Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Changbok Jang is active.

Publication


Featured researches published by Changbok Jang.


International Conference on Advanced Communication and Networking | 2011

User Authentication Platform Using Provisioning in Cloud Computing Environment

Hyosik Ahn; Hyokyung Chang; Changbok Jang; Euiin Choi

Cloud computing is a computing environment centered on users and can use programs or documents stored respectivily in servers by operating an applied software such as Web browser through diverse devices on where users can access Internet as an on-demand outsourcing service of IT resources using Internet. In order to use these cloud computing service, a user authentication is needed. This paper proposed the platform for user authentication using provisioning in Cloud computing environment.


International Conference on Advanced Communication and Networking | 2011

Context Model Based on Ontology in Mobile Cloud Computing

Changbok Jang; Euiin Choi

Mobile Cloud Computing has become as a new IT paradigm because of the growth of mobile device like smartphone and appearance of Cloud Computing environment. This mobile cloud environment provides various services and IT resources according to users‘ requests, so an effective management of service and IT resources is required. Hence, this paper designs a context model based on ontology in mobile cloud computing in order to provide distributed IT resources and services to users based on context-awareness information. As the context model proposed in this paper uses context-aware information, it enables to provide more accurate personalized services and manage distributed IT resources.


international conference on hybrid information technology | 2006

Multidimensional Filtering Approach Based on Contextual Information

Sunghoon Cho; Moohun Lee; Changbok Jang; Euiin Choi

Existing recommended systems offer calculation of recommendation for user-item with e-commerce. But these systems omit much available information. It is users contextual information. Thus accuracy of recommender systems is relatively lower. Mostly excepted information is difficult to clearly define the attributes and to calculate the values as the numerical data. If this contextual information can be changed into calculable element in recommender system, it can become the improved recommendation technique. This paper proposes multidimensional approach additionally applying contextual information for 2 dimensions based on existing recommendation system


international conference on ubiquitous and future networks | 2009

Rule-based auditing system for software security assurance

Changbok Jang; Jeongseok Kim; Hyokyung Jang; Sundo Park; Bokman Jang; Bonghoi Kim; Euiin Choi

We can use information and software of various forms without being restricted for place and time if ubiquitous computing age comes. However, its dysfunction is causing security problems such as outflow of personal information, hacking, diffusion of virus. Specially, dissemination of software that has malicious purpose in ubiquitous computing environment causes serious damage. We have studied about malicious code detection and software vulnerability detection tool to prevent this. But, existent detection tools are not suited to general software, because they are limitative in specification area. In addition, they cannot detect a newly appeared malicious code. We must update pattern of new malicious code, because they use a simple pattern matching technique. In this paper, we propose rule-based auditing system that analyzes structure of target code to solve these problems, define this as rule, and detect malicious codes and software vulnerabilities. Proposed auditing system can construct secure ubiquitous computing environment, because it will be used by a common software audit system that reason about source codes security.


International Conference on Advanced Communication and Networking | 2011

Profile for Effective Service Management on Mobile Cloud Computing

Changbok Jang; Hyokyung Chang; Hyosik Ahn; Yongho Kang; Euiin Choi

Mobile Cloud Computing has become as a new IT paradigm because of the growth of mobile device like smartphone and appearance of Cloud Computing environment. This mobile cloud environment provides various services and IT resources according to users‘ requests, so an effective management of service and IT resources is required. Hence, this paper designs a profile on mobile cloud service platform in order to provide distributed IT resources and services to users based on context-awareness information. As the profile proposed in this paper uses context-aware information, it enables to provide more accurate personalized services and manage distributed IT resources.


international conference on hybrid information technology | 2011

Authentication Platform for Provisioning in Cloud Computing

Hyokyung Chang; Changbok Jang; Hyosik Ahn; Euiin Choi

Spreading of Cloud Computing draws users to ask for service provide that is more improved, faster, and securer. So, there come security issues in Cloud Computing continuously and there have been a lot of studies on authentication and accee control. Provisioning is a technology related to the process and action that prepare knowledge and resources and supply what needed in advance to find the opitimum among them. Provisioning is one of the technologies to make Cloud Computing more efficiently. This paper proposes an authentication for provisioing in Cloud Computing.


international conference on future generation communication and networking | 2008

Method of Profile Storage for Improving Recommendation Accuracy on Ubiquitous Computing

Changbok Jang; Jeongseok Kim; Hyokyung Chang; Euiin Choi; Bonghoi Kim; Gang Soo Lee

Users are able to use the information and service more free than previous wire network due to development of wireless network and device. For this reason, various studies on ubiquitous networks have been conducted. Various contexts brought in this ubiquitous computing environment, have recognized user¿s action through sensors. This results in the provision of better services. Because services exist in various places in ubiquitous networks, the application has the time of services searching. In addition, user¿s context is very dynamic, so a method needs to be found to recommend services to user by context. Therefore, techniques for reducing the time of service and increasing accuracy of recommendation are being studied. But it is difficult to quickly and appropriately provide large numbers of services, because only basic context information is stored. For this reason, we suggest DUPS(Dimension User Profile System), which stores location, time, and frequency information of often used services. Because previous technique used to simple information for recommending service without predicting services which is going to use on future, we can provide better service, and improve accuracy over previous techniques.


international conference on hybrid information technology | 2006

A Scheduling Middleware for Scheduling on a Grid Environment

Moohun Lee; Jang-uk In; Sunghoon Cho; Changbok Jang; Euiin Choi

A grid consists of high-end computational, storage, and network resources that, while known a priori, are dynamic with respect to activity and availability. Efficient scheduling of requests to use grid resources must adapt to this dynamic environment while meeting administrative policies. This paper discusses the necessary requirements of such a scheduler and proposes a framework that can administrate grid policies and schedule complex. The paper design allows for a number of functional modules to flexibly plan and schedule workflows representing multiple applications on the grids. It also allows for performance evaluation of multiple algorithms for each functional module. We present early experimental results that effectively utilizes other grid infrastructure such as workflow management systems and execution systems


Archive | 2012

User Authentication Using Context-Awareness RBAC Model on Cloud Computing

Hyosik Ahn; Changbok Jang; Hyokyung Chang; Euiin Choi

Cloud Computing has been spreading widely, users and service providers enables to use resource or service cheaply and easily without owning all the resource needed. However, Cloud Computing has some security issues such as virtualization technology security, massive distributed processing technology, service availability, massive traffic handling, application security, access control, and authentication and password. User authentication among them requires a high-quranteed security. In this paper propose to context-awareness RABC model that based on profile about which user’s information which provided efficiently access control to user through active classification, inference and judgment about user who access to system and resource.


ubiquitous computing | 2011

D-PACs for Access Control and Profile Storage on Ubiquitous Computing

Changbok Jang; Euiin Choi

Recently, context information of studies on ubiquitous networks have been conducted, and techniques for reducing the time of service and increasing accuracy of recommendation are also being studied. But it is difficult to quickly and appropriately provide a number of services, because only basic context information is stored. And Applications in context-aware computing environment will be connected wireless network and various devices. Reckless access of information resources can make trouble of system. So, access authority management is a very important issue of both information resourcess and adaptation to system through founding security policy of needed system. For this reason, we suggest D-PACs which stores location, time, and frequency information of often used services, and propose the model of automated context-aware access control using ontology that can more efficiently control resources through inference and judgment of context information.

Collaboration


Dive into the Changbok Jang's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge