controlled web page. Using this method, web page authors can deploy password-protected web realms in a server-independent manner.

  • PDF

Empirical Data Analysis of a Social Network Name-Directory Service with Advertisements (광고를 동반한 소셜 네트워크 이름-디렉터리 서비스의 실험적 데이터 분석)

  • Kim, Yung Bok
    • Journal of Information Technology Services
    • /
    • v.13 no.4
    • /
    • pp.189-203
    • /
    • 2014
  • With the evolution of Internet technologies and the increasing variety of Internet devices, advertisements in various web services have also expanded. Interactive web services often go hand in hand with effective advertisements for a business model. We estimated statistical parameters of the interactive web server for service monitoring and advertisement-effect. In the web pages, we integrated the plugins of social networking services (SNSs) (e.g. Facebook, Twitter) and an advertisement scheme (e.g. Google AdSense) that regards social name-directory contents. Empirical data analysis and statistical results are presented with the implementation of estimations of parameters (e.g. utilization-level and serviceability) and advertisements in a social networking name-directory service (http://ktrip.net or http://한국.net). We found that estimated parameters were applicable to service monitoring of web-server as well as to synthesis of advertisement-effect in our social-web name-directory service.

IntoPub: A Directory Server for Bioinformatics Tools and Databases

  • Jung, Dong-Soo;Kim, Ji-Han;Lee, Sang-Hyuk;Lee, Byung-Wook
    • Interdisciplinary Bio Central
    • /
    • v.3 no.3
    • /
    • pp.12.1-12.3
    • /
    • 2011
  • Bioinformatics tools and databases are useful for understanding and processing various biological data. Numerous resources are being published each year. It is not a trivial task to find up-to-date relevant tools and databases. Moreover, no server is available to provide comprehensive coverage on bioinformatics resources in all biological fields. Here, we present a directory server called IntoPub that provides information on web resources. First, we downloaded XML-formatted abstracts containing web URLs from the NCBI PubMed database by using 'ESearch-EFetch' function in the NCBI E-utilities. The information is obtained from abstracts in the PubMed by extracting 'www' or 'http' prefixes. Then, we cu-rate the downloaded abstracts both in automatic and manual fashion. As of July 2011, the IntoPub database has 12,118 abstracts containing web URLs from 174 journals. Our anal-ysis shows that the number of abstracts containing web resources has increased signifi-cantly every year. The server has been tested by many biologists from several countries to get opinion on user satisfaction, usefulness, practicability, and ease of use since January 2010. In the IntoPub web server, users can easily find relevant bioinformatics resources, as compared to searching in PubMed. IntoPub will continue to update and incorporate new web resources from PubMed and other literature databases. IntoPub, available at http://into.kobic.re.kr/, is updated every day.

Construction of synchronized Database Server for federation among heterogeneous Directory Facilitators (이 기종 Directory Facilitator 간의 Federation을 위한 동기화 DB서버 구축)

  • Yoon, Yoe-Jin;Lee, Seung-Hyun;Choi, Kee-Hyun;Shin, Dong-Ryeol
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.653-654
    • /
    • 2008
  • A DF (Directory Facilitator) provides yellow pages services for other agents in agent platform. That is to say, the agents are able to register the descriptions of the services they provide for DF or inquire DF about the services other agents provide. The Current DF cannot federate with heterogeneous agent platforms. Because DF is not opened to the other DF in the heterogeneous agent platform, it is need to something about federation technology between them. Thus, we propose the database server for the federation technology among DFs. The main purpose of the database server is to provide the environment where agents can register their services and search about the services that other agents on the heterogeneous platform provide.

  • PDF

Enhanced Server Availability for DDoS Amplification Attack Using CLDAP Protocol (CLDAP 프로토콜을 이용한 DDoS 증폭공격에 대한 서버 가용성 향상방안 연구)

  • Choi, Suk June;Kwak, Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.1
    • /
    • pp.19-26
    • /
    • 2018
  • Recently, DDoS amplification attacks using servers that provide Microsoft Active Directory information using CLDAP protocol are increasing. Because CLDAP is an open standard application that allows a wide range of directory information to be accessed and maintained in a network, the server is characterized by its openness to the Internet. This can be exploited by the Reflector server to perform an amplification attack by an attacker. In addition, this attack can be attacked with a packet that is amplified 70 times more than the conventional UDP-based flooding attack, and it can block service to small and medium sized server. Therefore, in this paper, we propose an algorithm that can reduce the DDoS amplification attack using CLDAP server and implement the corresponding CLDAP server environment virtually, and implement and demonstrate the corresponding algorithm. This provides a way to ensure the availability of the server.

Implementation of a B-Link Interface Logic for a SCI Interconnect (SCI 연결망의 B-Link 인터페이스 회로 구현)

  • 한종석;모상만;기안도;한우종
    • Proceedings of the IEEK Conference
    • /
    • 1999.11a
    • /
    • pp.412-415
    • /
    • 1999
  • In this paper, we describe an implementation of the B-Link bus interface logic for a directory controller and a remote access cash controller in the SCI-based CC-NUMA multimedia server developed by ETRI . The CC-NUMA multimedia server is composed of a number of Pentium III SHV nodes and a SCI interconnection network. To communicate with remote nodes, each node has a CC-Agent which consists of a processor bus interface(PIF). a directory controller(DC), a remote access cash controller(RC), and two SCI 1ink controllers(LCs). The B-Link bus interface logic is developed for a directory controller and a remote access cash controller in order to communicate with a SCI link controller on a B-Link bus. It consists of a sending master controller a receiving slave controller, and asynchronous data buffers. And It performs a self-arbitration, a data packet transmission, a queue allocation, an early terminal ion. and a cut-through data path.

  • PDF

SELFCON: An Architecture for Self-Configuration of Networks

  • Boutaba, Raouf;Omari, Salima;Singh Virk, Ajay Pal
    • Journal of Communications and Networks
    • /
    • v.3 no.4
    • /
    • pp.317-323
    • /
    • 2001
  • Traditional configuration management involves complex labor-intensive processes performed by experts. The configuration tasks such as installing or reconfiguring a system, provisioning network services and allocating resources typically involve a large number of activities involving multiple network elements. The network elements may be associated with proprietary configuration management instrumentation and may also be spread across heterogeneous network domains thereby increasing the complexity of configuration management. This paper introduces an architecture for the self-configuration of networks (SELFCON). The proposed architecture involves a directory server, which is uses to maintain configuration information. The configuration information stared in the directory server is modeled using the standard DEN specification thereby allowing effective exchange of network, system and configuration management data among heterogeneous management domains. SELFCON associates configuration intelligence with the components of the network, rather than limit it to a centralized management station. The network elements are notified about related changes in configuration policies, based upon which, they perform self-configuration. SELFCON is able to provide automation of configuration management and also an effective unifying framework for enterprise management.

  • PDF