http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
클라우드 컴퓨팅에서 데이터 분산 최적화를 위한 방법에 대한 연구
밤복흥 ( Pham Phuoc Hung ),이슬람 ( Motaharul Islam ),고메즈마우리시오 ( Mauricio A. G. Morales ),모하마드아잠 ( Mohammad Aazam ),허의남 ( Eui-nam Huh ) 한국정보처리학회 2013 한국정보처리학회 학술대회논문집 Vol.20 No.1
Modern day despite technology advancements that manufacture a new generation of mobile devices with generous resources, the fact that they can offer only limited processing capacity still remains a painful experience.So far, a number of research studies have been carried out, trying to eliminate problems arising from shortcomings in the connection between thin clients and cloud networks, yet little have been found efficient. In this paper, we present a novel approach, taking advantage of collaboration of thin and thick clients, particularly aiming at optimizing data distribution by splitting data and utilizing cloud computing (CC) resources so that expected Quality-of-Service (QoS) requirements can be met. Moreover, we conduct simulations to evaluate our approach. Our results evaluation shows that our approach has better performance than existing approaches.
밤복흥 ( Pham Phuoc Hung ),아지즈나스리디노프 ( Aziz Nasridinov ),변정용 ( Jeongyong Byun ) 한국정보처리학회 2011 한국정보처리학회 학술대회논문집 Vol.18 No.1
When SOAP message in Web Services has sensitive and important data, it is necessary to protect the message from XML rewriting attacks. These attacks create a foundation for typical faults in SOAP message and make it vulnerable to use in Web Service environment. Currently, Web Services middleware offers limited functions to detect these faults and possibly fix them. In this paper, we propose a Security Description Assistance which identifies and fixes typical faults in SOAP messages. Our system adapts simulation-based approach, which allows system to self-optimize its performance in different conditions and thus improve the reliability of Web Services.
밤복흥 ( Pham Phuoc Hung ),아지즈 ( Aziz Nasridinov ),변정용 ( Jeongyong Byun ) 한국정보처리학회 2010 한국정보처리학회 학술대회논문집 Vol.17 No.2
There are some cases when SOAP message, where WS-Security and WS-Policy elements are included, may consist of a sensitive and important data. In these cases, the message is highly recommended to be secured. The question exists of how to quickly identify that SOAP message satisfies security requirement and security level of a SOAP message. In this paper, we propose a technique called Bit-Stream which depends on the importance of SOAP elements to automatically identify the vulnerabilities and risks while offering advice for higher security.
밤복흥 ( Pham Phuoc Hung ),아지즈나스리디노프 ( Aziz Nasridinov ),림청 ( Lin Qing ),변정용 ( Jeongyong Byun ) 한국정보처리학회 2011 한국정보처리학회 학술대회논문집 Vol.18 No.2
Nowadays Web Services are one of the most rapidly developed technologies and have become platform for eecommerce as well as B2B model. Therefore, when Web Services use SOAP as a protocol for communication, their security should be considered. However, those SOAP messages are prone to XML attacks that can create a foundation for typical faults and make it vulnerable to use. Unfortunately, recent researches established that solutions to deal with these problems have several limitations. In this paper, we explore attacks on SOAP messages and also provide confidentiality and integrity solutions. It is a tolerant scheme which is able to automatically detect and fix typical faults occurred in SOAP messages to combat with the security threats in order to improve its reliability.
모하마드아잠 ( Mohammad Aazam ),밤복흥 ( Pham Phuoc Hung ),아이만압둘라알사파르 ( Aymen Abdullah Alsaffar ),알아민호새인 ( Al-amin Hossain ),이슬람 ( Md Motaharul ),허의남 ( Islam ),( Eui-nam Huh ) 한국정보처리학회 2013 한국정보처리학회 학술대회논문집 Vol.20 No.1
Cloud computing is an emerging technology, which allows the user to fulfill his needs by outsourcing the resources. With the passage of time, cloud computing has become an essential part of our lives. But it still requires some sort of standardization, specially in terms of user’s trust, privacy, and security related things. This study presents different types of cloud computing services and their working domains along with some key virtualization related issues that are encountered by the cloud service provider as well as the user. Those key issues, related with virtual network are discussed in this paper. This study provides a basis to work further on those issues, so that the key concerns are addressed as soon as possible and cloud computing could become standardized and more prevalent.
An Improved Reservation-based Protocol for Timely Web Service Transactions
림청(Lin Qing),아지즈 나스리디노프(Aziz Nasridinov),밤복흥(Pham Phuoc Hung),변정용(Jeong Yong Byun) 한국정보과학회 2011 정보과학회 컴퓨팅의 실제 논문지 Vol.17 No.8
웹서비스 트랜잭션은 다원분산 기업간 장기수행, 완결합 그리고 복합서비스들로 구성되어 있다. 기존 트랜잭션 규약은 보상을 통하나 바람직하잖은 비용으로 전체적으로 일관성을 유지한다. 따라서 기존 연구들은 자원 대기시간 및 보상 위기를 줄이기 위하여 자원을 보존하도록 제안했었다. 반면에 예약은 또한 실질적인 잠금과 수행성능을 개선하는 병행충돌들을 가져온다. 본 논문에서 개선된 시간제약으로 예약기반규약을 제안한다. 그리고 측면효과를 없애는 것을 돕는다. 또한 병행충돌 탐지가 성능을 높이기 위하여 개발된다. 더구나 시물레이션은 이 자원중심적 접근을 SOA로 통합한다. 결국 적시적 웹서비스 트랜잭션용 성능평가는 성공율, 실행기간, 보상비용 관점에서 커다란 개선을 보여준다. Web Service Transactions consist of long-running, loosely coupled and complex services across multiple distributed enterprises. Existing transaction protocols maintain overall consistency through compensation but with undesirable cost. Thus, researchers have proposed to reserve resources to reduce resource waiting time and compensation risk. Meanwhile, reservation also brings substantial locks and concurrent conflicts that impair performance. In this paper, we propose a reservation-based protocol but with an imposed time constraint, which helps eliminate those side effects. Also, concurrent conflicts detection is developed as well to enhance performance. Moreover, the simulation integrates this resource-centric approach into Service-Oriented Architecture (SOA). Finally, performance evaluation for timely Web Service Transaction shows a great improvement in aspects of success rate, execution duration and compensation cost.