http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Cryptosystem in Mobile Agent Security
Maricel O. Balitanas,Nayoun Kim,Eun-suk Cho,Seok-soo Kim 한국정보기술학회 2009 Proceedings of KIIT Conference Vol.2009 No.-
Despite of many practical benefits of mobile agent these technology results in a significant new security threats from malicious agents and hosts. One of the added complications is the change of state in ways that adversely impact the functionality of agent as it traverses in multiple hosts. With primary added complication, this paper investigates the threat and presents a solution using encryption and digital signing techniques for providing confidentiality, data integrity and authenticity. We use both encryption and digital signing techniques for providing confidentiality, data integrity and authenticity. The document itself is partially signed by multiple nodes without breaking the digital signatures.
A Study on Integrating IDS with Data Mining
Maricel Balitanas,김석수,김태훈,이승 보안공학연구지원센터 2008 보안공학연구논문지 Vol.5 No.2
This paper presents the application of data mining approaches for an intrusion detection system. Intrusion detection is the act of detecting actions that attempt to compromise the confidentiality, integrity or availability of the resource of a computer system. In this paper, an IDS model is presented as well as its limitation in determining security violations. Furthermore, this paper focuses on several data mining techniques that can aid in the process of intrusion detection.
Application of The Next-Generation Internet Protocol in System Control and Data Aquisition
Maricel O. Balitanas,Jeong-Ah Kim,Tai-hoon Kim 한국정보기술학회 2010 Proceedings of KIIT Conference Vol.2010 No.-
The transition to IPv6 will impact the entire group of Internet users at some time. IPv6 will impact these users at different times and in different ways since the Internet consists of millions of smaller domestic, academic, business, and government users. However IPv6 standards are immature and are some cases still in progress. Within infrastructure control system the advantage of moving to an IPv6 networking protocol is associated with addressing the potentially large increase in the number sensors collecting data from the infrastructure system. However, although there are advantages a pressing issue of security lie beneath. The immaturity of IPv6 presents a lot of security threats which are presented in this paper and post recommendations as countermeasures.
Peer To Peer Content Sharing On Smart Phones Technology
Maricel Balitanas,Rosslin John Robles 사단법인 인문사회과학기술융합학회 2012 예술인문사회융합멀티미디어논문지 Vol.2 No.2
Peer-to-Peer (P2P) communications and its applications have become conventional architecture in the wired network environment. However, they have not been effectively adapted to the ensemble mobile environment which composed of various devices such as smart mobiles devices, laptops, and device with embedded software. In P2P systems, each node can act as a client and as a server at the same time and shares with others its own data. Our contribution consists in designing, implementing and testing a BitTorrent like application adapted to wireless ad-hoc networks of Android Mobile Phones. The employment of P2P protocols and applications in the platform of the ensemble mobile environment is becoming a promising solution which permits a wide number of users to share their own contents (data, audio, video, etc.) and communicate with each other without using costly and centralized network infrastructure. By using a central server, the peers will be able to get the information about the contents of other peers. Even in the absence of the Internet, the mobile devices provide users with the potential opportunity to connect in ad-hoc manner via short range wireless protocol such as Wi-Fi.
Children's Auto-Antitoxin Planner for Handheld Device
Maricel O. Balitanas,Kyung Jung Kim 보안공학연구지원센터(JSE) 2011 보안공학연구논문지 Vol.8 No.1
The research depicts an architectural structure using mobile computing which will plot a chart of Antitoxin planner synchronous with the parent’s personal planner so as to set a schedule amenable to both the parties and a notification through will be generated. Diseases can be prevented by proper immunization procedures, however, with most parents working in this generation and not most clinics pay much attention on the individual planning and notifications of their patients, this research will show a solution to such crucial issue.. This will be a tool for parents and assistance to clinics and hospitals catering Antitoxins shots for children.
Countermeasures of Defenseless Ubiquitous Computing Environment towards Security Threats
Maricel O. Balitanas,Ha-yeon Kim,Tai-hoon Kim 한국정보기술학회 2010 Proceedings of KIIT Conference Vol.2010 No.-
Ubiquitous computing presents challenges across computer science: in systems design and engineering. In this paper, we analyze security threats of mobile computing devices with an application of ubiquitous computing and we suggest their countermeasures in technical, manageable, and physical aspects.
Anti-Collision Protocol to The Susceptible Radio Frequency Identification Networks
Maricel O. Balitanas,Rosslin John Robles,Seung-Hwan Jeon,Min-kyu Choi,Farkhod Alisherov,Ha-yeon Kim,Tai-hoon Kim 한국정보기술학회 2010 Proceedings of KIIT Conference Vol.2010 No.-
A. System Design of RFID-Sensor Integrated Networks Technological convergence is one of hot issues due to the limitation of technologies, functions and market To uniquely identify physical objects, Radio Frequency Identification (RFID) systems are used with its limitless possibilities and low cost. RFID is a method of remotely storing and retrieving data using devices called RFID tags. An RFID tag is a small object, such as an adhesive sticker, that can be attached to or incorporated into a product. But with this common scenario involving numerous tags and present in the interrogation zone of a single reader at the same time. RFID is prone to security threat as well, which is the main focus of this paper. In this paper we present an anti-collision protocol existing and applied in the RFID dilemma, sited vulnerabilities and suggested general security solutions.