Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Eun Ae Cho is active.

Publication


Featured researches published by Eun Ae Cho.


IEEE Transactions on Consumer Electronics | 2010

A database synchronization algorithm for mobile devices

Mi Young Choi; Eun Ae Cho; Dae Ha Park; Chang Joo Moon; Doo Kwon Baik

This paper proposes an SAMD (Synchronization Algorithms based on Message Digest) algorithm based on message digest in order to facilitate data synchronization between a server-side database and a mobile database. The SAMD algorithm makes the images at the server-side database and the mobile database uses message digest tables to compare two images in order to select the rows needed for synchronization. If the two images are different, the synchronization progresses according to synchronization policy. The SAMD algorithm does not use techniques that are dependent on specific database venders; neither does it use triggers, stored procedures or timestamps. The SAMD uses only the standard SQL functions for the synchronization. Therefore the SAMD algorithm can be used in any combinations of server-side database and mobile database because of its independence of database vender. This feature is important in order to build efficient mobile business systems because the upcoming mobile business environment has heterogeneous characteristics in which diverse mobile devices, mobile databases, and RDBMS exist.


computer and information technology | 2006

Access Control Policy Management Framework based on RBAC in OSGi Service Platform

Eun Ae Cho; Chang Joo Moon; Dae Ha Park; Doo Kwon Baik

The OSGi provides a service platform which ensures the interoperability between heterogeneous technologies and various devices in home network environment. Nowadays, user access control is one of the core parts which should be cleared, but there are no concrete researches yet. So in this paper, we propose a supplemented authorization policy management framework based on RBAC (Role-Based Access Control) for user access control at home network environment in which the OSGi service platform is operated. The proposed access control framework improves effectiveness, assures privacy and provides convenience at the same time. In conclusion, we provide the base to implement the effective, safe, and convenient the OSGi service platform by proposing the new framework in authorization and user administration part.


software engineering research and applications | 2006

An Effective Policy Management Framework Using RBAC model for Service Platform based on Components

Eun Ae Cho; Chang Joo Moon; Dae Ha Park; Doo Kwon Baik

User access control is one of the core parts in the developing Internet field. However, in home network service platform and Web service platform, there is no concrete research yet. Therefore, in this paper, we propose the supplemented authorization policy management framework based on RBAC model in the network environment, especially, OSGi service platform and Web service platform. The proposed access control framework tries to enhance the efficiency, assure the privacy, and provide the convenience at the same time. In conclusion, we provide the base to implement the service platform by proposing the effective, safe and convenient framework in authorization and user administration part


international conference on hybrid information technology | 2008

An Approach to Privacy Enhancement for Access Control Model in Web 3.0

Eun Ae Cho; Chang Joo Moon; Dae Ha Park; Doo Kwon Baik

The recent Web technology has been developed by three mainsprings which include integration, virtualization, and socialization. The Web technology provides the increment of the social networking ability. However it deepens the exposure of privacy about personal information as more complicating and difficult problems. Representatively, it is impossible to define and manage the specific relation, so the personal information and interest can be inferred from collecting and summarizing the contents. Also, there are some problems that it is hard to construct the information owners own social network. Thus this paper proposes the new access control model which enhances the user privacy of the existing access control methods in web 2.0. This method prevents privacy such as personal inclination from being exposed and enables to define and manage the specific relation. By doing this the information owners can construct their social network. This social network can be applied and extended to Web contents.


networked computing and advanced information management | 2009

A Synchronization Algorithm of Mobile Database for Ubiquitous Computing

Mi Young Choi; Eun Ae Cho; Dae Ha Park; Jong Youn Bae; Chang Joo Moon; Doo Kwon Baik

The existing synchronization solutions of mobile database are not independent from the database server because they use database dependent information such as metadata or use specific functions of database server such as trigger and time stamp. These constraints are critical weak point in ubiquitous environment because various applications are running in various devices and servers in ubiquitous environment. Therefore, there is must need synchronization algorithms of mobile database which is independent of the vender of synchronization solution and mobile database in ubiquitous environment. This paper suggests SAMD (Synchronization Algorithms based on Message Digest) in order to resolve the problems mentioned above. SAMD resolves synchronization problems using only standard SQL queries as certified by the ISO (International Organization for Standardization). This is followed by a possible synchronization of any data combination regardless of the kind of database of server side or mobile database. In conclusion, the SAMD is effective solution for mobile database synchronization in ubiquitous environment.


