Rosslin John Robles
Hannam University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Rosslin John Robles.
2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security | 2009
Maricel O. Balitanas; Rosslin John Robles; Nayoun Kim; Tai-hoon Kim
Attaining security through cryptography techniques can be puzzling. A large and potentially confusing variety of security solutions are built from a relatively small number of primitive cryptographic components. It is widely recognized however; that data security will play a crucial role in modern times for business will be transacted over the internet and even to wireless devices. This paper presents a cross crypto-scheme that combines both symmetric algorithm of AES and the Asymmetric algorithm of Elliptic Curve Cryptography (ECC).
2008 International Symposium on Ubiquitous Multimedia Computing | 2008
Na-yun Kim; Rosslin John Robles; Sung-Eon Cho; Yang-seon Lee; Tai-hoon Kim
This paper discusses the effects of Sarbanes-Oxley (SOX) Act on corporate information security governance practices. The resultant regulatory intervention forces a company to revisit its internal control structures and asses the nature and scope of its compliance with the law. This paper reviews the implications emerging from the mandatory compliance with Sarbanes-Oxley (SOX) Act. Issues related to IT governance and the general integrity of the enterprise are also identified and discussed. Industry internal control assessment frameworks, such as COSO and COBIT, are reviewed and their usefulness in ensuring compliance evaluated.
International Conference on Security Technology | 2009
Rosslin John Robles; Min-kyu Choi
Traditionally SCADA is connected only in a limited private network. With new technology and facilities, there are also demands of connecting SCADA though the internet. The internet SCADA facility has brought a lot of advantages in terms of control, data viewing and generation. Aside from connecting SCADA to the internet, there are also operators who want to connect their system wirelessly. This can save budget for communication lines. Along with the advantages it brings, are security issues regarding wireless internet SCADA. In this paper, we discuss internet SCADA, its connection through wireless communication and the security issues surrounding it. To answer the security issues, a symmetric-key encryption for wireless internet SCADA is proposed.
International Conference on Security-Enriched Urban Computing and Smart Grid | 2011
Rosslin John Robles; Maricel O. Balitanas; Tai-hoon Kim
SCADA has now expanded as it utilizes the Internet as communication line. SCADA communications can contain sensitive data, it is also a core component of a SCADA Monitoring System. SCADA (Supervisory Control and Data Acquisition) communication can take place in a number of ways. Components that are designed to operate in safety-critical environments are usually designed to failsafe, but security vulnerabilities could be exploited by an attacker to disable the fail-safe mechanisms. This makes these devices must not only be designed for safety but also for security. Because of so many vulnerabilities, encryption Schemes are applied to secure the communication between the components. This work compares different Encryption Schemes for Securing Internet SCADA Component Communication.
2008 International Symposium on Ubiquitous Multimedia Computing | 2008
Rosslin John Robles; Min-kyu Choi; Sang-Soo Yeo; Tai-hoon Kim
Most access control approaches are based on individual users. Access control should also cover the enterprise wide systems. Role-based access control (RBAC) with the support of cookies is the solution to this problem. Cookies can be used to support RBAC on the Web by storing userspsila role information. However, cookies also have some technical drawbacks. In particular, they do not always accurately identify users or they can be used for security attacks. In this paper, we discuss the implementation of role-based access control with role hierarchies on the Web by secure cookies.
ubiquitous computing | 2011
Rosslin John Robles; Maricel O. Balitanas; Ronnie D. Caytiles; Yvette E. Gelogo; Tai-hoon Kim
In Symmetric encryption, a secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the content in a particular way. While is Asymmetric Encryption, two keys are used. A public key is made freely available to anyone who might want to send you a message. A second, private key is kept secret, so that only you know it. These Schemes can be integrated to SCADA communication. SCADA (Supervisory Control and Data Acquisition) communication can take place in a number of ways. Early SCADA communication took place over radio, modem, or dedicated serial lines. The internet SCADA facility has brought a lot of advantages in terms of control, data generation and viewing. With these advantages, come the security issues regarding web SCADA. In this paper, comparison between Encryption Schemes as used in Communication between SCADA Components is discussed.
Asia-pacific Journal of Multimedia services convergent with Art, Humanities, and Sociology | 2012
Maricel O. Balitanas; Rosslin John Robles
Peer-to-Peer (P2P) communications and its applications have become conventional architecture in the wired network environment. However, they have not been effectively adapted to the ensemble mobile environment which composed of various devices such as smart mobiles devices, laptops, and device with embedded software. In P2P systems, each node can act as a client and as a server at the same time and shares with others its own data. Our contribution consists in designing, implementing and testing a BitTorrent like application adapted to wireless ad-hoc networks of Android Mobile Phones. The employment of P2P protocols and applications in the platform of the ensemble mobile environment is becoming a promising solution which permits a wide number of users to share their own contents (data, audio, video, etc.) and communicate with each other without using costly and centralized network infrastructure. By using a central server, the peers will be able to get the information about the contents of other peers. Even in the absence of the Internet, the mobile devices provide users with the potential opportunity to connect in ad-hoc manner via short range wireless protocol such as Wi-Fi.
International Conference on Security-Enriched Urban Computing and Smart Grid | 2010
Rosslin John Robles; Tai-hoon Kim
Context aware applications respond and adapt to changes in the computing environment. It is the concept of leveraging information about the end user to improve the quality of the interaction. New technologies in context-enriched services will use location, presence, social attributes, and other environmental information to anticipate an end user’s immediate needs, offering more-sophisticated, situation-aware and usable functions. Smart homes connect all the devices and appliances in your home so they can communicate with each other and with you. Context-awareness can be applied to Smart Home technology. In this paper, we discuss the context-aware tools for development of Smart Home Systems.
International Conference on Advanced Computer Science and Information Technology | 2010
Rosslin John Robles; Tai-hoon Kim
The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network. SCADA is considered a critical infrastructure, and connecting to the internet is putting the society on jeopardy, some operators hold back on connecting it to the internet. But since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Supervisory Control and Data Acquisition Systems (SCADA) through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.
2009 International e-Conference on Advanced Science and Technology | 2009
Rosslin John Robles; Min-kyu Choi; Eun-suk Cho
File sharing is a common practice since the introduction of computer networks. It involves using technology that allows network users to share files that are stored on their individual computers. Peer-to-peer or simply P2P applications, such as those used to share multimedia files, are some of the most common forms of file-sharing technology. However, P2P applications are vulnerable to security risks that may put your information or your computer in jeopardy. In this paper, Issues and solution in P2P Sharing are discussed. We also suggest a method in file sharing which include the splitting of the file into chunks before the sending process. Our methods process and applicability is also covered.