Su-Jin Baek
Kyung Hee University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Su-Jin Baek.
Wireless Personal Communications | 2013
Su-Jin Baek; Jung-Soo Han; Kyung-Yong Chung
The self-adaptation of software systems is a complex process that depends on several factors that can change during the system operational lifetime. But, Today’s workflow management systems are only applicable in a secure and safe manner if the business process to be supported is well-structured and there is no need for ad hoc deviations at runtime. Hence, it is necessary to define mechanisms for providing a self-adaptive system the capability of reconfiguration during run-time the process that controls its adaptation. In this paper, we provide rapid dynamic reconfiguration using the workflow based on goal-scenario as the basis to set up strategies in accordance with the adaptive judgment. Also, we provide a sophisticated approach which fosters learning from past process changes by process variants through the order matrix. We present a formal foundation for the support of dynamic structural workflow changes of running. Our approach uses estimates based goal-scenario to determine which remaining parts of running workflows are affected by the external environment and is able to predictively perform suitable adaptation. This helps to ensure that necessary adaptation are performed in time with minimal user interaction which is especially valuable in change of external environment.
international conference on it convergence and security, icitcs | 2013
Jong-Won Ko; Su-Jin Baek; Gui-Jung Kim
This study proposed a method of developing an intelligent recommendation system for automotive parts assembly. The proposed system will display the detailed information and the list components which make up the relevant part that an user wants through the database using the ontology when selecting an automotive part that an user intends to learn or to be guided of. The intelligent recommendation system for parts is offered to users through determining the automatic recommendation order between parts using the weights. This study has experimented the principles of the recommendation system and the method of setting the weights by setting two scenarios.
international conference on it convergence and security, icitcs | 2012
Su-Jin Baek; Jung-Soo Han; Young-Jae Song
Threat modeling plays a significant role in the design of the overall security model for a system because it can help to ensure that security is built into applications, rather than addressed as an afterthought. However, research in security threat modeling has yet to mature as there is paucity of established techniques and tools to aid the threat modeling and formal analysis process. Moreover, existing work do not integrate threat modeling notations with a formal threat analysis procedure to aid decision making during security requirements analysis. This paper proposes a goal-Scenario approach to security threat modeling and requirement analysis by using visual model elements to explicitly capture threat-related concepts. More specifically, we propose a goal-scenario approach for explicitly modeling and analyzing security threats during requirements analysis. The goal scenario will be analyzed using the threat requirement, and the creation of the threat model will be discussed by the analysis on the STRIDE and the scenario authoring rules.
international conference on information science and applications | 2011
Su-Jin Baek; Jong-Won Ko; Young-Jae Song
The scope of the problems that could be solved by monitoring and the improvement of the recognition time is directly correlated to the performance of the management function of the business process. The Enhydra Shark from the existing WfMS shows the process records on the web client by the allocated activities during the designing process of the process log for the sake of the process monitoring. In WfMOpen, the documentation on the definition of the process is complication and insufficient, and there is no interacting part with other work flow services. Therefore, it rather provides services in accordance with the process result information that was allocated during the previous designing, rather than the monitoring of the changes by the influence of the external environment. In this paper we propose a system, which can interpret and monitoring to the result of each business acts follows in change of external environment. The proposed system applies a meta-heuristic genetic algorithms which to reduce additional load and to acquire the accuracy of system information. In addition, the similarity with the activities, dependency, and correlation are examined to find similar process model, and then the relevancy is extracted by using the event property information. Such information is used to figure out the problems occurring as a result of the changes and provide diagnostic information to support the adaptation decision making. With this, it is possible to apply the judgment of the situation info of the users as it occurs in a dynamic context.
international conference on it convergence and security, icitcs | 2013
Jong-Won Ko; Su-Jin Baek; Jung-Soo Han
Regarding the software development, MDA (Model Driven Architecture) of OMG can be regarded as the concept of making an independently-designed model according to the development environment and language and reusing it according to the desired development environment and language by expanding the reusable unit into the software model when developing software. The problem with these traditional research methods, but the first model, design model for checking the information with the model by defining a formal representation in the form of an abstract syntax tree, as you have shown how to perform validation of UML design model. Additional steps need to define more complex due to a software problem that is not the way to the model suitable for model transformation verification. In this paper, as defined in the verification based meta model for input and target model. And we also suggest how to perform model transformation verification using property matching based transformation similarity and mapping patterns.
