Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Internet Computing and Services
Journal Basic Information
Journal DOI :
Korean Society for Internet Information
Editor in Chief :
Volume & Issues
Volume 7, Issue 6 - Dec 2006
Volume 7, Issue 5 - Oct 2006
Volume 7, Issue 4 - Aug 2006
Volume 7, Issue 3 - Jun 2006
Volume 7, Issue 2 - Apr 2006
Volume 7, Issue 1 - Feb 2006
Selecting the target year
An Access Control Based Privacy Protection Model in ID Management System
Choi Hyang-Chang ; Noh Bong-Nam ; Lee Hyung-Hyo ;
Journal of Internet Computing and Services, volume 7, issue 1, 2006, Pages 1~16
The vulnerability of privacy in the Identity Management System (IMS) is the most pressing concern of ordinary users. Uncertainty about privacy keeps many users away from utilization of IMS. Therefore, this paper proposes an access-control oriented privacy model for IMS. The proposed model protects privacy using access control techniques with privacy policies in a single circle of trust. We address characteristics of the components of for the proposed model and describe access control procedures. After that, we show the architecture of privacy enforcement and XML-based schema for privacy policies.
Extended GTRBAC Delegation Model for Access Control Enforcement in Enterprise Environments
Hwang Yu-Dong ; Park Dong-Gue ;
Journal of Internet Computing and Services, volume 7, issue 1, 2006, Pages 17~30
With the wide acceptance of the Internet and the Web, volumes of information and related users have increased and companies have become to need security mechanisms to effectively protect important information for business activities and security problems have become increasingly difficult. This paper proposes a improved access control model for access control enforcement in enterprise environments through the integration of the temporal constraint character of the GT-RBAC model. sub-role hierarchies concept and PBDM(Permission Based Delegation Model). The proposed model. called Extended GT-RBAC(Extended Generalized Temporal Role Based Access Control) delegation Model. supports characteristics of GTRBAC model such as of temporal constraint, various time-constrained cardinality, control flow dependency and separation of duty constraints (SoDs). Also it supports conditional inheritance based on the degree of inheritance and business characteristics by using sub-roles hierarchies and supports permission based delegation, user to user delegation, role to role delegation, multi-step delegation and temporal delegation by using PBDM.
Development of CC Based Security Risk Analysis Tool
Kim In-Jung ; Chung Yoon-Jung ; Koh Jae-Young ; Won Dong-Ho ;
Journal of Internet Computing and Services, volume 7, issue 1, 2006, Pages 31~38
The importance of the Security Risk Analysis has emerged as security breaches and information leaks has occurred in the companies and organization: threats toward information system and its vulnerabilities has grown up as the dependence on the information-communication systems goes higher as a result of technological advances in IT industry, A Risk Analysis Tool helps to mitigate overall risk of an organization by analysing and evaluating critical information systems and providing security measures against threats to systems and its vulnerabilities as a means to identify the inherent dangers and prevent security intrusion incident, This paper defines risk analysis process by introducing Common Criteria Scheme and suggest a risk analysis tool that can be easily implemented by an information security manager.
Approximated Model and Chaining Pattern of Hash Functions
Lee Sun-Young ;
Journal of Internet Computing and Services, volume 7, issue 1, 2006, Pages 39~47
The evaluation of MDx family hash functions such as MD5 is difficult because the design background or a generalized model is unknown. In this paper, an approximated model is proposed to generalize hash functions. The diffusion of a input difference is tested by an approximated model for MD5. The results show that MD5 does not provide perfect diffusion, so MD5 is weak against some attacks. We propose a multiple chaining pattern which provides perfect diffusion in approximated model of hash function without extra calculation or memory. And We show the probability of differential characteristics of our proposal.
An Optimum Architecture for Implementing SEED Cipher Algorithm with Efficiency
Shin Kwang-Cheul ; Lee Haeng-Woo ;
Journal of Internet Computing and Services, volume 7, issue 1, 2006, Pages 49~57
This paper describes the architecture for reducing its size and increasing the computation rate in implementing the SEED algorithm of a 12B-bit block cipher, and the result of the circuit design. In order to increase the computation rate, it is used the architecture of the pipelined systolic array, This architecture is a simple thing without involving any buffer at the input and output part. By this circuit, it can be recorded 320 Mbps encryption rate at 10 MHz clock. We have designed the circuit with the VHDL coding, implemented with a FPGA of 50,000 gates.
A Study on the Secure Global Key Recovery System
Yang Hyung-Kyu ; An Young-Hwa ;
Journal of Internet Computing and Services, volume 7, issue 1, 2006, Pages 59~64
Harn al proposed a GKRS(Global Key Recovery System) that combines the functions of the key recovery authorities and the public key certification authorities(CA), Among other features, user dominance(i.e, a user is allowed to select his own public-private key pair and especially a public element for verifying the validity of the public-private key pair)is proposed by  for wide acceptance of GKRS. In this paper, we attack the RSA version of GKRS by showing that its user-dominance feature and the corresponding key verification scheme employed by the CA allow for fraud by users against CA. We propose more secure GKPS than original GKPS, The proposed system makes the probability of user fraud negligible small.
Real-time Avatar Animation using Component-based Human Body Tracking
Lee Kyoung-Mi ;
Journal of Internet Computing and Services, volume 7, issue 1, 2006, Pages 65~74
Human tracking is a requirement for the advanced human-computer interface (HCI), This paper proposes a method which uses a component-based human model, detects body parts, estimates human postures, and animates an avatar, Each body part consists of color, connection, and location information and it matches to a corresponding component of the human model. For human tracking, the 2D information of human posture is used for body tracking by computing similarities between frames, The depth information is decided by a relative location between components and is transferred to a moving direction to build a 2-1/2D human model. While each body part is modelled by posture and directions, the corresponding component of a 3D avatar is rotated in 3D using the information transferred from the human model. We achieved 90% tracking rate of a test video containing a variety of postures and the rate increased as the proposed system processed more frames.
The Bankruptcy Prediction Analysis : Focused on Post IMF KSE-listed Companies
Jeong Yu-Seok ; Lee Hyun-Soo ; Chae Young-Il ; Hong Bong-Hwa ;
Journal of Internet Computing and Services, volume 7, issue 1, 2006, Pages 75~89
This paper is concerned with analysing the bankruptcy prediction power of three models: Multivariate Discriminant Analysis(MDA), Logit Analysis, Neural Network. The research targeted the bankrupted companies after the foreign exchange crisis in 1997 to differentiate from previous research efforts, and all participating companies were randomly selected from the KSE listed companies belonging to manufacturing industry to improve prediction accuracy and validity of the model. In order to assure meaningful bankruptcy prediction, training data and testing data were not extracted within the corresponding period. The result is that prediction accuracy of neural networks is more excellent than that of logit analysis and MDA model when considering that execution of testing data was followed by execution of training data.
A Control Path Analysis Mechanism for Workflow Mining
Min Jun-Ki ; Kim Kwang-Hoon ; Chung Jung-Su ;
Journal of Internet Computing and Services, volume 7, issue 1, 2006, Pages 91~99
This paper proposes a control path analysis mechanism to be used in the workflow mining framework maximizing the workflow traceability and re discoverability by analyzing the total sequences of the control path perspective of a workflow model and by rediscovering their runtime enactment history from the workflow log information. The mechanism has two components One is to generate the total sequences of the control paths from a workflow mode by transforming it to a control path decision tree, and the other is to rediscover the runtime enactment history of each control path out of the total sequences from the corresponding workflow's execution logs. Eventually, these rediscovered knowledge and execution history of a workflow model make up a control path oriented intelligence of the workflow model. which ought to be an essential ingredient for maintaining and reengineering the qualify of the workflow model. Based upon the workflow intelligence, it is possible for the workflow model to be gradually refined and finally maximize its qualify by repeatedly redesigning and reengineering during its whole life long time period.
A Method to Design PBL Courseware Using ICT
Kim Jae-Hyoun ; Lee Yun-Kyu ;
Journal of Internet Computing and Services, volume 7, issue 1, 2006, Pages 101~110
Recently substantial learning model is strongly demanded through which ICT could be effectively used at PBL, teaching and learning method, based on constructivism putting an emphasis on learner centered education. This thesis is designed to introduce the way to make the most of ICT when teachers try to make teaching plan applying PBL to science class. PBL courseware is designed to make teacher and student use by applying traditional science class model to the model for problem solving of PBL. analysing class according to the degree of connecting ICT with contents of learning. This paper suggests 8 stages of PBL package development and 5 stages of teaching pattern to grasp whole procedure,
Impacts of Internet-Based e-business Systems on Business and Financial Performances
Song In-Kuk ;
Journal of Internet Computing and Services, volume 7, issue 1, 2006, Pages 111~120
In spite of proliferating E-business success stories, many executives urge that they have not realized the return expected from investments in Internet-based E-business systems, Most of businesses tend to focus on immediate financial payoffs and overlook the improvements in information capabilities and business performance, The purpose of the research is to investigate the effects of Internet-based E-business systems on organizations' information capabilities, business performance, and financial performance, and to illustrate the roles and values of the systems in achieving business goals. Findings illustrate that when an organization's information capabilities are enhanced by Internet-based E-business systems, business performance tends to improve. In addition, the study implies that the business performance improvement may create consumer benefits, which would be indispensable factors to make a profit.
