Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yonghwan Lee is active.

Publication


Featured researches published by Yonghwan Lee.


international conference on computational science and its applications | 2005

An authenticated key exchange mechanism using one-time shared key

Yonghwan Lee; Eunmi Choi; Dugki Min

In order to exchange secure information over the Internet, it is necessary to provide a shared encryption key after dual authentication between the communication parties for data confidentiality. To find an effective authenticated key exchange scheme, many researchers have studied improvement of the Diffie-Hellman key exchange scheme to overcome the weakness of computation complexity and man-in-the-middle attacks. This paper proposes an efficient authentication and key exchange scheme that does not use certificates and public key cryptography, while protecting against man-in-the-middle attacks, replay attacks, DOS attacks and privacy intrusion. This scheme performs a dual authentication using one-time shared authentication key and generates an encryption key which is used in a symmetric block cipher. Our mechanism also includes a secure method that generates an initial seed for creating a one-time shared secret key. In addition, it solves the problem of identity privacy as well as perfect forward secrecy for future data confidentiality.


international conference on computational science and its applications | 2005

A CBD application integration framework for high productivity and maintainability

Yonghwan Lee; Eunmi Choi; Dugki Min

Under a rapidly evolving e-business environment with frequent employee turnover and limited resources, a large volume of web-based software development projects require the CBD method for highly reusability and flexibility. This paper presents the architecture of our CBD application integration framework that has been used for developing large-scale e-business applications to achieve high development productivity and maintainability. This framework is flexible and extensible dynamically so as to be customized to various applications. It provides a development and maintenance toolkit as well as common business logics that can be reused with a few adaptation steps. This framework copes with a number of software architectural qualities in various aspects.


pacific rim international symposium on dependable computing | 2007

Applied Self-Healing: Self-Aware Service Request Optimization for Gateway Stability in Ubiquitous Zone-Based Networks

Junaid Ahsenali Chaudhry; Yonghwan Lee; Dugki Min; Seung-Kyu Park; Chun Hyon Chang; Duckwon Chung

In this paper, we present an application of self-healing systems in the form of service request optimization algorithm for service gateways. This algorithm preestimates the load of the gateway and accepts the service request according to the capability of the worker thread. The experimental and simulation results show that the performance of load control algorithm works well for managing the service request. Our study has revealed that normally the networks fail to entertain the requests after the saturation point. Whereas the algorithm proposed in this paper, virtually accepts the service requests almost always which is what is essentially required from hybrid network in a ubiquitous environment. The algorithm proposed is already embedded and are in work in the IT infrastructure of major banks of Korea.


international symposium on parallel and distributed processing and applications | 2006

A delay time-based peak load control for stable performance

Yonghwan Lee; Eunmi Choi; Dugki Min

Currently, integration application, such as EAI (Enterprise Application Integration), B2BI (Business-To-Business Integration), requires reliable B2B integration framework that can stably process massive I/O transactions during overload state. This paper proposes the delay time-based peak load control for stable performance and we describe that how the suggested pattern is applied to B2BI as an example. The pattern uses the delay time algorithm for controlling the heavy peak load caused by many requests for a short period of time. According to our experimental result, the proposed delay time algorithm can stably process the heavy load after the saturation point and has an effect on the controlling the peak loads.


web age information management | 2007

A dynamically adjustable rule engine for agile business computing environments

Yonghwan Lee; Junaid Ahsenali Chaudhry; Dugki Min; Sunyoung Han; Seung-Kyu Park

Most agile applications have to deal with dynamic change of processes of automatic business policies, procedures, and logics. As a solution for the dynamic change of processes, rule-based software development is used. With the increase in complexity in modern day business system, the business rules have become harder to express hence require additional especially designed scripting languages. The high cost of modifying or updating those rules is our motivation in this paper. We propose a compilation-based dynamically adjustable rule engine that is used for rich rule expression and performance enhancement. Because of immense complications among and within business rules, we use Java language to create/modify rule instead of scripting languages. It gives us the facility of standardized syntax also. It separates the condition from action during run time which makes rule notification easier and quicker. According to experimental results, the proposed dynamically adjustable rule engine shows promising results when compared with contemporary script-based solutions.


software technologies for embedded and ubiquitous systems | 2007

On self-aware delay time based service request optimization for gateway stability in autonomic self-healing systems

Junaid Ahsenali Chaudhry; Yonghwan Lee; Seung-Kyu Park; Dugki Min

The benefits of component-based service composition are immense however due to their exponential complexity; their real time implementation is a big challenge. In hybrid networks i.e. ubiquitous zone-based networks (u-Zone Networks), the high intensity of service requests can effect drastically on the performance stability of service gateways. In this paper, we present a selfaware service request optimization algorithm for autonomic self-healing systems. We propose when a service request is received and the system is found in the overload state where it can not entertain more service requests, instead of imposing denial of service, the gateway would evaluate the workload of the worker thread at the gateway and reschedule the service request by deferring it. According to our simulation result, the proposed delay time algorithm, if implied, enable gateways with more stability in order to process high flux of service request loads even beyond the saturation point.


grid and cooperative computing | 2006

A Hybrid Service-based Orchestration System for Composition of Legacy Services

Yonghwan Lee; Sung-min Kim; Dugki Min

WSBPEL is generally accepted as a de-facto standard for Web services composition. However, WSBPEL is not a solution for integrating existing enterprise applications, such as RMI, EJB, and CORBA. In this paper, we propose a hybrid service architecture model that can describe both Web services and existing EAs as partners in WSBPEL. In other words, the suggested architecture model can represent both Web services and EAs as same type of services. We also provide a hybrid service orchestration system that supports the hybrid toolkit for automatically generating, deploying and executing hybrid services according to the hybrid service architecture model


autonomic and trusted computing | 2006

An integration framework for trustworthy transactions

Yonghwan Lee; Dugki Min

I/O-driven integration applications, such as EAI, B2Bi, home gateways, and heterogeneous devices integration, need a trustworthy integration framework to process a large volume of I/O-driven transactions with high performance and reliability. This paper proposes an integration framework for trustworthy transactions. This framework employs a design pattern, so-called, the Worker-Linker pattern, that is used for performance stability. According to our experimental results, the pattern helps the integration framework to control the heavy load after the saturation point. Moreover, this framework supports a number of mechanisms for trustworthy integration transactions. In this paper, we describe the mechanisms.


The Kips Transactions:partd | 2006

A Variable Business Component Development and Case Study Using a Rule Based Analysis Pattern and UML Components

Yonghwan Lee; Dug-Ki Min

In order to increase extensibility and reusability of business components, the variable things need to be analyzed from the analysis phase and identified as components. In this paper, we propose a rule-based analysis pattern, which can effectively extract object-based main concepts from a variable business process in the analysis phase and identify a variable business component by applying the pattern to the UML Components development process. It can make analysis artifacts consistent and readable for analysts with different level of knowledge and experience to apply the pattern to analysis of rule-based variable business processes. And also, variable business components can be easily identified by applying the pattern to the UML Components development process. In order to prove the feasibility of the pattern, we have applied the pattern the deposit and import/export subsystem of the banking domain. According to our experience, we can make the same business conceptual models between the deposit and import/export subsystem due to the main concepts suggested by the pattern and effectively identify a variable business components in the UML Components development process.


grid and cooperative computing | 2005

A rule-based analysis method for cooperative business applications

Yonghwan Lee; Eunmi Choi; Dugki Min

The existing CBD development methods deal with the analysis phase in a superficial manner. Applying such a superficial analysis to cooperative business applications with a number of distributed sub-components makes analysis models be inconsistent with levels and styles, only depending on experiences of the analysts. In this paper, we propose a rule-based analysis method that provides an analysis template for cooperative business applications. This method analyzes the concepts of cooperative business applications by using external events and internal rules that process the events. Employing this method, a huge business application can be developed by a couple of co-analysts who work together in a consistent and systematic manner. This paper also provides an efficient way to apply the rule-based analysis method to UML Component development methods.

Collaboration


Dive into the Yonghwan Lee's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge