Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Gang-soo Lee is active.

Publication


Featured researches published by Gang-soo Lee.


Journal of Systems and Software | 1994

A b-distributed stochastic Petri net model for software project time/cost management

Gang-soo Lee; Tadao Murata

Abstract This article proposes a new software project time and cost management model using a β-distributed stochastic petri net (BSPN), which is an integrated model of PERT and Petri nets. We adapt the β-distributed transition from program evaluation and review technique (PERT) for modeling uncertainty of time and cost of a software project. A source BSPN of a software project is constructed via the top-down modeling method or transformation method. The source BSPN can be transformed into a reduced BSPN by use of reduction rules. Structural properties of the project are analyzed from the BSPN structure. Behavioral characteristics of the project, such as time and cost, are analyzed via a chronological reachability graph (CRG) of a BSPN. The CRG is a new kind of timed reachability graph. The BSPN model is powerful enough to cope with the uncertainty and concurrency problems of large software project management.


Journal of Systems and Software | 1997

Petri net based models for specification and analysis of cryptographic protocols

Gang-soo Lee; Jin-Seok Lee

Formal specification and analysis of cryptographic protocols play an important role in evaluating cryptosystems. Thus, an efficient specification and analysis model for the protocols is strongly required. In this paper, we review the previous specification and analysis models of protocols and propose new Petri net based model, which is called CTPN (Cryptographic Timed Petri Net). Also, we suggest a new specification and analysis methodology for the protocols based on our proposed model. We define a CTPN-language for a CTPN-analyzer. A CTPN-analyzer is also developed for the systematic analysis of a protocol. Our CTPN model including CTPN-analyzer is found to have executable, formal, graphical textual, and consistent characteristics suitable for the specification and analysis of cryptographic protocols.


international conference on computational science and its applications | 2004

The Design and Development for Risk Analysis Automatic Tool

Young-Hwan Bang; Yoon-Jung Jung; In-Jung Kim; Namhoon Lee; Gang-soo Lee

In these days, many organizations try to manage their assets in safe way due to fast change in information-communication environment. The Chief information o.cer or the chief security o.cer of an organization recognized the necessity of the security infrastructure. In Korea, risk analysis and vulnerability analysis for security improvement of critical asset is booming by enforcement of Act on security of information and communication infrastructure. It is obligate that each critical information infrastructure needs to get vulnerability analysis. From this motive, there are many studies about risk analysis and try to research and develop right risk analysis methods. This is why we start the research to design and implementation for the practical risk analysis tools. In this paper, we proposed design and development of the risk analysis process, the risk analysis automatic tool and important modules such as interview, asset analysis, threat analysis and risk analysis. Keywords: Risk Analysis, Asset, Threat, Vulnerability, Safeguard, Inquiry, Interview.


Journal of Systems and Software | 2001

Specification and analysis of n -way key recovery system by extended cryptographic timed Petri net

Shinyoung Lim; Jeong-Ho Ko; Eun-Ah Jun; Gang-soo Lee

Abstract When a receiver of a ciphertext message cannot decrypt the message due to the fact that he has lost his private-key, the private-key of the receiver and session-key of the message need to be recovered. In this paper, we design a new n -way Key Recovery System ( n -KRS) that is characterized by key encapsulation approach, n -way key recovery, secret designation of key recovery agents, fork and join of session-key with random keys, recovery request by a new key pair, certificate attaching scheme, component-based software engineering, and conformance to international standards. n -KRS is specified and analyzed by Extended Cryptographic Timed Petri Net (ECTPN) model that is a new formal and graphical specification model for cryptographic protocols. Recoverability, performance characteristics of n -KRS are evaluated by means of reachability graph of ECTPN. A prototype of n -KRS is developed and evaluated by means of CC 2.0 based information security system evaluation scheme.


international conference on advanced software engineering and its applications | 2011

A Prolog Based Approach to Consistency Checking of UML Class and Sequence Diagrams

Zohaib Khai; Aamer Nadeem; Gang-soo Lee

UML is an industrial standard for designing and developing object-oriented software. It provides a number of notations for modeling different system views, but it still does not have any means of meticulously checking consistency among the models. These models can contain overlapping information which may lead to inconsistencies. If these inconsistencies are not detected and resolved properly at an early stage, they may result in many errors in implementation phase. In this paper, we propose a novel approach for consistency checking of class and sequence diagrams based on Prolog language. In the proposed approach, consistency checking rules as well as UML models are represented in Prolog, then Prolog’s reasoning engine is used to automatically find inconsistencies.


