Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hyokyung Chang is active.

Publication


Featured researches published by Hyokyung Chang.


International Conference on Advanced Communication and Networking | 2011

User Authentication Platform Using Provisioning in Cloud Computing Environment

Hyosik Ahn; Hyokyung Chang; Changbok Jang; Euiin Choi

Cloud computing is a computing environment centered on users and can use programs or documents stored respectivily in servers by operating an applied software such as Web browser through diverse devices on where users can access Internet as an on-demand outsourcing service of IT resources using Internet. In order to use these cloud computing service, a user authentication is needed. This paper proposed the platform for user authentication using provisioning in Cloud computing environment.


international conference on future generation communication and networking | 2010

Challenges and Security in Cloud Computing

Hyokyung Chang; Euiin Choi

People who live in this world want to solve any problems as they happen then. An IT technology called Ubiquitous computing should help the situations easier and we call a technology which makes it even better and powerful cloud computing. Cloud computing, however, is at the stage of the beginning to implement and use and it faces a lot of challenges in technical matters and security issues. This paper looks at the cloud computing security.


ubiquitous computing | 2011

User Authentication in Cloud Computing

Hyokyung Chang; Euiin Choi

As Cloud Computing has been spreading widely, users and service providers enables to use resource or service cheaply and easily without owning all the resource needed. However, Cloud Computing has some security issues such as virtualization technology security, massive distributed processing technology, service availability, massive traffic handling, application security, access control, and authentication and password. User authentication among them requires a high-quranteed security. Hence, this paper would like to discuss technologies of access contol and user authentication briefly and look at the problems inside.


International Conference on Advanced Communication and Networking | 2011

Profile for Effective Service Management on Mobile Cloud Computing

Changbok Jang; Hyokyung Chang; Hyosik Ahn; Yongho Kang; Euiin Choi

Mobile Cloud Computing has become as a new IT paradigm because of the growth of mobile device like smartphone and appearance of Cloud Computing environment. This mobile cloud environment provides various services and IT resources according to users‘ requests, so an effective management of service and IT resources is required. Hence, this paper designs a profile on mobile cloud service platform in order to provide distributed IT resources and services to users based on context-awareness information. As the profile proposed in this paper uses context-aware information, it enables to provide more accurate personalized services and manage distributed IT resources.


international conference on hybrid information technology | 2011

Authentication Platform for Provisioning in Cloud Computing

Hyokyung Chang; Changbok Jang; Hyosik Ahn; Euiin Choi

Spreading of Cloud Computing draws users to ask for service provide that is more improved, faster, and securer. So, there come security issues in Cloud Computing continuously and there have been a lot of studies on authentication and accee control. Provisioning is a technology related to the process and action that prepare knowledge and resources and supply what needed in advance to find the opitimum among them. Provisioning is one of the technologies to make Cloud Computing more efficiently. This paper proposes an authentication for provisioing in Cloud Computing.


ubiquitous computing | 2011

Design of Intelligence Mobile Cloud Service Platform Based Context-Aware

Hyokyung Chang; Euiin Choi

Mobile Cloud Computing has become as a new IT paradigm because of the growth of mobile device like smartphone and appearance of Cloud Computing environment. This Mobile Cloud environment provides various services and IT resources according to users’ requests, so an effective management of service and IT resources is required. Hence, this paper designs a context-aware knowledge Mobile Cloud service platform in order to provide distributed IT resources and services to users based on context-awareness information. As the context-aware knowledge Mobile Cloud service platform proposed in this paper uses context-aware information, it enables to provide more accurate presonalized services and manage distributed IT resources.


international conference on future generation communication and networking | 2008

Method of Profile Storage for Improving Recommendation Accuracy on Ubiquitous Computing

Changbok Jang; Jeongseok Kim; Hyokyung Chang; Euiin Choi; Bonghoi Kim; Gang Soo Lee

Users are able to use the information and service more free than previous wire network due to development of wireless network and device. For this reason, various studies on ubiquitous networks have been conducted. Various contexts brought in this ubiquitous computing environment, have recognized user¿s action through sensors. This results in the provision of better services. Because services exist in various places in ubiquitous networks, the application has the time of services searching. In addition, user¿s context is very dynamic, so a method needs to be found to recommend services to user by context. Therefore, techniques for reducing the time of service and increasing accuracy of recommendation are being studied. But it is difficult to quickly and appropriately provide large numbers of services, because only basic context information is stored. For this reason, we suggest DUPS(Dimension User Profile System), which stores location, time, and frequency information of often used services. Because previous technique used to simple information for recommending service without predicting services which is going to use on future, we can provide better service, and improve accuracy over previous techniques.


international conference on computational science and its applications | 2008

Auditing System Using Rule-Based Reasoning in Ubiquitous Computing

Moohun Lee; Sunghoon Cho; Hyokyung Chang; Junghee Jo; Hoiyoung Jung; Euiin Choi

We can use information and software of various forms without being restricted for place and time if ubiquitous computing age comes. However, its dysfunction is causing security problems such as outflow of personal information, hacking, diffusion of virus. Specially, dissemination of software that has malicious purpose in ubiquitous computing environment causes serious damage. We have studied about malicious code detection and software vulnerability detection tool to prevent this. But, existent detection tools are not suited to general software, because they are limitative in specification area. In addition, they can not detect a newly appeared malicious code. We must update pattern of new malicious code, because they use a simple pattern matching technique. In this paper, we propose rule-based auditing system that analyzes structure of target code to solve these problems, define this as rule, and detect malicious codes and software vulnerabilities. Proposed auditing system can construct secure ubiquitous computing environment, because it will be used by a common software audit system that reason about source codes security.


international conference on advanced communication technology | 2008

Context Model of User Aspect in Context-Awareness

Hongsoo Hur; Heeyong Park; Jeongseok Kim; Hyokyung Chang; Moohun Lee; Sunghoon Cho; Euiin Choi

It is very important to model the acquired context to store and manage for context-awareness. Diverse modeling method has been studied and used. But there are several problems. Most models are represented by relational property and modeled with object-centered. It also needs other model to use in other field. Aspect of context-awareness can be changed according as the nucleus is an object or user. In this paper, we interpret with user aspect and propose the context model to resolve the problems. We defined appropriate context that fit to user-centered context model through diverse definition of context.


Archive | 2012

User Authentication Using Context-Awareness RBAC Model on Cloud Computing

Hyosik Ahn; Changbok Jang; Hyokyung Chang; Euiin Choi

Cloud Computing has been spreading widely, users and service providers enables to use resource or service cheaply and easily without owning all the resource needed. However, Cloud Computing has some security issues such as virtualization technology security, massive distributed processing technology, service availability, massive traffic handling, application security, access control, and authentication and password. User authentication among them requires a high-quranteed security. In this paper propose to context-awareness RABC model that based on profile about which user’s information which provided efficiently access control to user through active classification, inference and judgment about user who access to system and resource.

Collaboration


Dive into the Hyokyung Chang's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge