lecture notes in electrical engineering - springer978-94-007-2911-7/1.pdf · prof. kuinam j. kim...
Post on 15-Jun-2019
216 Views
Preview:
TRANSCRIPT
Lecture Notes in Electrical Engineering
Volume 120
For further volumes:http://www.springer.com/series/7818
Kuinam J. Kim • Seong Jin AhnEditors
Proceedings of theInternational Conferenceon IT Convergenceand Security 2011
123
Prof. Kuinam J. KimConvergence SecurityKyoung-gi UniversityIui-dong San 94-6Gyeonggi-doSuwon 443-760Republic of South Koreae-mail: Icitcs2011@global.kcis.kr
Prof. Seong Jin AhnComputer ScienceSungkyunkwan UniversityCheonchoen-dong, Jangan-gu 300Gyeonggi-doSuwon 110-745Republic of South Koreae-mail: sjahn@songgang.skku.ac.kr
ISSN 1876-1100 e-ISSN 1876-1119ISBN 978-94-007-2910-0 e-ISBN 978-94-007-2911-7DOI 10.1007/978-94-007-2911-7Springer Dordrecht Heidelberg London New York
Library of Congress Control Number: 2011943212
� Springer Science+Business Media B.V. 2012No part of this work may be reproduced, stored in a retrieval system, or transmitted in any form or byany means, electronic, mechanical, photocopying, microfilming, recording or otherwise, without writtenpermission from the Publisher, with the exception of any material supplied specifically for the purposeof being entered and executed on a computer system, for exclusive use by the purchaser of the work.
Printed on acid-free paper
Springer is part of Springer Science+Business Media (www.springer.com)
Forword
As we entered the twentyfirst century, the rapid growth of information technologyhas changed our lives more conveniently than we have ever speculated. Recentlyin all fields of the industry, heterogeneous technologies have converged withinformation technology resulting in a new paradigm, information convergence.In the process of information convergence, the latest issues in the structure of data,system, network, and infrastructure have become the most challenging task.The goal of this proceedings is to discover a new progressive technology byupgrading the previous technologies and to solve the technical problems that mayhave occurred in the process of converging technology in various fieldsof industry.
v
Contents
Part I Security Fundamentals
1 A Secure Service Framework for Handling SecurityCritical Data on the Public Cloud . . . . . . . . . . . . . . . . . . . . . . . . 3Gi-Hwan Cho and Seung-Ah Lee
2 The Understanding of Building Trust Model on SmartphoneApplication: Focusing on Users’ Motivation . . . . . . . . . . . . . . . . 13Hun Choi, Yoo-Jung Choi and Ki-Mun Kim
3 Towards Understanding Deterrence: InformationSecurity Managers’ Perspective . . . . . . . . . . . . . . . . . . . . . . . . . 21Sangseo Park, Anthonie B. Ruighaver, Sean B. Maynardand Atif Ahmad
Part II Industrial and Business Information Security
4 Design of Attribute-Based Access Controlin Cloud Computing Environment . . . . . . . . . . . . . . . . . . . . . . . 41ByungRae Cha, JaeHyun Seo and JongWon Kim
5 Realizing Security Requirements with Physical Properties:A Case Study on Paper Voting . . . . . . . . . . . . . . . . . . . . . . . . . . 51André van Cleeff, Trajce Dimkov, Wolter Pietersand Roel Wieringa
6 Controlling Decryption of Personal Health Recordsin the Cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69Yi-Chang Hsu and Jing-Jang Hwang
vii
7 Access Control Mechanism for XML Document . . . . . . . . . . . . . 81Sun-Moon Jo and Kyung-Yong Chung
8 A Collaborative Intrusion Detection System Frameworkfor Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91Nguyen Doan Man and Eui-Nam Huh
9 Criteria for Comparing Cyberwarfare Capability . . . . . . . . . . . . 111Hyung-Jun Seo and Yoon-Cheol Choy
Part III Security Protocols and Applications
10 A RSSI-Based Approach for Localization of WirelessSensor Network in Indoor. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123Hyochang Ahn, Yong-Hwan Lee, Han-Jin Cho, Sang-Burm Rheeand June-Hwan Lee
11 Semantic Search and Retrieval System for Learning Objects . . . . 129M. Arshad Awan, A. Sattar, Cheong Ghil Kim, Chung Pyo Hongand Shin Dug Kim
12 Wear Leveling for PCM Using Hot Data Identification . . . . . . . . 145Inhwan Choi and Dongkun Shin
13 Monitoring and Feedback Tools for Realtime Workloadsfor Xen Virtual Machine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151Byung Ki Kim, Jae Hyeok Jang, Kyung Woo Hur, Jeong Gun Leeand Young Woong Ko
14 HARD: Host-Level Address Remapping Driverfor Solid-State Disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163Young-Joon Jang and Dongkun Shin
15 Ubiquitous Based Personalized HypertensionMonitoring System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169Jonghun Kim, Sihoon Ahn, Jaeyoung Soh, Daesung Leeand Kyung-Yong Chung
16 Customized IPTV Content Recommendation ServiceModel Based on Personal Preference. . . . . . . . . . . . . . . . . . . . . . 179Si-Jung Kim, Do-Eun Cho and Bong-Han Kim
viii Contents
17 A Study on the Touch Process of Android Smartphoneon Froyo and Gingerbread . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191Yeong-Gyu Lim, Cheong Ghil Kim and Shin Dug Kim
18 Case Study of QoS-Assured Convergence Service Overlayin Open Service Platform Environment . . . . . . . . . . . . . . . . . . . . 205Nam-Kyung Lee, Hyun-Woo Lee and Won Ryu
19 Aspect Oriented Software Development UsingRequirement Engineering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217Seung-Hyung Lee and Young-Jae Song
20 A Review of Accelerometer-Based PhysicalActivity Measurement. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223Yao Meng and Hee-Cheol Kim
21 A Group Data Synchronization Protocol in MobileEnvironments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239Ju-Geon Pak and Kee-Hyun Park
22 Efficient Transmission Method for Mobile Data SynchronizationBased on Data Characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . 253Kee-Hyun Park and Ju-Geon Pak
Part IV Convergence Security
23 A Dynamic Buffer Management of Hybrid Solid State Diskfor Media Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267In-Pyo Cho, So-Hyang Ko, Hoon-Mo Yang, Cheong-Ghil Kimand Shin-Dug Kim
24 An Efficient Live Stream Community Management Schemefor the Mobile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281Chung-Pyo Hong, Muhammad Arshad Awan, Cheong-Ghil Kimand Shin-Dug Kim
25 Development of Real-Time Gesture Recognition SystemUsing Visual Interaction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295Sung-Kwan Kang, Kyung-Yong Chung, Kee-Wook Rimand Jung-Hyun Lee
Contents ix
26 Architecture of Image Encryption Hardware UsingTwo Dimensional Cellular Automata. . . . . . . . . . . . . . . . . . . . . . 307Abdul Raouf Khan
27 Simulation of 3D Information Visualization . . . . . . . . . . . . . . . . . 317Gui-Jung Kim and Jung-Soo Han
28 Group Based Vehicular Machine to Machine CommunicationScheme in Cellular Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . 325Kyu Chul Kim, Chan Jung Park and Ronny Yongho Kim
29 Development of Real-Time Location-Based MultimediaStyle Slop Information Retrieval System . . . . . . . . . . . . . . . . . . . 331Sung-Ho Kim
30 Augmented Reality-Based Role-Playing Contentsfor Education . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337Sukhyun Lim, Hyung-Keun Jee, Jinyoung Youn and Junsuk Lee
31 Vertex Propagation for Fast Ray-Casting of DigitalElevation Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345Eun-Seok Lee, Jin-Hee Lee, Inwoo Jo and Byeong-Seok Shin
32 A Study of a Network Capacity Planning by AnalyzingJoint Probability of a Virtual Organization . . . . . . . . . . . . . . . . . 357Kyuho Lee and Seongjin Ahn
33 Image Registration for Sub-Pixel Using Pyramid Edge Images . . . 367Jae-Young Lee, Kee-Baek Kim, Seok-Han Lee, Tae-Eun Kimand Jong-Soo Choi
34 Real-Time Camera Tracking Using Planar Object Detection . . . . 373Ahr-Hyun Lee, Seok-Han Lee, Jae-Young Lee, Tae-Eun Kimand Jong-Soo Choi
35 Bidirectional Propagation Method for Analysis of Reflectionon Radio Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 379Reza Malekian and Abdul Hanan Abdullah
36 Robust Estimation of Heights of Moving People Usinga Single Camera . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389Sang-Wook Park, Tae-Eun Kim and Jong-Soo Choi
x Contents
Part V IT Convergence Applications
37 Goal-Heuristic Analysis Method for an AdaptiveProcess Mining. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409Su-Jin Baek, Jong-Won Ko, Gui-Jung Kim, Jung-Soo Hanand Young-Jae Song
38 Security Threat Modeling and Requirement AnalysisMethod Based on Goal-Scenario . . . . . . . . . . . . . . . . . . . . . . . . . 419Su-Jin Baek, Jung-Soo Han and Young-Jae Song
39 An Effective Learning Method in Art Using VirtualReality and Ontology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425Sang-Jin Cha, Gahee Kim, Chol-Hee Jang and Geun-Sik Jo
40 Development of Pain Prescription Decision Systemsfor Nursing Intervention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435Yoo Hyun, Ho-Il Jung and Kyung-Yong Chung
41 Performance Sensibility Influence of RecommendedMakeup Styles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445Kyung-Yong Chung, Kee-Wook Rim and Jung-Hyun Lee
42 Affective Social Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455Hyun-Jun Kim
43 A Study on the Metadata Extraction and RepositoryBased on Web Service Meta Broker . . . . . . . . . . . . . . . . . . . . . . 463Sung-Ho Sim and Young-Jae Song
44 Discovering Knowledge Flow in Social Network . . . . . . . . . . . . . 469Hyun-Jun Kim
45 Model Optimization with Graph Transformationand PSO Algorithm for Model Transformation Verification. . . . . 479Jong-Won Ko, Su-Jin Beak and Young-Jae Song
46 Pattern Based Model Transformation Using Mapping Patternsfor Model Transformation Verification . . . . . . . . . . . . . . . . . . . . 489Jong-Won Ko, Jung-Soo Han and Young-Jae Song
47 Improved Performance of Emotion Extraction ThroughBanned Words . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495Eunsoon You and Seung-Bo Park
Contents xi
48 Potential Emotion Word in Movie Dialog . . . . . . . . . . . . . . . . . . 507Seung-Bo Park, Eunsoon You and Jason J. Jung
49 Story Modeling for Green Light Decision Making . . . . . . . . . . . . 517Seung-Bo Park and Eunsoon You
50 Reducing the Gap of Provided Services and RequiresServices Based on Service Approach . . . . . . . . . . . . . . . . . . . . . . 523Hamid Mcheick, Mohamad Dbouk and Fady Dagher
51 An Extended XML Compression Technique for XMLElement Retrieval. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 539Tanakorn Wichaiwong and Chuleerat Jaruskulchai
Part VI Mobile Computing and Future Networks
52 Fuel Cell System Control Algorithm for Stable Operationof Residential Fuel Cell System . . . . . . . . . . . . . . . . . . . . . . . . . . 557Sunhoe Kim
53 Types of Fuel Cells and Applications for Electricityand Heat Co-Generation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 561Sunhoe Kim
54 Integrated Energy Management System Framework for theDistributed Smart Meters in Smart Grid Environment . . . . . . . . 567Yoon-Sik Yoo, Wan-Ki Park and II-Woo Lee
Part VII Multimedia and Information Visualization
55 Malware Detection Techniques Using ArtificialImmune System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 575Mohamed Ahmed Mohamed Ali and Mohd Aizaini Maarof
56 A Survey on P2P Botnet Detection . . . . . . . . . . . . . . . . . . . . . . . 589Kyoung-Soo Han and Eul Gyu Im
57 A Study on Instruction Substitution Analysisof Metamorphic Malware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 595Kyoung-Soo Han, Kyoung-Yong Chung and Eul Gyu Im
xii Contents
58 An Analysis of Malware Attached in Spam . . . . . . . . . . . . . . . . . 601Eul Gyu Im and Kyoung-Soo Han
59 Detection Methods for Malware Variant Using APICall Related Graphs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 607Kyoung-Soo Han, In-Kyoung Kim and Eul Gyu Im
60 Malware Classification Methods Using API SequenceCharacteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 613Kyoung-Soo Han, In-Kyoung Kim and Eul Gyu Im
Part VIII Web Technology and Software Engineering
61 Practical Firewall Policy Inspection Using AnomalyDetection and Its Visualization . . . . . . . . . . . . . . . . . . . . . . . . . . 629Ui-Hyong Kim, Jung-Min Kang, Jae-Sung Lee and Hyong-Shik Kim
Contents xiii
top related