Implementation of Mobile IPv6 Fast Authorization for Real-time Prepaid Service
Kim Hyun-Gon ;
Journal of Internet Computing and Services, volume 7, issue 1, 2006, Pages 121~130
In next generation wireless networks, an application must be capable of rating service information in real-time and prior to initiation of the service it is necessary to check whether the end user's account provides coverage for the requested service. However, to provide prepaid services effectively, credit-control should have minimal latency. In an endeavor to support real-time credit-control for Mobile IPv6 (MIPv6), we design an implementation architecture model of credit-control authorization. The proposed integrated model combines a typical credit-control authorization procedure into the MIPv6 authentication procedure. We implement it on a single server for minimal latency. Thus, the server can perform credit-control authorization and MIPv6 authentication simultaneously. Implementation details are described as software blocks and units. In order to verify the feasibility of the proposed model. latency of credit-control authorization is measured according to various Extensible Authentication Protocol (EAP) authentication mechanisms. The performance results indicate that the proposed approach has considerably low latency compared with the existing separated models, in which credit-control authorization is separated from the MIPv6 authentication,
Analysis of the Interference between Parallel Socket Connections and Prediction of the Bandwidth
Kim Young-Shin ; Huh Eui-Nam ; Kim Il-Jung ; Hwang Jun ;
Journal of Internet Computing and Services, volume 7, issue 1, 2006, Pages 131~141
Recently, many researchers have been studied several high performance data transmission techniques such as TCP buffer Tuning, XCP and Parallel Sockets. The Parallel Sockets is an application level library for parallel data transfer, while TCP tuning, XCP and DRS are developed on kernel level. However, parallel socket is not analyzed in detail yet and need more enhancements, In this paper, we verify performance of parallel transfer technique through several experiments and analyze character of traffic interference among socket connections. In order to enhance parallel transfer management mechanism, we predict the number of socket connections to obtain SLA of the network resource and at the same time, affected network bandwidth of existing connections is measured mathematically due to the interference of other parallel transmission. Our analytical scheme predicts very well network bandwidth for applications using the parallel socket only with 8% error,
Quickest Path Based Integrated Routing Algorithms for Different Network Router Mechanisms
Bang Young-Cheol ; Chung Sung-Taek ;
Journal of Internet Computing and Services, volume 7, issue 1, 2006, Pages 143~150
The quickest path problem deals with the transmission of a message of size
from a source to a destination with the minimum end to end delay over a network with bandwidth and delay constraints on the links. We consider two basic modes and four variations for the message delivery at the nodes reflecting the mechanisms such as circuit switching. Internet protocol, and their combinations, For each of first five modes, we present O(
) algorithm to compute the quickest path for a given message size
, For the last mode, the quickest path can be computed in O(m+nlogn) time.
Service Differentiation in IEEE 802.11-based Wireless LAN and Throughput Analysis
Lee Gye-Min ; Kang Yung-Gyung ; Choi Chang-Won ;
Journal of Internet Computing and Services, volume 7, issue 1, 2006, Pages 151~164
The DCF of IEEE 802.11 standard coordinates transmissions onto the shared communication channel based on CSMA/CA protocol. Currently, 802,11 is the most widely deployed wireless LAN standard. In this paper, for 802.11-based wireless LAN we propose a service differentiation scheme adopting different contention window sizes and retransmission schemes for two different types of data packets and we present a Markov model for the state of a given station under a finite load traffic condition. We then derive an algorithm to find the transmission probability and the throughput. The proposed model is validated through simulation under various system settings.
On UPAN System Implementation using an NAN System as Ubiquitous Numbering and Address System
Ku Jay-Il ; Chinn Yong-Ok ;
Journal of Internet Computing and Services, volume 7, issue 1, 2006, Pages 165~172
This paper describes which UPAN System Implementation using an NAN System as Ubiquitous Numbering and Address System. IT is based to UPTN and eNUM and also scribed by NAN of the ortho phonic korean alphabet. other case, in English. the UPAN system is integrated by two kind of numbering system, one is PSTN, another is domain name and address based IP. By this result we contributed personal ID and many kind of numbering of telecommunications services and all kind of personal ID and numbering system by the proper auto-raising registration. Now, we are confirmed this is key solution of ubiquitous networking and defined supra service structures.
Performance Analysis of Space-Time Codes on OFDM-CDMA based Broadband Wireless Access Networks
Kang Min-Goo ;
Journal of Internet Computing and Services, volume 7, issue 1, 2006, Pages 173~178
In this paper, a channel estimation based on the time-domain windowing and its imperfectness in OFDM-based multiple-antenna transmission systems are analyzed with an emphasis on a preamble design for multi-channel separation, From the computer simulation results, the OFDM-CDMA system applying a space-time-frequency diversity with a full-rate full diversity code can give the diversity of D = 4 and D = 8 for both multi-user cases of maximum user and half user capacities, respectively