IEEE Transactions on Consumer Electronics | 2008

Home gateway operating model using reference monitor for enhanced user comfort and privacy

Eun Ae Cho; Chang Joo Moon; Doo Kwon Baik

In home network environments, user comfort and privacy are key prerequisites for customer satisfaction and data security. Although methods such as ACLs and others control the user-access for home network devices, most existing methods have yet to satisfactorily address the issues related to a users comfort level and his or her protection of privacy. Therefore, this paper outlines the proposal for home gateway operating model using reference monitor in an OSGi service platform, whose goal is to enhance the operation required to efficiently meet a users access, convenience, and privacy concerns. The reference monitor is a collection of access controls for objects, and is also capable of providing the facilities for access control. Furthermore, it adds the element of comfort to user access control, because it is intended as a core part of how subjects interact with objects. The proposed model is based on an RBAC model to effectively manage access control. Its policy is classified into two types (e.g., user-role assignment policy and permission-role assignment policy) in an attempt to not only better protect user privacy, but also to improve the performance of the policy operation. It is argued that the new home gateway model provides sufficient and effective guidelines to suggest future access control policies.


international conference on hybrid information technology | 2006

RBAC-Based Access Control Framework for ensuring Privacy in Ubiquitous Computing

Sung Ho Hong; Eun Ae Cho; Chang Joo Moon; Doo Kwon Baik

The ubiquitous computing environment is an environment that freely shares all data anytime, anywhere, and through any device without considering constraints. However, the personal or private information in ubiquitous computing could be disclosed, shared from anyone, or used maliciously without consent from the owner of the data. Thus, privacy is one of the major issues in such an environment. Of many security methods, which are able to protect the privacy, The role-based access control (RBAC) model, a typical access control model within the enterprise environment, has been widely studied, applied to various applications, and implemented. However, much existing research for access control has not solved the privacy concerns within ubiquitous computing. This paper proposes a method and framework of user-centric and efficient access control to handle personal privacy within ubiquitous computing environment by using both proposed model based on core component of RBAC model and privacy policies


asian simulation conference | 2004

Design and implementation of an SSL component based on CBD

Eun Ae Cho; Young Gab Kim; Chang Joo Moon; Doo Kwon Baik

SSL is one of the most popular protocols used on the Internet for secure communications. However SSL protocol has several problems. First, SSL protocol brings considerable burden to the CPU utilization so that performance and speed of the security service is lowered during encryption transaction. Second, SSL protocol can be vulnerable for cryptanalysis due to the fixed algorithm being used. Third, it causes a problem of mutual interaction with other protocols because of the encryption export restriction policy of the U.S. Fourth, it is difficult for developers to learn and use cryptography API for SSL. To solve these problems, in this paper, we propose an SSL component based on CBD. The execution of the SSL component is supported by Confidentiality and Integrity component. It can encrypt data selectively and use various mechanisms such as SEED and HAS-160. Also, it can complement the SSL protocols problems and, at the same time, take advantage of component. Finally, in the performance analysis, we present a better result than the SSL protocol as the data size is increased.


computer and information technology | 2007

Home Network Framework Based on OSGi Service Platform Using SSL Component Bundle

Eun Ae Cho; Chang Joo Moon; Dae Ha Park; Doo Kwon Baik

It becomes increasingly common to use distributed services according to development of wire/wireless network. Home network area is also based on distributed environment which use a lot of services. Various technologies already have been used in home network. However, the research of information security part is insufficient. Thus, in this paper, we enhance our previous work by applying SSL component as a bundle format. This framework includes efficient user access control based on OSGi service platform from the former researches. This paper can cover the venerability between home gateway and authorization server in existing OSGi service platform. Therefore we provide the advantages of pre-studied framework and user information protection simultaneously.


international conference on consumer electronics | 2008

A Reference Monitor Model for Improving User Comfort and Privacy of Home Gateway in OSGi Service Platform

Eun Ae Cho; Chang Joo Moon; Doo Kwon Baik

In home network environments, user comfort, and privacy are very important issues that need to be addressed. The reference monitor is the collection of access controls for devices, files, memory, and other kinds of objects and it is also able to provide advanced facilities for access control. In order to meet the users requirements for comfortability and privacy, a reference monitor model is proposed for improving the home gateway in the OSGi service platform. The proposed model is based on the RBAC model, and the policy is classified into two types: user-role assignment policy and permission-role assignment policy. The policies are in XML format. With the use of the proposed reference monitor model, more effective guidelines can be provided for user access control in home networks.

Collaboration


Dive into the Eun Ae Cho's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge