Kyu Il Kim

Sungkyunkwan University, Sŏul, Seoul, South Korea

Are you Kyu Il Kim?

Claim your profile

Publications (13)0 Total impact

  • [Show abstract] [Hide abstract]
    ABSTRACT: Nowadays, remarkable development of information technologies makes information sharing and distributing possible in smooth water than ever. It enables to obtain information anytime and anywhere and provides technologies for superior services based on situation information. Also, it enables machines to grasp the meaning of information under semantic web technologies and new information paradigm. These technologies have been varied by information approach and acquisition method than ever before. However, illegal attacker behind development that uses better tools gives rise to side effects. Current systems can be intruded by a number of different ways of them. Therefore, system safety and privacy protection is being threatened by the invaders. There is access control technology for database system among the security technologies against this menace. Recently, security technique is carrying out researches of situation intelligence, privacy, and XML access etc. in order to correspond with new computing environments. In this paper, we propose extended Role Based Access Control (RBAC) in semantic web. Extended model can dynamically authorizes user's permission under context component. Also, we propose concept-enforcement model based on semantic web. OWL defines the terms used to describe and represent an area of knowledge. Proposed model enable to access semantic execution by suggested model even though it doesn't correspond with security policy.
    Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2010, Suwon, Republic of Korea, January 14-15, 2010; 01/2010
  • [Show abstract] [Hide abstract]
    ABSTRACT: Advance technologies in decentralized systems are the new building block of today's Internet and provide interoperability among heterogeneous databases. In these environments, interoperation and information sharing are one of the most critical issues. Interoperability enables users to access database in different domain. Furthermore, government, financial and medical institutions more require secure collaboration to share their data with organizations. However secure collaboration has many challenging problem in multi-domain environments. In this paper, we propose secure collaboration to effectively share resource by reconcilement structure. Proposed scheme is based on Role Based Access Control (RBAC) to support flexible control. In decentralized RBAC-based system, the number of roles can be in the hundreds or thousands and they share information among dispersed domains. We present solution which regulates the interoperability.
    Web Society, 2009. SWS '09. 1st IEEE Symposium on; 09/2009
  • [Show abstract] [Hide abstract]
    ABSTRACT: Pervasive environment is a post-desktop model of human-computer interaction in which information processing has been thoroughly integrated into everyday object and activities. In there environment access control is a critical issue, with many aspects relating to the establishment, authorization and enforcement of policies that protect the resources from adversaries. Recently, many researches have been worked methods that have access to resources in ubiquitous applications. However they are inadequate to meet the requirement for privacy safeguard and dynamic changes. In this paper we propose how to protect sensitive data and present extended Role Based Access Control (RBAC) that respond to all the requirements for privacy control. We also show how proposed model preserves safety properties in spite of dynamic changes to access control permission.
    Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC 2009, Suwon, Korea, January 15-16, 2009; 01/2009
  • [Show abstract] [Hide abstract]
    ABSTRACT: Increasing Internet users has created enormous important information of users in Internet. Opinion mining is technology that extracts meaningful opinions from that huge information. Becoming a hot research area, opinion mining has been studied in many different ways. These studies are mostly based on reviews, blogs. However, this paper focuses on messenger which generates many messages containing opinions of users. As messages may contain many opinions unrelated to our purpose, our aim is to extract only related opinions and features. Our approach initially collects messages from messengers and employs localized linguistic technique to extract candidate messages, opinions and features. Thereafter, we extract features from candidate features using association rule mining. Finally we summarize extracted opinions and features.
    Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human 2009, Seoul, Korea, 24-26 November 2009; 01/2009
  • [Show abstract] [Hide abstract]
    ABSTRACT: In pervasive environments, the connected devices can be aware the status of users and provide the information to users automatically in anytime, anywhere. However these require more security technologies to protect private information. The users must temporarily delegate some or all of their rights to agents in order to perform actions on their behalf. This results in the exposure of user privacy information by agents. We propose a delegation model for providing safety and user privacy in pervasive computing environments. In order to provide safety and user privacy, XML-based encryption and a digital signature mechanism needs to be efficiently integrated. In this paper, we propose access control mechanism based on eXtensible Access Control Markup Language (XACML) in order to manage the services and policies. We also extend SAML, in order to declare delegation assertions transferred to service providers by delegation among agents.
    Agent and Multi-Agent Systems: Technologies and Applications, Third KES International Symposium, KES-AMSTA 2009, Uppsala, Sweden, June 3-5, 2009. Proceedings; 01/2009
  • [Show abstract] [Hide abstract]
    ABSTRACT: When most people buy the products, they inquire about other people's opinion and refer to recommended product. Today, the result of explosive development of the Web makes it easy to consult other people's opinion information. These variety of opinion data are not only useful to customers, but also manufacturers. As a result, opinion mining research to analyze opinion data on the web has become a popular topic recently. In this paper, we proposed opinion mining method for product reviews. In our approach, we first do POS tagging on each review sentence, and we extract feature and opinion words in form of transaction data. Then we discover association rules of needed type from the transaction data, and provide information that is summarized advantages and disadvantages using PMI-IR algorithm.
    Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human 2009, Seoul, Korea, 24-26 November 2009; 01/2009
  • [Show abstract] [Hide abstract]
    ABSTRACT: As XML is de facto becoming a standard for information representation and exchange in IT world, XML release methods are receiving intense attentions. The crucial requirement of XML release is scalability that affords to manage efficiently large number of users and great amounts of data. Although many existing approaches (e.g. famous SDI approach) have challenged to support XML release, because they have adopted the pre-configured key share approaches, they are not suitable for the dynamic environments characterized by the variant population, such as Peer-to-Peer, Ubiquitous and Ad-hoc networks. In this paper, we suggest a novel method that provides a more effective, reusable key share for dynamic environments by means of authorization, derive key and secret sharing scheme.
    Convergence and Hybrid Information Technology, 2008. ICHIT '08. International Conference on; 09/2008
  • [Show abstract] [Hide abstract]
    ABSTRACT: Pervasive environments consist of the heterogeneous network system. And these mean environment that can be the various web service to sharing of mutual information. However, this requires not only advance security but also districted access control. Because the indiscreet resource access bring on the problem by the mobile devices and wireless network without the time and space, pervasive access control is very important. Access control must be defines the technologies for the new service and the optimized access policy for these environments. Cooperation administration is serious point too. This requires dynamic control how to use the sharing resources. Therefore we propose collaborative access control based XACML in pervasive environments. Proposed mechanism applies to XACML of OASIS standard in pervasive environments. XACML is designed to express authorization policies in XML against objects that are themselves identified in XML. But XACML combination algorithms can not support requirement condition of collaboration. In this paper, we propose extended XACML of collaborative access control based on RBAC hierarchy.
    Convergence and Hybrid Information Technology, 2008. ICHIT '08. International Conference on; 09/2008
  • Kyu Il Kim, Hae Kyung Lee, Ung Mo Kim
    [Show abstract] [Hide abstract]
    ABSTRACT: Ubiquitous environment is a post-desktop model of human-computer interaction in which information processing has been thoroughly integrated into everyday objects and activities. But hacker attack one of fragile point and can misuse legitimate user privilege because all of the connected devices provide services for the user control and monitoring in real time. Also, the users of web services must temporarily delegate some or all of their rights to agents in order to perform actions on their behalf. This fact risks the exposure of user privacy information. In this paper, we propose secure delegation model based on SAML that provides confidentiality and integrity about the user information in ubiquitous environment. The proposed mechanism defines extended agent delegation by Security Assertion Markup Language (SAML) and proposes not only authentication but also privilege grant by access control server based on extensible Access Control Markup Language (XACML).
    Information Security and Assurance, 2008. ISA 2008. International Conference on; 05/2008
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Web services are the new building block of today's Internet, and provides interoperability among heterogeneous distributed systems. Recently in web services environment, security has become one of the most critical issues. The hackers attack one of fragile point and can misuse legitimate user privilege because all of the connected devices provide services for the user control and monitoring in real time. Also, the users of web services must temporarily delegate some or all of their rights to agents in order to perform actions on their behalf. This fact risks the exposure of user privacy information. In this paper, we propose secure delegation model based on SAML that provides confidentiality and integrity about the user information in distributed systems. In order to support privacy protection, service confidentiality, and assertion integrity, encryption and a digital signature mechanism is deployed. We build web service management server based on XACML, in order to manage services and policies of web service providers.
    JIPS. 01/2007; 3:82-88.
  • [Show abstract] [Hide abstract]
    ABSTRACT: Ubiquitous environment that is omnipresent is existent everywhere or seems to be always present. Such an environment is a next generation paradigm in which many invisible computers are integrated into background of our lives. However, it requires more secure technologies to protect privacy because user may access information without time and space restriction. In this paper, we propose the mechanism that a user is able to automatically access to resource by means of context aware on ubiquitous computing environments. For this purpose, we exploit Role-Based Access Control (RBAC) and Mandatory Access Control (MAC) policies, and defines extended context rules. We also provide an advanced security authorization mechanism and show how to securely preserve properties despite of dynamic change of access control privilege.
    Advances in Databases: Concepts, Systems and Applications, 12th International Conference on Database Systems for Advanced Applications, DASFAA 2007, Bangkok, Thailand, April 9-12, 2007, Proceedings; 01/2007
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Web services are the new building block of today's Internet, and provides interoperability among heterogeneous distributed systems. Recently in Web services environment, security has become one of the most critical issues. An attacker may expose user privacy and service information without authentication. Furthermore, in the ubiquitous computing environment, the users of Web services must temporarily delegate some or all of their rights to agents in order to perform actions on their behalf. This results in the exposure of user privacy information by agents. We propose a delegation model for providing safety of Web service and user privacy in ubiquitous computing environments. In order to provide safety of Web service and user privacy, XML-based encryption and a digital signature mechanism needs to be efficiently integrated. In this paper, we propose Web service management server based on XACML, in order to manage services and policies of Web service providers. For this purpose, we extend SAML, in order to declare delegation assertions transferred to Web service providers by delegation among agents
    Hybrid Information Technology, 2006. ICHIT '06. International Conference on; 12/2006
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Summary Web Services are the new building block of today's Internet, and provides interoperability among heterogeneous distributed systems. In this environment, security is one of the most critical issues. An attacker may expose user privacy and service information without authentication. Furthermore, in the pervasive computing environment, the users of web services must temporarily delegate some or all of their rights to an agent to perform actions on their behalf. This results in the exposure of user's privacy information by agents. We present a delegation model to support secure web services in pervasive computing environments. In order to support privacy protection, service confidentiality, and assertion integrity, encryption and a digital signature mechanism is deployed. We build web service management server based on XACML, in order to manage services and policies of web service providers. SAML is extended, in order to declare delegation assertions transferred to web service providers, by delegation among agents.