international conference on advanced software engineering and its applications | 2011

A Safe Regression Testing Technique for Web Services Based on WSDL Specification

Tehreem Masood; Aamer Nadeem; Gang-soo Lee

Specification-based regression testing of web services is an important activity which verifies the quality of web services. A major problem in web services is that only provider has the source code and both user and broker only have the XML based specification. So from the perspective of user and broker, specification based regression testing of web services is needed. The existing techniques are code based. Due to the dynamic behavior of web services, web services undergo maintenance and evolution process rapidly. Retesting of web services is required in order to verify the impact of changes. In this paper, we present an automated safe specification based regression testing approach that uses original and modified WSDL specifications for change identification. All the relevant test cases are selected as reusable hence our regression test selection approach is safe.


international conference on signal processing | 2011

Leaf Image Analysis towards Plant Identification

Debnath Bhattacharyya; Tai-hoon Kim; Gang-soo Lee

Plants can be classified and identified by naturally or artificially as per the botanists. Plants can be identified by their leaves also. There are different varieties of plants grown throughout the world. Their identifications are studied using various laboratory methods. The morphological and genetically characteristics are employed to classify different leafs as well as plants. However, the presence of wide morphological varieties through evolution among the various leaf cultivars made it more complex and difficult to classify them. Leaf structures play a very crucial role in determining the characteristics of a plant. The broad and narrow shaped leaves, leaf arrangement, leaf margin characteristics features which differentiate various leaf of a plant. In this paper, we propose the methods to identify the leaf using an image analysis based approach.


international conference on signal processing | 2011

Watermarking Using Multiresolution Cosine Transformation: A Review

Debnath Bhattacharyya; Tai-hoon Kim; Gang-soo Lee

In this paper, an image accreditation technique by embedding digital watermarks in images is proposed. The proposed method for the digital watermarking is based on the cosine transform. This is unlike most previous work, which used a random number of a sequence of bits as a watermark and where the watermark can only be detected by comparing an experimental threshold value to determine whether a sequence of random signals is the watermark. The proposed approach embeds a watermark with visual recognizable patterns, such as binary, gray, or color image in images by modifying the frequency part of the images. This thesis discusses the issues regarding data hiding and its application to multimedia digital information have also daily lives of the peoples in this security and communication, addressing both theoretical and practical aspects, and tackling both design and attack problems. Data hiding is modeled as a communication problem where the embedded data is the signal to be transmitted. Various embedding mechanisms target different robustness-capacity tradeoffs. The trade-off for different major categories of embedding mechanisms has been done. In this approach, an original image is decomposed into wavelet coefficients. Then, multi-energy watermarking scheme based on the qualified significant wavelet tree (QSWT) is used to achieve the robustness of the watermarking. Unlike other watermarking techniques that use a single casting energy, QSWT adopts adaptive casting energy in different resolutions. The performance of the proposed watermarking is robust to a variety of signal distortions, such as JPEG, image cropping, sharpening, median filtering, and incorporating attacks.These algorithms are covering applications such as annotation, tamper detection, copy/access control, fingerprinting, and ownership protection.


International Conference on Security Technology | 2011

CLAPTCHA- A Novel Captcha

Rahul Saha; G. Geetha; Gang-soo Lee

In this paper we have introduced a new form of captcha named CLAPTCHA. This Claptcha we believe can reform a new world of image and imagination based captcha. In this Claptcha, we have to find the English alphabets (alpha). Its efficiency is also proven here to be better than normal image based captchas or imagination captchas. Claptchas will be also more user friendly and enjoying.


international conference on future generation communication and networking | 2010

3D Viewer Platform of Cloud Clustering Management System: Google Map 3D

Sung-Ja Choi; Gang-soo Lee

The new management system of framework for cloud envrionemnt is needed by the platfrom of convergence according to computing environments of changes. A ISV and small business model is hard to adapt management system of platform which is offered from super business. This article suggest the clustering management system of cloud computing envirionments for ISV and a man of enterprise in small business model. It applies the 3D viewer adapt from map3D & earth of google. It is called 3DV_CCMS as expand the CCMS[1].

Collaboration


Dive into the Gang-soo Lee's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sang-Soo Choi

Korea Institute of Science and Technology Information

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge