Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Internet Computing and Services
Journal Basic Information
Journal DOI :
Korean Society for Internet Information
Editor in Chief :
Volume & Issues
Volume 6, Issue 6 - Dec 2005
Volume 6, Issue 5 - Oct 2005
Volume 6, Issue 4 - Aug 2005
Volume 6, Issue 3 - Jun 2005
Volume 6, Issue 2 - Apr 2005
Volume 6, Issue 1 - Feb 2005
Selecting the target year
An Efficient Role Based Access Control Technique by Structuring of Role Specification Certificate
Yang, Soo-Mi ;
Journal of Internet Computing and Services, volume 6, issue 5, 2005, Pages 1~9
In a role based access control through attribute certificate, the use of role assignment certificates and role specification certificates can reduce management cost and the overhead incurred by changing roles, Highly distributed computing environments such as ubiquitous computing environments not having global or broad control. need another attribute certificate management technique, Actually just having role specification certificate separately reduce management cost, But for better performance we structure role specification, We group roles and make the role group relation tree, It results secure and efficient role renewing and distribution, For scalable role specification certificate distribution, the multicasting of packets is used, We take into account the packet lass and quantify performance enhancements of structuring role specification certificates
A Study on Secure Binding Update Protocol Supporting Mobile Nodes with Constraint Computational Power in Mobile IPv6 Environment
Choi, Sung-Kyo ; You, Il-Sun ;
Journal of Internet Computing and Services, volume 6, issue 5, 2005, Pages 11~25
In MIPv6 environment, an important design consideration for public key based binding update protocols is to minimize asymmetric cryptographic operations in mobile nodes with constraint computational power, such as PDAs and cellular phones, For that, public key based protocols such as CAM-DH. SUCV and Deng-Zhou-Bao's approach provides an optimization to offload asymmetric cryptographic operations of a mobile node to its home agent. However, such protocols have some problems in providing the optimization. Especially, CAM-DH with this optimization does not unload all asymmetric cryptographic operations from the mobile node, while resulting in the home agent's vulnerability to denial of service attacks. In this paper, we improve the drawbacks of CAM-DH. Furthermore, we adopt Aura's two hash-based CGA scheme to increase the cost of brute-force attacks searching for hash collisions in the CGA method. The comparison of our protocol with other public key based protocols shows that our protocol can minimize the MN's computation overhead, in addition to providing better manageability and stronger security than other protocols.
EAP Using Split Password-based Authenticated Key Agreement Protocol for IEEE Std 802.1x User Authentication
Ryu, Jong-Ho ; Seo, Dong-Il ; Youm, Heung-Youl ;
Journal of Internet Computing and Services, volume 6, issue 5, 2005, Pages 27~43
EAP provides authentication for each entity based on IEEE Std 802.1x Wireless lAN and RADIUS/DIAMETER protocol, and it uses certificate, dual scheme(e.g., password and token) with the authentication method. The password-based authentication scheme for authenticated key exchange is the most widely-used user authentication method due to various advantages, such as human-memorable simplicity, convenience, mobility, A specific hardware device is also unnecessary, This paper discusses user authentication via public networks and proposes the Split Password-based Authenticated Key Exchange (SPAKE), which is ideal for both authenticating users and exchanging session keys when using a subsequent secure communication over untrusted network, And then we provides EAP authentication framework EAP-SPAKE by using it.
Anomaly Detection Performance Analysis of Neural Networks using Soundex Algorithm and N-gram Techniques based on System Calls
Park, Bong-Goo ;
Journal of Internet Computing and Services, volume 6, issue 5, 2005, Pages 45~56
The weak foundation of the computing environment caused information leakage and hacking to be uncontrollable, Therefore, dynamic control of security threats and real-time reaction to identical or similar types of accidents after intrusion are considered to be important, h one of the solutions to solve the problem, studies on intrusion detection systems are actively being conducted. To improve the anomaly IDS using system calls, this study focuses on neural networks learning using the soundex algorithm which is designed to change feature selection and variable length data into a fixed length learning pattern, That Is, by changing variable length sequential system call data into a fixed iength behavior pattern using the soundex algorithm, this study conducted neural networks learning by using a backpropagation algorithm. The backpropagation neural networks technique is applied for anomaly detection of system calls using Sendmail Data of UNM to demonstrate its performance.
