Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Internet Computing and Services
Journal Basic Information
Journal DOI :
Korean Society for Internet Information
Editor in Chief :
Volume & Issues
Volume 7, Issue 6 - Dec 2006
Volume 7, Issue 5 - Oct 2006
Volume 7, Issue 4 - Aug 2006
Volume 7, Issue 3 - Jun 2006
Volume 7, Issue 2 - Apr 2006
Volume 7, Issue 1 - Feb 2006
Selecting the target year
A Heterogeneous Mobile Data Synchronization Technique Using the Tuple Based Message Digest
Park, Seong-Jin ;
Journal of Internet Computing and Services, volume 7, issue 5, 2006, Pages 1~12
In mobile database environments, the efficient synchronization technique is required to maintain the consistency of replicated data because the same data can be replicated between so many different databases, In this paper, we propose a message digest based synchronization technique to maintain the consistency of replicated data between client databases and a server database in mobile environments. The proposed data synchronization technique has the advantage of generality aspect and extensibility aspect by using the tuple-based message digest output to detect the data conflicts.
Context aware Modeling and Services Implementation With Event Driven in Ubiquitous Computing Environment
Kim, Hyoung-Sun ; Kim, Hyun ; Moon, Ae-Kyung ; Cho, Jun-Myun ; Hong, Chung-Sung ;
Journal of Internet Computing and Services, volume 7, issue 5, 2006, Pages 13~24
Context aware computing is an emerging paradigm to achieve ubiquitous computing environments by enabling computer systems to understand their situational contexts. A context aware system uses context to provide relevant information and services to the user depending on the user's task. In this paper, we propose an ontology based context aware modeling methodology that transmits low level contexts acquired by directly accessing various sensors in the physical environments to high level contexts. With these high level contexts, context aware application can provides proactive and intelligent services using ECA (Event Condition Action) rules. We implemented a presentation service in smart office environment.
Routing Protocol for Link Reliability Improvement in ad hoc network
Seo, Soon-Young ; Koo, Young-Wan ;
Journal of Internet Computing and Services, volume 7, issue 5, 2006, Pages 25~31
According to the development of a mobile node and the increase of number of its users, the demands for connecting to the networks beyond the spaces through the existing wire or wireless communications have abruptly been increasing, which not only allows the ad hoc networks to be developed actively but also makes us consider the routing policy to transfer data safely. In this thesis, the routing protocol to send data stably by improving the route stability in the ad hoc networks is proposed, and its performance is analyzed through the simulations.
A Design of Proactive Authentication Technique for Stable Roaming In Wireless LAN Environment
Hong, Soon-Ja ; Koo, Yong-Wan ;
Journal of Internet Computing and Services, volume 7, issue 5, 2006, Pages 33~41
Wireless LAN is intrinsically weak in security of transmissions. WPKI (Wireless Public Key Infrastructure) is a well known Method to deal with the security issues in wireless LAN. The authentication required by the method becomes a source of unrellability of the hand-off performance. This paper suggests a solution to overcome the instability while using the WPKI technique, Prior to getting into the next region, a station is provided with the keys of the surrounding regions so that the possible delay problem can be avoided during the actual hand-off time. Thereby the hand-off instability can be solved in the WPKI framework.
A Hierarchical Network Architecture and Handoff framework for Integrating CDMA2000, WiBro and WLAN
Kong, Du-Kyung ; Cho, Jin-Sung ; Kim, Seung-Hee ; Kim, Dae-Sik ;
Journal of Internet Computing and Services, volume 7, issue 5, 2006, Pages 43~57
Next-generation mobile communication systems evolve in the form of high speed data transmission along with integration of wired-wireless network. Therefore, it needs researches on integrating service to heterogeneous networks to offer high speed data transmission and various services while supporting user mobility. In existing studies, heterogeneous networks are linked to single core network separatively, Since vertical handoff between heterogeneous networks leads to some delay, packets may be lost during vertical handoff. To solve this problem, this paper proposes an hierarchically integrated network architecture considering the characteristics of CDMA2000, WiBro, and WLAN. The hierarchically integrated networks are overlaid according to coverage of each network. Therefore, the proposed architecture can minimize handoff delay and packet loss. In addition, this paper proposes an integrated framework for next generation mobile communication networks.
Design and Implementation of Scenario-based Attack Simulator using NS
Choi, Hyang-Chang ; Noh Bong-Nam ; Lee Hyung-Hyo ;
Journal of Internet Computing and Services, volume 7, issue 5, 2006, Pages 59~69
Generally, network attacks are based on a scenario composed of a series of single-attacks, scenario attacks are launched over a wide network environment and their targets are not apparent. it is required to analyze entire packets captured on the network. This method makes it difficult to detect accurate patterns of attacks because it unnecessarily analyzes even packets unrelated to attacks. In this paper, we design and implement a simulation system for attacks scenario, which helps packet classification connected with attacks. The proposed system constitutes a target network for analysis in a virtual simulation environment, and it simulates dumping TCPDUMP packets including scenario attacks under the constructed virtual environment, We believe that our proposed simulation system will be a useful tool when security administrators perform the analysis of patterns of attack scenarios.
GNUnet improvement for anonymity supporting in large multimedia file
Lee, Yoon-Jin ; Lee, Myoung-Hoon ; Jo, In-June ;
Journal of Internet Computing and Services, volume 7, issue 5, 2006, Pages 71~79
The GNUnet proposed a file encoding method by lKB block size to support anonymity of files and decentralizes encoded block to peers through unstructured model. but, the encoding and block decentralizing method with 600
700MB large multimedia file appeared two problems. First problem. it need addition R block and I block, which make about 4% of storage resource. Second problem, unstructured model added network load by broadcasting decentralizing method. This paper suggest variable encoding block size and structured model by block decentralizing solution. Suggested encoding method reduced block request supplementary block generation to 1% and network load by proposal structured model sending answer through dedicated peer to decentralize block.
A Design and Implementation of Information Security Management and Audit System for Government Agencies
Jun, Yong-Joon ; Cho, Gi-Hwan ; Kim, Won-Kyu ;
Journal of Internet Computing and Services, volume 7, issue 5, 2006, Pages 81~93
Recently, information technology is considered as a basement of management for industries as well as administrations. Especially, government agencies deal with more high sensitive and Important data than other businesses, so, their security managements should be fair and efficient. At present, most government agencies possess and operate their own information security systems, but apply them for the sake of formality only, even do not adapt an audit system for management polices. This paper presents a design and implementation of an automated audit system which is suitable for the operation environment in government agencies, using the audit system based on the BS7799. The. proposed system aims to objectively, numerically and daily control the ISMS (Information Security Management System) for different level of government agencies. In addition, it permits to design and implement an adaptive audit tool, in order to meet a given condition of audit organization and guard the personal relationship between the auditor and its counterpart.
Digital License Prototype for Copyright Management of Software Source Code
Cha, Byung-Rae ; Jeong, Jong-Geun ; Oh, Soo-Lyul ;
Journal of Internet Computing and Services, volume 7, issue 5, 2006, Pages 95~108
The digital contents expand into software source code and maintenance of technology and IPR about source code have a very important meaning to international competition, The recognition about software security is very low specially among these Intellectual Property Rights. On occurring disputation property, we have to prove the fact, there is a problem to discriminate the original source code, Also, it is hard to accurate decision that is correct to complexity and the lack of read and understand ability even if software is reproduced. In this paper, we don't enforce distinction about software reproduction by one individual code unit. And we developed digital license prototype of XML that can distinguish reproduction based on structural conformability of whole source codes. Software has Context Free Grammar in structure and presents BNF notation type, it is apt to present hierarchical structure. Then, we can express architecture of software source code by hierarchical structure to discriminate structural conformability. In this paper, we make a study of the digital licence prototype for discriminate the original source code. Reserved words of software source code by parsing express to XML file that have hierarchical structure. Then, we can express architecture of software source code by tree structure form instead of complex source code.
Role Graph Security Management Model based on Lattice
Choi, Eun-Bok ; Park, Ju-Gi ; Kim, Jae-Hoon ;
Journal of Internet Computing and Services, volume 7, issue 5, 2006, Pages 109~121
In this paper, we suggest lattice based role graph security management model which changes security level in mandatory access control model as well as constraint and role hierarchy systematically in role base access control model. In this model, we solved privilege abuse of senior role that is role graph model's problem, and when produce conflict between privileges, we can keep integrity of information by reseting grade of subject through constraint. Also, we offer strong security function by doing to be controlled by subject's security level as well as privilege inheritance by role hierarchy, Finally, we present the role graph algorithms with logic to disallow roles that contain conflicting privileges.
Design and Implementation of Context-awareness Interpretation Structure for Intelligent Service
Lim, Tae-Hyun ;
Journal of Internet Computing and Services, volume 7, issue 5, 2006, Pages 123~134
In this research paper, We have proposed an interpretation structure concerned with context-awareness which is essential to provide intelligent service. The proposed model has an interpretation structure that integrated information of both external and internal context, and been designed to keep independency between context information and application service. To verify the interpretation structure that proposed, we established a test bed (Ubi-Class) in which the concept of context awareness has been introduced to the existing class room, and constituted a scenario, and tested whether intelligent service is performed according to context interpretation.
Recognition of 3D Environment for Intelligent Robots
Jang, Dae-Sik ;
Journal of Internet Computing and Services, volume 7, issue 5, 2006, Pages 135~145
This paper presents a novel approach to real-time recognition of 3D environment and objects for intelligent robots. First. we establish the three fundamental principles that humans use for recognizing and interacting with the environment. These principles have led to the development of an integrated approach to real-time 3D recognition and modeling, as follows: 1) It starts with a rapid but approximate characterization of the geometric configuration of workspace by identifying global plane features. 2) It quickly recognizes known objects in environment and replaces them by their models in database based on 3D registration. 3) It models the geometric details on the fly adaptively to the need of the given task based on a multi-resolution octree representation. SIFT features with their 3D position data, referred to here as stereo-sis SIFT, are used extensively, together with point clouds, for fast extraction of global plane features, for fast recognition of objects, for fast registration of scenes, as well as for overcoming incomplete and noisy nature of point clouds. The experimental results show the feasibility of real-time and behavior-oriented 3D modeling of workspace for robotic manipulative tasks.