Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Gu Su Kim is active.

Publication


Featured researches published by Gu Su Kim.


Ai & Society | 2004

Dynamic load balancing scheme based on resource reservation for migration of agent in the pure p2p network environment

Gu Su Kim; Kyoung-in Kim; Young Ik Eom

Mobile agents are defined as processes which can be autonomously delegated or transferred among the hosts in a network in order to perform some computations on behalf of the user and co-operate with other agents. Currently, mobile agents are used in various fields, such as electronic commerce, mobile communication, parallel processing, search of information, recovery, and so on. In pure P2P network environment, if mobile agents that require computing resources rashly migrate to another peers without the consideration on the peers capacity of resources, the peer may have a problem that the performance can be degraded, due to the lack of resources. To solve this problem, we propose resource reservation based load balancing scheme of using RMA (Resource Management Agent) that monitors workload information of the peers and decides migrating agents and destination peers. In mobile agent migration procedure, if the resource of specific peer is already reserved, our resource reservation scheme prevents other mobile agents from allocating the resource.


pacific rim international conference on multi-agents | 2006

Partial group session key agreement scheme for mobile agents in e-commerce environment

Hyunjin Cho; Gu Su Kim; Young Ik Eom

In this paper, we consider an e-Commerce system that supports buying and selling goods or services over the Internet using Mobile Agent(MA) technologies. MAs are active, autonomous, and self-replicable software objects containing both computational logic and state information. When MA technologies are applied to e-Commerce environments, the MAs can search for a product on behalf of the buyer. The buyer constructs a group of MAs, and dispatches each agent in the group to the supplier sites. Each buyer agent compares price information of goods which are suggested by the suppliers. Eventually, all MAs exchange their price information cooperating to determine the most suitable item. In the selection process, if the price information which is exchanged among the MAs is modified by malicious entities, the user may not select intended goods. In this paper, we propose a group session key generation scheme called PGKA(Partial Group session Key Agreement) for secure communication among the MAs. The PGKA has no sponsors, controllers, or any other members charged with special duties. The main idea in PGKA is to distribute the computation of the group session key generation among the members, which makes the scheme suitable for fully distributed environments. In addition, the cost of the key reconstruction is very low in this scheme, because only the seed value is required to be transmitted for the reconstruction process.


international conference on computational science and its applications | 2006

Design and implementation of a security framework based on the object-based storage device standard

Kwang-Sun Ko; Gu Su Kim; June Kim; JungHyun Han; Ungmo Kim; Young Ik Eom

Recently, demands on security frameworks adopted for network-based storage mechanisms have considerably increased, as these mechanisms are appointed in important roles within industrial areas. However, there has been minimal research and development of these frameworks. In this paper, the design and implementation of a security framework, based on the Object-based Storage Device (OSD) standard [1], is presented. In the proposed security framework compared with the OSD standard, several different functionalities exist.


IEICE Transactions on Information and Systems | 2006

Design of the Mobile Agent Anonymity Framework in Ubiquitous Computing Environments

Jae Gon Kim; Gu Su Kim; Young Ik Eom

In ubiquitous computing environments supporting mobile agents, agent anonymity is a critical issue in protecting the privacy of users. Agent anonymity means that no other entity can identify the identity of the agent performing an action. For agent anonymity, the information, that the user creates or contributes to, and the agent itself should not be revealed, which can be accomplished by hiding the identity of the agent working on behalf of the user. In this paper, an anonymity framework is described for mobile agent systems, providing agent anonymity facilities using agent identity encryption and access control facilities, based on partially blind signature. It is possible to service anonymous mobile agents in ubiquitous computing environments while reducing the abuse resulting from anonymity, by deploying the proposed agent anonymity framework.


conference on human interface | 2007

Dynamic cell phone UI generation for mobile agents

Gu Su Kim; Hyunjin Cho; Young Ik Eom

A MA(Mobile Agent) is a computer program which autonomously migrates within the network and works on behalf of a user. With the progress of ubiquitous computing environments, MA paradigm becomes more useful paradigm because MA paradigm makes it possible for various user-centric services, such as follow-me service, private secretary service, and etc. Also, in ubiquitous environments, the cell phone has very important role, but the cell phone cannot support the MA technology because J2ME(Java2 Micro Edition) CLDC(Connected Limited Device Configuration), which is the java platform for cell phone, does not support the essential facilities for the mobility of the mobile agents such as reflection, dynamic class loading, and object serialization due to security problem of the cell phone. So, in this paper, we propose the scheme that the MAP(Mobile Agent Platform) dynamically generates the UI(User Interface) according to the users device. Also, we show the experimental results of our proposed scheme. By using our proposed scheme, the user gets the service of MA by the cell phone.


computational intelligence and security | 2004

Lightweight mobile agent authentication scheme for home network environments

Jae Gon Kim; Gu Su Kim; Young Ik Eom

Recently, interests on the home network, that requires new services and new computing paradigms, have enormously been increased. Applying the mobile agent to the home network is expected to provide a new computing model. The mobile agent authentication is a preceding technology to apply the mobile agent concept to the home network environments. The existing public key based authentication scheme is not suitable to the home network devices which has the limited computation capability. In this paper, we propose a lightweight mobile agent authentication scheme based on the shared key and public key infrastructures.


international conference on conceptual structures | 2007

Design and Implementation of DLNA DMS Through IEEE1394

Gu Su Kim; Chul-Seung Kim; Hyunsu Jang; Moon Seok Chang; Young Ik Eom

With the technological growth of the AV(Audio and Video) equipments and the popularization of video contents, IEEE1394 for the transmission of AV data has spread fast. However, DLNA(Digital Living Network Alliance), which is a standard of the home network middleware, does not consider the transmission of AV data over IEEE1394. In this paper, we propose a scheme for transmission of AV contents over IEEE1394 in DLNA environments. In addition, by the validation test of DLNA compatibility, we show that our proposed scheme can support AV contents sharing without regard to the manufactures and transmission media.


grid and pervasive computing | 2007

Implementation of OSD security framework and credential cache

Gu Su Kim; Kwang Sun Ko; Ung Mo Kim; Young Ik Eom

The concept of Object-based Storage Devices (OSD), which is standardized by the ANSI T10 technical committee, is an emerging storage paradigm that replaces storages of traditional fixed-size block abstraction with those of variable-size objects that virtualizes the underlying physical storage. In this paper, we describe our substantial implementation of the OSD security framework in OASIS, which is an OSD system developed at ETRI (Electronics and Telecommunications Research Institute) in Korea. We also describe our credential caching subsystem, called Lcache, which is implemented in the client side of our OSD security framework in order to improve the performance of issuing credentials.


The Kips Transactions:partc | 2007

Design and Analysis of a Secure Protocol for the P3P Standard

Hyunwoo Choi; Hyunsu Jang; Kwang Sun Ko; Gu Su Kim; Young Ik Eom

P3P(Platform for Privacy Preference) that is used in the World Wide Web is a standard to define and negotiate policies about definition, transmission, collection, and maintenance of personal information. Current P3P standard provides methods that define client personal information protection policy and P3P policy associated with web server. It also provides a method that compares these two policies. The current P3P standard, however, does not handle detail functions for safe transmission of the personal information and data. Also, it does not handle problems that can be induced by the detail functions. In this paper, in order to solve these problems, we propose a Secure P3P(S-P3P) protocol, which is a security protocol for the current P3P standard, offers mutual authentication between the web server and the client, and guarantees integrity and confidentiality of the messages and data. Furthermore, a S-P3P protocol provides non-repudiation on transmission and reception of personal information that is transmitted from the client to the web server.


Archive | 2006

A Reliable Peer Connection Scheme for Pure P2P Network Environments

Gu Su Kim; Young Ik Eom

Collaboration


Dive into the Gu Su Kim's collaboration.

Top Co-Authors

Avatar

Young Ik Eom

Sungkyunkwan University

View shared research outputs
Top Co-Authors

Avatar

Hyunjin Cho

Sungkyunkwan University

View shared research outputs
Top Co-Authors

Avatar

Hyunsu Jang

Sungkyunkwan University

View shared research outputs
Top Co-Authors

Avatar

Jae Gon Kim

Sungkyunkwan University

View shared research outputs
Top Co-Authors

Avatar

Kwang Sun Ko

Sungkyunkwan University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hyunwoo Choi

Sungkyunkwan University

View shared research outputs
Top Co-Authors

Avatar

June Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kwang-Sun Ko

Sungkyunkwan University

View shared research outputs
Researchain Logo
Decentralizing Knowledge