Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jeong-Kyung Moon is active.

Publication


Featured researches published by Jeong-Kyung Moon.


JOURNAL OF ADVANCED INFORMATION TECHNOLOGY AND CONVERGENCE | 2011

A Secure Authentication Protocol for Cloud Services

Jeong-Kyung Moon; Jin-Mook Kim; Hwang-Rae Kim

The request about green IT technology is increasing recently. And effective use request of computer resource is increasing. So, necessity about Cloud computing is increasing rapidly thereby. However, Cloud computing environment have big security problems because embody using virtualization technology. It is Authentication that must solve in Cloud computing environment urgently. Therefore, we wishes to propose protocol that can solve suitable user and services certification in cloud computing environment. An novel authentication protocol that based on Kerberos. But it is faster than Kerberos and implement is easy.


The Journal of Digital Policy and Management | 2013

A System of Authentication and Security threat solution for N-screen services

Deuk-Young Hwang; Jeong-Kyung Moon; Jin-Mook Kim

Abstract N-screen is a Service that can be provide for One Service Multi Device. If the network is changed or if the device is changed after authentication the device fits seamlessly send footage. Security threats that occur here have a problem with user authentication. In this paper proposes available in a multi-device the authentication system. Homomorphic Encryption Algorithm of authentication scheme used. Among the authentication mechanism that already exists is a simple and lightweight authentication mechanism. In addition, N-screen service that uses multiple devices is simple authentication process of the device. Review the results of proposed authentication protocol, encryption algorithm to process a small storage capacity and is easy to work in low processor. And was suitable for use with multiple devices. Key Words : N-screen, Cloud service, Authentication service, Security threats, Information secure service Received 22 October 2013, Revised 20 November 2013Accepted 20 November 2013Corresponding Author: Jeong-Kyung Moon(Sunmoon University) Email: [email protected]Ⓒ The Society of Digital Policy & Management. All rights reserved. This is an open-access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.otg/licenses/by-nc/3.0), which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is ISSN: 1738-1916 properly cited.


international conference on future generation communication and networking | 2012

An Efficient BRS Management System Using OAuth

Jeong-Kyung Moon; Hwang-Rae Kim; Jin-Mook Kim

Trend of information is diversified fast by the spread of wireless internet recently. The service of book information search may be available without limitation of time and place in university library, because fast diffusion of electronic publishing is increasing. Therefore, we wishes to propose the convenience to search another college’s digital property or display by printer simplifying certification between majority college that is using OAuth. We can propose case and certification formality of the library which is not conferred mutually that is conferred mutually and share island and media search effectively cloud computing and Mobile communication environment.


Archive | 2012

Research of Virtualization Services Valuation for Cloud Computing Environments

Jin-Mook Kim; Jeong-Kyung Moon; Bong-Hwa Hong

Demand of cloud computing service that uses the Big-table is increasing recently. This is effective method to use computer resource to user ubiquitously. So, Internet Service and Virtualization Service are must be prepared to offer Cloud Computing Environments. In this time, virtualization service infrastructure has independent structure that is offered by each companies design and created specifications, Because of standardization about function, specification and performance are unprepared state about virtualization services. Therefore, we wish to propose common standards that can measure standard functions and performance of virtualization service, which can apply to companies which provide service. We established 6 common estimation items with functionality, authoritativeness, usability, efficiency, preservation conservativeness and portability about virtualization solutions. And about each item, established suitable 19 detail estimation items to ISO/IEC 9126 concretely. We examined whether we observe 19 details estimation items that the most representative VMware solution proposes among virtualization solutions. And we described results that examine availability whether we are suitable standard function and service about existent virtualization service using our proposed scheme in this research.


FGIT-GDC/IESH/CGAG | 2012

Approach of Tracing Prevention System Using OAuth for Printing Services in Mobile Device

Jin-Mook Kim; Jeong-Kyung Moon; Bong-Hwa Hong

The smart phone user is increasing very sharply. Smart phone user passes over 30 million people at 2012 in domestic. And Social Network Service user is expecting to come in about one billion people in worldwide. And smart phone used at most Android operation system. This has advantage that can offer freedom to move and convenience to user. But, most smart phone has various kind controversial points to security. Specially, we are interested about authentication and user position tracing problem among various kind security problems that occurrence is possible in smart phone using environment. And we want to suggest solving these problems. Therefore, we wish to propose that can check certification and position chase problem using OAuth to happen in smart phone expected position chase problem system. To example, we presented case that make use of printer that is shared in the nearest position with own because user uses smart phone. In case, we thought that our proposal system can solve tracing problem and various additional security problems such as confidentiality, integrity, and access control etc.


Journal of the Korea Convergence Society | 2013

Design and Implementation of Safe-Guard for Elementary School Students

Jin-Mook Kim; Jeong-Kyung Moon


Journal of the Korea Convergence Society | 2014

Modify of extended API for Smart-TV security

Jeong-Kyung Moon; Jin-Mook Kim


International Journal of Control and Automation | 2014

A Study of Authentication and Access Control for Library Research System

Jeong-Kyung Moon; Jin-Mook Kim; Bong-Hwa Hong


Multimedia 2013 | 2013

An Effective Resource Management for Cloud Services using Clustering Schemes

Jin-Mook Kim; Jeong-Kyung Moon; Bong-Hwa Hong


The Journal of the Korean Institute of Information and Communication Engineering | 2012

ADAM: An Approach of Digital Asset Management system

Jeong-Kyung Moon; Hwang-Rae Kim; Jin-Mook Kim

Collaboration


Dive into the Jeong-Kyung Moon's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hwang-Rae Kim

Kongju National University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge