Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Euiin Choi is active.

Publication


Featured researches published by Euiin Choi.


International Conference on Advanced Communication and Networking | 2011

User Authentication Platform Using Provisioning in Cloud Computing Environment

Hyosik Ahn; Hyokyung Chang; Changbok Jang; Euiin Choi

Cloud computing is a computing environment centered on users and can use programs or documents stored respectivily in servers by operating an applied software such as Web browser through diverse devices on where users can access Internet as an on-demand outsourcing service of IT resources using Internet. In order to use these cloud computing service, a user authentication is needed. This paper proposed the platform for user authentication using provisioning in Cloud computing environment.


international conference on future generation communication and networking | 2010

Challenges and Security in Cloud Computing

Hyokyung Chang; Euiin Choi

People who live in this world want to solve any problems as they happen then. An IT technology called Ubiquitous computing should help the situations easier and we call a technology which makes it even better and powerful cloud computing. Cloud computing, however, is at the stage of the beginning to implement and use and it faces a lot of challenges in technical matters and security issues. This paper looks at the cloud computing security.


ubiquitous computing | 2011

User Authentication in Cloud Computing

Hyokyung Chang; Euiin Choi

As Cloud Computing has been spreading widely, users and service providers enables to use resource or service cheaply and easily without owning all the resource needed. However, Cloud Computing has some security issues such as virtualization technology security, massive distributed processing technology, service availability, massive traffic handling, application security, access control, and authentication and password. User authentication among them requires a high-quranteed security. Hence, this paper would like to discuss technologies of access contol and user authentication briefly and look at the problems inside.


International Conference on Advanced Communication and Networking | 2011

Context Model Based on Ontology in Mobile Cloud Computing

Changbok Jang; Euiin Choi

Mobile Cloud Computing has become as a new IT paradigm because of the growth of mobile device like smartphone and appearance of Cloud Computing environment. This mobile cloud environment provides various services and IT resources according to users‘ requests, so an effective management of service and IT resources is required. Hence, this paper designs a context model based on ontology in mobile cloud computing in order to provide distributed IT resources and services to users based on context-awareness information. As the context model proposed in this paper uses context-aware information, it enables to provide more accurate personalized services and manage distributed IT resources.


international conference on hybrid information technology | 2006

Multidimensional Filtering Approach Based on Contextual Information

Sunghoon Cho; Moohun Lee; Changbok Jang; Euiin Choi

Existing recommended systems offer calculation of recommendation for user-item with e-commerce. But these systems omit much available information. It is users contextual information. Thus accuracy of recommender systems is relatively lower. Mostly excepted information is difficult to clearly define the attributes and to calculate the values as the numerical data. If this contextual information can be changed into calculable element in recommender system, it can become the improved recommendation technique. This paper proposes multidimensional approach additionally applying contextual information for 2 dimensions based on existing recommendation system


international conference on ubiquitous and future networks | 2009

Rule-based auditing system for software security assurance

Changbok Jang; Jeongseok Kim; Hyokyung Jang; Sundo Park; Bokman Jang; Bonghoi Kim; Euiin Choi

We can use information and software of various forms without being restricted for place and time if ubiquitous computing age comes. However, its dysfunction is causing security problems such as outflow of personal information, hacking, diffusion of virus. Specially, dissemination of software that has malicious purpose in ubiquitous computing environment causes serious damage. We have studied about malicious code detection and software vulnerability detection tool to prevent this. But, existent detection tools are not suited to general software, because they are limitative in specification area. In addition, they cannot detect a newly appeared malicious code. We must update pattern of new malicious code, because they use a simple pattern matching technique. In this paper, we propose rule-based auditing system that analyzes structure of target code to solve these problems, define this as rule, and detect malicious codes and software vulnerabilities. Proposed auditing system can construct secure ubiquitous computing environment, because it will be used by a common software audit system that reason about source codes security.


International Conference on Advanced Communication and Networking | 2011

Profile for Effective Service Management on Mobile Cloud Computing

Changbok Jang; Hyokyung Chang; Hyosik Ahn; Yongho Kang; Euiin Choi

Mobile Cloud Computing has become as a new IT paradigm because of the growth of mobile device like smartphone and appearance of Cloud Computing environment. This mobile cloud environment provides various services and IT resources according to users‘ requests, so an effective management of service and IT resources is required. Hence, this paper designs a profile on mobile cloud service platform in order to provide distributed IT resources and services to users based on context-awareness information. As the profile proposed in this paper uses context-aware information, it enables to provide more accurate personalized services and manage distributed IT resources.


international conference on hybrid information technology | 2011

Authentication Platform for Provisioning in Cloud Computing

Hyokyung Chang; Changbok Jang; Hyosik Ahn; Euiin Choi

Spreading of Cloud Computing draws users to ask for service provide that is more improved, faster, and securer. So, there come security issues in Cloud Computing continuously and there have been a lot of studies on authentication and accee control. Provisioning is a technology related to the process and action that prepare knowledge and resources and supply what needed in advance to find the opitimum among them. Provisioning is one of the technologies to make Cloud Computing more efficiently. This paper proposes an authentication for provisioing in Cloud Computing.


asia-pacific web conference | 2007

Policy Based Scheduling for Resource Allocation on Grid

Sunghoon Cho; Moohun Lee; Jang-uk In; Bonghoi Kim; Euiin Choi

In this paper we discuss a novel framework for policy based scheduling in resource allocation of grid computing. The framework has several features that are associated with the scheduling strategy, efficient resource management, the scheduling method and Quality of Service(QOS). Experimental results are provided to demonstrate the usefulness of the framework.


ubiquitous computing | 2011

Design of Intelligence Mobile Cloud Service Platform Based Context-Aware

Hyokyung Chang; Euiin Choi

Mobile Cloud Computing has become as a new IT paradigm because of the growth of mobile device like smartphone and appearance of Cloud Computing environment. This Mobile Cloud environment provides various services and IT resources according to users’ requests, so an effective management of service and IT resources is required. Hence, this paper designs a context-aware knowledge Mobile Cloud service platform in order to provide distributed IT resources and services to users based on context-awareness information. As the context-aware knowledge Mobile Cloud service platform proposed in this paper uses context-aware information, it enables to provide more accurate presonalized services and manage distributed IT resources.

Collaboration


Dive into the Euiin Choi's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge