Sung Won Sohn
Electronics and Telecommunications Research Institute
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Sung Won Sohn.
international conference on information networking | 2002
Geon Kim; So Hee Park; Jae Hoon Nah; Sung Won Sohn
Security policy system defines the basic rules and strategies for information security systems, e.g., IPsec, IKE, and Firewalls. But due to the heterogeneous network security systems and the corresponding applications of security policy system, it is difficult to build up a unified policy database and deploy it efficiently. In this paper, we propose a unified security policy database schema to be applied to IPsec system and a synchronous methodology of security policy deployment with controlling network schedule. By these, we can guarantee more efficient security services in the policy-based distributed network.
international conference on information networking | 2003
Hyun Joo Kim; Jung-Chan Na; Sung Won Sohn
Active network is a new approach of next generation network performing computation and manipulations as injecting programs into the network. Because of these features of active network, active technology is being applied to various areas. Current electronic mail service is useful and popular information transmission media through the Internet. But because it delivers mail through the SMTP mail servers without considering the location of sender or recipient’s host, it makes poor performance by generating the redundant network traffic. Therefore in this paper, we suggest Shortest-Path Mailing Service based on active network to solve these problems of traditional mail service. Shortest-Path Mailing Service can reduce the redundant network traffic by transmitting mail to the closest active node from a recipient’s host, Active Mail Manager.
international conference on information networking | 2002
Wonjoo Park; Jaehoon Nah; Sung Won Sohn
The security architecture of the Internet Protocol known as IP Security (IPsec) is the most advanced effort in the standardization of Internet security. IPsec provides secure communication between two IP nodes, called IPsec peers. These types of communications are essentially sets of Security Associations (SAs) and define which protocol should be applied to packets. To implement IPsec cooperation with key management protocol- either manual or automated-, it is required prior to the security association management tool and database(SADB). This paper proposes the design and implementation of SA management method oriented to IP security.
Archive | 2003
Hyun Joo Kim; Jung-Chan Na; Sung Won Sohn
Archive | 2005
Beom Hwan Chang; Soo Hyung Lee; Jin Oh Kim; Jung Chan Na; Jong Soo Jang; Sung Won Sohn
Archive | 2007
Jong Hyun Kim; Geon Lyang Kim; Seon Gyoung Sohn; Beom Hwan Chang; Chi Yoon Jeong; Jong Ho Ryu; Jung Chan Na; Jong Soo Jang; Sung Won Sohn
Archive | 2006
Beom Hwan Chang; Jung Chan Na; Geon Lyang Kim; Dong-Young Kim; Jin Oh Kim; Hyun Joo Kim; Hyo Chan Bang; Soo Hyung Lee; Seon Gyoung Shon; Jong Soo Jang; Sung Won Sohn
Archive | 2005
Kwang Ho Baik; Jin Tae Oh; Ki Young Kim; Jong Soo Jang; Sung Won Sohn
Archive | 2002
Sook Yeon Kim; Geon Lyang Kim; Myung Eun Kim; Ki Young Kim; Jong Soo Jang; Sung Won Sohn; Hyochan Bang
Archive | 2002
So-hee Park; Ji Hoon Jeong; Hyung Kyu Lee; Gunwoo Kim; Su Hyung Jo; Wonjoo Park; Jae Hoon Nah; Sung Won Sohn; Chee Hang Park