Zoom Lens Calibration for a Video Measuring System
Hahn, Kwang-Soo ; Choi, Joon-Soo ; Choi, Ki-Won ;
Journal of Internet Computing and Services, volume 6, issue 5, 2005, Pages 57~71
Precise visual measurement applications, like video measuring system (VMS), use camera systems with motorized zoom lens for fast and efficient measurement. In this paper, we introduce an efficient calibration method for zoom lens of VMS controlled by servo motor. For the automated zoom lens calibration of the VMS, only zoom lens setting needs to be calibrated and parameters calibrated by zoom lens settings are image center and pixel size changed by zoom levels, The extrinsic parameters, like focus and iris, do not need to be calibrated since the parameters are usually fixed, It needs a lot of time and effort to calibrate the camera for ali the different zoom levels. In this paper, we also propose an efficient and fast zoom lens calibration method, which calculates the calibration parameters of the zoom lens settings for the minimum number of zoom levels and estimates other parameters for the uncalculated zoom levels using the interpolation of the calculated parameter values.
An improved information input algorithm and information input device using Tactile devices based on wearable PC
Shin, Jeong-Hoon ; Hong, Kwang-Seok ;
Journal of Internet Computing and Services, volume 6, issue 5, 2005, Pages 73~83
This paper proposes both a novel tactile human-computer interface method and an improved algorithm for the wearable PC. Under the condition of Ubiquitous computing, the next generation PC aims at effective representation and integration of colors, brightness of light. sound, odor, taste and feelings. Also, it aims at human being centered man-machine interface. In spite of various functions of the wearable PC, for the convenience of possessing, hardware platform for the wearable PC should be small-sized and light weighted one. The main problems of making small sized PC are user interfaces, like keyboard, monitor and so on. The traditional user interfaces have critical limitations for reducing their size. In this paper, we propose a novel user input method and improved algorithm to constructing small sized, light weighted and wearable PC. And, we verify the effectiveness of suggested method and algorithm compared to the traditional algorithm.
Feature point extraction using scale-space filtering and Tracking algorithm based on comparing texturedness similarity
Park, Yong-Hee ; Kwon, Oh-Seok ;
Journal of Internet Computing and Services, volume 6, issue 5, 2005, Pages 85~95
This study proposes a method of feature point extraction using scale-space filtering and a feature point tracking algorithm based on a texturedness similarity comparison, With well-defined operators one can select a scale parameter for feature point extraction; this affects the selection and localization of the feature points and also the performance of the tracking algorithm. This study suggests a feature extraction method using scale-space filtering, With a change in the camera's point of view or movement of an object in sequential images, the window of a feature point will have an affine transform. Traditionally, it is difficult to measure the similarity between correspondence points, and tracking errors often occur. This study also suggests a tracking algorithm that expands Shi-Tomasi-Kanade's tracking algorithm with texturedness similarity.
Design and Implementation of Mobile Web Map Service
Choi, Jae-Young ; Chung, Yeong-Jee ;
Journal of Internet Computing and Services, volume 6, issue 5, 2005, Pages 97~110
Recently, many WMS(Web Map Services) and POI(Point of Interest) services come to be in service on the Internet using Web GIS(Geographic Information System) as Information Technology and computer H/W are evolved faster in its speed, network bandwidth and features. The Web GIS is, however, limited and constrained on the specification of its system configuration, the service class provided and the presentation methodology of a map. As the mobile Internet becomes popular in mobile service, Web GIS service on mobile environment is strongly required and to be provided by location based WMS(Web Map Service) on a mobile client such as PDA with location information of the user. In this paper, we made an effort to design and implement a GIS computing environment by thin client for mobile web map service. For implementing the thin client GIS computing environment. we were using NGII's(National Geographic Information Institute's) DXF map, representing the map by SVG(Scalable Vector Graphics) recommended by OGC(OpenGis Consortium), and adapting standard XML web service to provide the thin client GIS service on PDA by applying the location information of the user in realtime with GPS on mobile environment.
A Visualization Method for the Efficient Product Searching in Internet Shopping Mall
Whangbo, Taeg-Keun ; Lee, Soo-Jin ;
Journal of Internet Computing and Services, volume 6, issue 5, 2005, Pages 111~121
As the scale of e-commerce has been increasing, information about products and service become diversified, Most current internet shopping mall. however, provides product information to consumers in collective arrangement. thus they devote a lot of efforts and time to select the product they want, In this paper, as providing consumers convenient interfaces adapting feature inquirer and parallel coordinate, a method for selecting a right product through searching the wanted products easily and comparing their features efficiently has been proposed. To evaluate the efficiency of the method proposed in this paper, several experiments to measure the time spent and the number of clicks of mouse taken in finding the product they want have been conducted. The results verify the effectiveness of the proposed method.
A Delay Reduction Algorithm for Vertical Handover between WLAN and UMTS
Kim, Byung-Gi ;
Journal of Internet Computing and Services, volume 6, issue 5, 2005, Pages 123~132
By complementary integration of WLAN and UMTS, a Beyond third Generation(B3G) mobile network can be constructed to establish the fastest global roaming environments, There are 2 types of B3G networks: loosely-coupled and tightly-coupled, A tightly-coupled network demands lots of investment and considerable amount of time to construct. On the other hand a loosely-coupled network is more scalable and easier to implement than a tightly-coupled one, But it has critical drawbacks of packet loss and blocking of services due to handover delay, To alleviate these drawbacks this thesis proposes a vertical handover procedure between WLAN and UMTS, which is based on MAP of HMIPv6, Performance of the proposal is evaluated in terms of blocking probabilities, The proposed procedure based on HMIPv6 shows better performance than those based on MIP.
