Sam Chung
University of Washington
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Sam Chung.
hawaii international conference on system sciences | 2007
Sam Chung; Joseph Byung Chul An; Sergio Davalos
Service-oriented computing (SOC) enables the development and design of loosely coupled software components for integration with other software system. Since most legacy system were not designed and developed with services components, current legacy software systems require modernization (reengineered) into a target system made up of a set of loosely coupled services. A methodology for service-oriented software reengineering (SoSR) is proposed for applying SOC to legacy systems. The SoSR methodology, a synthesis of best practices, is architecture-centric, service-oriented, role-specific, and model-driven. It is conceptualized from a three-service-participants model, 4+1 view model, and RACI chart. The SoSR methodology is applied in the modernization of a legacy system, a retail business information systems. The results show that this methodology can help software developers and system integrators in reengineering tightly coupled legacy information systems into service-oriented information systems. By including a business process engine for executing composite services with existing applications and database servers, SOC can affect future information system design, deployment, and integration
web information systems engineering | 2000
Sam Chung; Yun Sik Lee
It is shown that reverse software engineering using the Unified Process (UP) and visual models with the Unified Modeling Language can be applied to Web site maintenance. By reverse engineering the current Web sites, the implementation models of the current Web sites are derived from the Web sites. For the navigation schemes, the Web elements and their dependencies of the current Web sites are shown in component diagrams. Also, the physical directory structures are shown in the component view of the implementation model. Our empirical results on official university Web site maintenance show that the reverse software engineering and visual models can help Web administrators to understand the navigation schemes and physical structures quickly and easily.
hawaii international conference on system sciences | 2008
Robert Bunge; Sam Chung; Barbara Endicott-Popovsky; Don McLane
This study proposes a new operational framework of a network administrator for service oriented architecture (SOA) network security. It seeks to characterize the current state of practices in SOA network security by gathering information regarding known threats and defenses for SOA deployments. It works towards the practical implementation of SOA designs by creating training and testing scenarios for those preparing to work in this area. Finally, it frames these and other SOA security efforts with respect to a classic theoretical model of information security. The resulting synthesis includes recommendations on how best to process the XML network traffic typical of SOA applications. The proposed approach is Filtering to Inspect XML (FIX) at the networks perimeter. This framework contributes to the understanding of secure SOA designs by clarifying the responsibilities of both network managers and software engineers in orchestrating XML-based services.
international conference on communications | 2009
Apaporn Boonyarattaphan; Yan Bai; Sam Chung
e-Health services are gaining popularity due to largely reduced cost and wider range of advanced services. Securing e-Health data transmission is challenging due to both (a) the criticality of personal medical information on effective medical treatment and privacy protection and (b) the significant computational needs of encryption algorithms. In this paper, a cost-effective security framework that suits for e-Health authentication and data transmission is presented. The framework consists of efficient protocol architecture for e-Health service; two risk adaptive authentication techniques and different encryption algorithms to handle data with different levels of importance, thus achieving required security requirements of e-Health applications and reduction in the computational complexity and delay in e-Health communication.
international conference on web services | 2006
Christopher A. Perryea; Sam Chung
This paper presents a novel approach to expedite a service discovery process. Since current service discovery approaches do not assume any preprocessing when service providers publish services into a service registry, service composition occurs at discovery time. Also, easily reusing a composed service for future discovery has not been considered. In this paper, instead of considering a service registry as a set of published services, we build a service knowledge base at publication time, which we call a service community. The service community consists of a set of service populations and their relationships in composition. A service population is a set of services in which the input and output parameters of all services are semantically equivalent. These pre-composed services expedite the on demand service discovery process. Also a newly composed service is injected into the service community, and easily reused for future discoveries
Proceedings of the 2nd annual conference on Research in information technology | 2013
Soon K. Bang; Sam Chung; Young Choh; Marc J. Dupuis
Since 2009, DevOps, the combination of development and operation, has been adopted within organizations in industry, such as Netflix, Flickr, and Fotopedia. Configuration management tools have been used to support DevOps. However, in this paper we investigate which Knowledge, Skills, and Abilities (KSA) have been employed in developing and deploying modern web applications and how these KSAs support DevOps. By applying a qualitative analysis approach, namely grounded theory, to three web application development projects, we discover that the KSAs for both Software Development and IT Operator practitioners support the four perspectives of DevOps: collaboration culture, automation, measurement, and sharing.
service-oriented computing and applications | 2009
Sam Chung; Daehee Won; Seung Ho Baeg; Sangdeok Park
The purpose of this paper is to propose a service-oriented reverse reengineering that consists of re-documentation and design recovery. To understand the legacy system, we need to re-document the legacy system in a highlevel abstraction by using UML visual models through an initial reverse engineering. For this re-documentation, we propose a new re-documentation technique called 5W1H (Why, Who, When, Where, What, and How) model-driven re-documentation. Based upon the re-documented software visual model, we attempt to identify the scope of locating the candidate services from a legacy system. To show the feasibility of our approach, two applications using different design methods and architectures are re-documented into visual models. After recovering design methods and architectural patterns from the visual models, which have been injected into source code implicitly or explicitly to bring clear separation of concerns, we locate the scope of candidate services from the legacy system. We can reduce the effort of identifying candidate services by using the visualized model since we can discover highly possible locations for reusable business logic effectively. The service-oriented reverse engineering using 5W1H re-documentation technique will help a service producer to easily discover the candidate services from a legacy system through software re-documentation.
international conference on web services | 2005
Sam Chung; Peter Young; Jack Nelson
This research proposes to modernize a legacy software system by using Web services as the main building blocks of the software reengineering. For this purpose, a legacy theorem proof checking and derivation tool called Bertie3 is reengineered in terms of service-oriented architecture, service-oriented componentization, and external data representation and serialization. With the Web services of derivation checking engines and first-order markup languages, a minimal amount of development time can be spent working on well-known and well-developed components. More time can be spent updating the features that make the tool unique. This case study shows that modernizing a software system with Web services will allow the business components of the system to be easily expanded and integrated with other application components for future demands.
web intelligence | 2007
Martine De Cock; Sam Chung; Omar Hafeez
When several functionally equivalent web services are available to perform the same task, their Quality of Service (QoS) characteristics such as performance and reliability become important in the selection process. Consumers that specify their QoS requirements too strictly however, risk not finding any web services meeting their demands. Therefore, in this paper we allow QoS constraints to be described imprecisely as fuzzy sets. We compare the effectiveness of an intelligent web service selection algorithm that takes these imprecise QoS constraints into account with a baseline algorithm acting on precise QoS values.
international conference on multimedia and expo | 2013
Seungwan Ryu; Sei Kwon Park; Nam Hoon Park; Sam Chung
Mobile and wireless technology is advancing forward to deliver more connected devices and richer multimedia content and applications. The number of mobile subscriptions continues to grow along with an explosive increase in the mobile data traffic demand. Thereby, it creates a significant network capacity shortage concerns for mobile network operators. In order to address this problem, it is essential to increase the network capacity at a low additional cost. The device-to-device (D2D) communication based proximity service is believed to have a promising future mobile communication technology that is capable to create new mobile service opportunities and offload traffic to the eNB. In this article, we present perspectives, possibilities and challenging issues of the D2D communication based new mobile proximity multimedia services. Based on the scenario analysis process, we propose three types of D2D services, an Ad hoc D2D type, an agent-based D2D type and a mesh D2D type. Finally, we argue on the several challenging issues that are essential in provisioning the D2D based proximity services.