Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Information Processing Systems
Journal Basic Information
Journal DOI :
Korea Information Processing Society
Editor in Chief :
Volume & Issues
Volume 3, Issue 2 - Dec 2007
Volume 3, Issue 1 - Jun 2007
Selecting the target year
Addressing Mobile Agent Security through Agent Collaboration
Jean, Evens ; Jiao, Yu ; Hurson, Ali-R. ;
Journal of Information Processing Systems, volume 3, issue 2, 2007, Pages 43~53
DOI : 10.3745/JIPS.2008.3.2.043
The use of agent paradigm in today`s applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execution environment; while hosts aim at preventing the execution of potentially malicious code. In general, hosts support the migration of agents through the provision of an agent server and managing the activities of arriving agents on the host. Numerous studies have been conducted to address the security concerns present in the mobile agent paradigm with a strong focus on the theoretical aspect of the problem. Various proposals in Intrusion Detection Systems aim at securing hosts in traditional client-server execution environments. The use of such proposals to address the security of agent hosts is not desirable since migrating agents typically execute on hosts as a separate thread of the agent server process. Agent servers are open to the execution of virtually any migrating agent; thus the intent or tasks of such agents cannot be known a priori. It is also conceivable that migrating agents may wish to hide their intentions from agent servers. In light of these observations, this work attempts to bridge the gap from theory to practice by analyzing the security mechanisms available in Aglet. We lay the foundation for implementation of application specific protocols dotted with access control, secured communication and ability to detect tampering of agent data. As agents exists in a distributed environment, our proposal also introduces a novel security framework to address the security concerns of hosts through collaboration and pattern matching even in the presence of differing views of the system. The introduced framework has been implemented on the Aglet platform and evaluated in terms of accuracy, false positive, and false negative rates along with its performance strain on the system.
Actual Condition and Issues for Mobile Security System
Sakurai, Kouichi ; Fukushima, Kazuhide ;
Journal of Information Processing Systems, volume 3, issue 2, 2007, Pages 54~63
DOI : 10.3745/JIPS.2008.3.2.054
The high-speed mobile Internet has recently been expanded, many attractive services are provided. However, these services require some form of security-related technology. This paper outlines Japanese mobile services and exposits some mobile security topics including mobile spam, mobile malware, mobile DRM system, mobile WiMAX security, and mobile key management.
Use of Mobile Devices in the Performance of Group Decision-Making under Contextual Pressure
Kwon, Oh-Byung ; Kim, Tae-Kyung ; Kim, Choong-Rhyun ;
Journal of Information Processing Systems, volume 3, issue 2, 2007, Pages 64~72
DOI : 10.3745/JIPS.2008.3.2.064
Mobile technology appears promising as a method to promote group performance in circumstances dependent on time, but not member proximity. However, the success of mobile technology in group decision-making situations has not yet been proven. This paper aims to see how mobile technology affects the performance of group decision-making tasks that should be resolved urgently and/or sources of idea are disconnected with on-line network. Laboratory experiment was used to investigate the effects of mobile factors on group decision-making. The results from the experiment supported the proposition that pressures of time and location play a significant role in the assessment of group decision performance measures. We found that the adoption of mobile technology to group decision-making procedures might be competitive when group decision-making tasks are urgent and sources of idea are disconnected with on-line network, even though mobile technology is not a panacea on which to depend when designing group decision-making.
Optimization of Domain-Independent Classification Framework for Mood Classification
Choi, Sung-Pil ; Jung, Yu-Chul ; Myaeng, Sung-Hyon ;
Journal of Information Processing Systems, volume 3, issue 2, 2007, Pages 73~81
DOI : 10.3745/JIPS.2008.3.2.073
In this paper, we introduce a domain-independent classification framework based on both k-nearest neighbor and Naive Bayesian classification algorithms. The architecture of our system is simple and modularized in that each sub-module of the system could be changed or improved efficiently. Moreover, it provides various feature selection mechanisms to be applied to optimize the general-purpose classifiers for a specific domain. As for the enhanced classification performance, our system provides conditional probability boosting (CPB) mechanism which could be used in various domains. In the mood classification domain, our optimized framework using the CPB algorithm showed 1% of improvement in precision and 2% in recall compared with the baseline.
A Delegation Model based on Agent in Distributed Systems
Kim, Kyu-Il ; Lee, Joo-Chang ; Choi, Won-Gil ; Lee, Eun-Ju ; Kim, Ung-Mo ;
Journal of Information Processing Systems, volume 3, issue 2, 2007, Pages 82~88
DOI : 10.3745/JIPS.2008.3.2.082
Web services are the new building block of today`s Internet, and provides interoperability among heterogeneous distributed systems. Recently in web services environment, security has become one of the most critical issues. The hackers attack one of fragile point and can misuse legitimate user privilege because all of the connected devices provide services for the user control and monitoring in real time. Also, the users of web services must temporarily delegate some or all of their rights to agents in order to perform actions on their behalf. This fact risks the exposure of user privacy information. In this paper, we propose secure delegation model based on SAML that provides confidentiality and integrity about the user information in distributed systems. In order to support privacy protection, service confidentiality, and assertion integrity, encryption and a digital signature mechanism is deployed. We build web service management server based on XACML, in order to manage services and policies of web service providers.