A Study on the Simulator Design of OFDM/QPSK Image Transmission System Embedded Watermark in Wireless Channel Environment
Seo, In-Hye ; Kim, Ji-Woong ; Kang, Heau-Jo ;
Journal of Internet Computing and Services, volume 6, issue 5, 2005, Pages 133~141
In this paper, we designed about OFDM/QPSK image transmission system simulator embedded watermark in wireless channel environment. Channel environment used OFDM/QPSK still image transmission system considering AWGN, Multi-path fading. And, we analyzed effect of still image and watermark information in considered channel environment. Watermark information is coded by DM-SS (Direct Matric/Spread Spectrum) image watermarking scheme, Also, we used interleaving scheme for mitigating the degradation in watermarking data under wireless channel. As a results, we could know that PSNR of watermark image improved of about 1dB by 54.2371dB then apply interleaving in same multi-path fading environment.
Internet Advertising System based on Wireless LAN Access Point
Kim, Young-Dae ; Jeong, Geun-Ho ; Choi, Jae-Young ;
Journal of Internet Computing and Services, volume 6, issue 5, 2005, Pages 143~154
This paper presents a reliable multicast transmission for the advertising-supported Access Point in which a user can use a wireless network access service through receiving the advertisement. In this paper we propose a application-layer multicast protocol that controls a transmission rate of the mobile device for the reliable multicast in wireless LAN environment. Internet advertising includes all means and medias for advertising on the Internet in order to raise sales or popularity of the products or services. Since the current Internet advertising systems are passive, the target systems are exposed to unspecified persons and its exposure rates of the advertisement are changeable and unpredictable. In this paper, we propose an Internet advertising system, with which users can access the wireless Internet without charge, advertisers can provide customized advertisement according to location, time, and categories of users, and owners of network infrastructure can manage the system with a low cost.
Design and Implementation of Scalable ID Federation System in Mobile Computing Environments
Ryoo, In-Tae ; Kim, Bae-Hyun ; Moon, Young-Jun ; Cho, Yeong-Sub ; Jin, Seung-Hun ;
Journal of Internet Computing and Services, volume 6, issue 5, 2005, Pages 155~166
Currently, almost of all the Internet users have as many IDs as the number of sites they have subscribed for, The users should memorize and input every independent ID and password whenever they want to login to the system. Although ID management system is used to solve this problem, 10 and password management will become more complicated in the forthcoming ubiquitous computing environments because so many computers will be interconnected on various kinds of wired and wireless networks, Furthermore, it is not enough to use the existing single Circle of Trust (COT) ID management system for the forthcoming computing environments. To solve this problem, the paper proposes ID federation models in multiple COT domain and implements an ID federation system that can be scaled to mobile computing environment as well as wired computing environment. The proposed ID federation models has been verified to operate with no problem between the systems in different trust domains by doing the ID scaability test
Estimating Position of Mobiles by Multi-Criteria Decision Making
Kim, Jung-Eun ; Kang, Il-Go ; Lee, Jong-Chan ; Lee, Yang-Weon ; Oh, Jae-Chul ;
Journal of Internet Computing and Services, volume 6, issue 5, 2005, Pages 167~175
In the microcell or picocell-based system the frequent movements of mobiles bring about excessive traffics Into the networks. A mobile location estimation mechanism can facilitate both efficient resource allocation and better QoS provisioning through handoff optimization. Existing location estimation schemes consider only LOS model and have poor performance in presence of multi-path and shadowing. In this paper we study multi-criteria decision making which can increase estimation accuracy by considering other multiple decision parameters than the received signal strength
Analysis of Optimistic Cache Protocols based on broadcasting for Mobile Computing Environments
Cho, Sung-Ho ;
Journal of Internet Computing and Services, volume 6, issue 5, 2005, Pages 177~185
Caching in mobile computing environments Is an important technique that will reduce the effects such as limitation of bandwidth, restriction of resources and frequent disconnection. To reduce limitation and disconnection problems in mobile computing, a new form of caching system have been proposed based on a broadcast approach. This paper proposes a broadcast based cache protocol and examines the behaviors of the proposed scheme and well known schemes such as multiversion based scheme and Certification Reports. By a detailed simulation, we show some characteristics of different approaches to detect and resolve conflicts. We also show proposed scheme out performs other schemes with a low space and operation overhead.