international conference on it convergence and security, icitcs | 2013
Su-Jin Baek; Jong-Won Ko; Jung-Soo Han
As there is an increasing reliance on information systems in most organizations, there is also an increased risk of security accidents of information systems. Therefore, in order to verify the potential security risks and their results, it is necessary to have a security threat assessment process called threat modeling. However, research in security threat modeling has yet to mature as there is paucity of established techniques and tools to aid the threat modeling and formal analysis process. This study provides a method to design and analyze threats that occur in the bio-information processing system using the visual Goal-oriented threat modeling. In addition, it determines each threat based on the Goal-Threat model and defends itself through measuring repetitive assessment, vulnerability the degree of risk. Then, by designing each organization to perform security checks on its own, it supports to make it possible to easily find vulnerabilities in terms of administration and presents a recommendation to be performed in order to ensure stability.
international conference on it convergence and security, icitcs | 2012
Su-Jin Baek; Jong-Won Ko; Gui-Jung Kim; Jung-Soo Han; Young-Jae Song
Because of the rapid changes in the market environment and the uncertain demands from the customers, the investment in the information system by the corporate is increasing. This also resulted in the adoption of the process management system, which is intended for the adaptation to the speed of such changes, creation of competitiveness, and systematic management of the business process. To process the service demands from the customers that come in a dynamic manner, an analysis on the possible scope of changes on the recognition of the problems will be required, as well as the concept of data mining to redesign the process based on the adaptive decisions. The existing workflow mining technology was designed to extract business process redesign information from simple database fields or create a process model by collecting, identifying, and analyzing log information from the system that it could not be dynamically reconfigured by exploring the process flow suitable for new requests made on business process. In this study, an analytical method will be suggested using a heuristic algorithm based on the goals to create an adaptive process mining model that could provide a continuous service demand scenario that is created dynamically.
international conference on information science and applications | 2011
Sung-Ho Sim; Su-Jin Baek; Young-Jae Song
Web Services make the efficient uses of the information resources, and the integration and reuse thereof. In the current context of the Web, there are a number of searching methods in use. But all of these are only focusing on the functional aspects, and as a result there are a certain set of limitations that these search methods could not overcome. The purpose of this study is to enhance the web services in consideration of the functional aspects by suggesting a practical level decision making reflecting the functional and non-functional aspects using WSDL and meta-data upon the web services. For this purpose, the execution costs, reliability, and the quality level from the non-functional aspects of the existing studies are used to extract and save the detailed and clearly defined meta-data to record the non-functional elements. The selection administrator of the meta-broker uses these records to give rates and display the output value of the user intent. In this study, with a view to make it possible to use the kind of web service in consideration of the user oriented, non-functional aspects through extracting the meta-data and using the meta-broker, a meta-broker selection administrator and the process thereof that help the users to enjoy the desired level of quality are suggested, from the view point of the users.
The Journal of the Korea Contents Association | 2011
Su-Jin Baek; Jong-Won Ko; Young-Jae Song
The scope of the problems that could be solved by monitoring and the improvement of the recognition time is directly correlated to the performance of the management function of the business process. However, the current event-managing monitoring system and the real-time advanced alarming business monitoring system decided whether to apply warnings or not by assuming a fixed environment and showing expressions based on the design rules. Therefore, there is a limit for distinguishing the range of occurrence and the level of severity in regard to the new external problems occurring in a complicated environment. Such problems cannot be abstracted. In this paper, evaluation model of business process contextual situations using goal scenario is suggested to provide constant services through the current monitoring process in regard to the service demands of the new scenario which occurs outside. The new demands based on the outside situation are analyzed according to the target scenario for the process activities. Also, a similar process model is found and identified by combining similarity and interrelationship. The process can be stopped in advance or adjusted to the wanted direction.
Journal of information and communication convergence engineering | 2011
Su-Jin Baek; Young-Jae Song
The scope of the problems that could be solved by monitoring and the improvement of the recognition time is directly correlated to the performance of the management function of the business process. However, the current monitoring process of business activities decides whether to apply warnings or not by assuming a fixed environment and showing expressions based on the design rules. Also, warnings are applied by carrying out the measuring process when the event attribute values are inserted at every point. Therefore, there is a limit for distinguishing the range of occurrence and the level of severity in regard to the new external problems occurring in a complicated environment. Such problems cannot be abstracted. Also, since it is difficult to expand the range of problems which can be possibly evaluated, it is impossible to evaluate any unexpected situation which could occur in the execution period. In this paper, a process-evaluating model based on the goal scenario is suggested to provide constant services through the current monitoring process in regard to the service demands of the new scenario which occurs outside. The new demands based on the outside situation are analyzed according to the goal scenario for the process activities. Also, by using the meta-heuristic algorithm, a similar process model is found and identified by combining similarity and interrelationship. The process can be stopped in advance or adjusted to the wanted direction.