Jung-Sun Kim

Chonnam National University, Yeoju, Gyeonggi, South Korea

Are you Jung-Sun Kim?

Claim your profile

Publications (5)0 Total impact

  • [Show abstract] [Hide abstract]
    ABSTRACT: Flexible access control model has been studied and implemented on operating system for a long time. SELinux of NSA have fine-grained policy. But, the strict policy make user feel inconvenience. Though SELinux can present MAC or RBAC as well as DAC, it doesnpsilat show all of the notions. We propose the flexible access control model that it can present diverse access control policies and the policies can transform each other. As our model is based on E-R model, it is easy to understand and to use by simple syntax. We implement and test this model on Linux. And we show that the performance degree isnpsilat decreased highly.
    Security Technology, 2008. SECTECH '08. International Conference on; 01/2009
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: In this paper, we propose a new security architecture for adapting multiple access control models to operating systems. As adding a virtual access control system to a proposed security architecture, various access control models such as MAC, DAC, and RBAC are applied to secure operating systems easily. Also, the proposed was designed to overcome the deficiencies of access control in standard operating systems, makes secure OS more available by combining access control models, and apply them to secure OS in runtime.
    05/2006: pages 922-931;
  • Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part V; 01/2006
  • Jung-Sun Kim, Dong-Geun Kim, Bong-Nam Noh
    [Show abstract] [Hide abstract]
    ABSTRACT: The field of digital forensic science emerged as a response to the growth of computer crimes. Digital forensics is the art of discovering and retrieving information about a crime in such a way to make a digital evidence admissible in court. Network forensics is digital forensic in networked environments. However, the amount of network traffic is huge and might crash the traffic capture system if left unattended. Not all the information captured or recorded can be useful for analysis or evidence. The more the network traffic, the harder the network analyzing. Therefore, we need an effective and automated analyzing system for network forensics. We propose a fuzzy logic based expert system for network forensics that can analyze computer crimes in networked environments and make digital evidences automatically. This system can provide an analyzed information for forensic experts and reduce the time and cost of forensic analysis.
    Fuzzy Systems, 2004. Proceedings. 2004 IEEE International Conference on; 08/2004
  • Jung-Sun Kim, Minsoo Kim, BongNam Noh
    [Show abstract] [Hide abstract]
    ABSTRACT: The field of digital forensic science emerged as a response to the growth of a computer crime. Digital forensics is the art of discovering and retrieving information about a crime in such a way to make digital evidence admissible in court. Especially, network forensics is digital forensic science in networked environments. The more network traffic, the harder network analyzing. Therefore, we need an effective and automated analyzing system for network forensics. In this paper, we develop a fuzzy logic based expert system for network forensics that can analyze computer crimes in networked environments and make digital evidences automatically. This system can provide an analyzed information for forensic experts and reduce the time and cost of forensic analysis. Keywordsdigital forensics-network forensics-fuzzy expert systems
    Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I; 01/2004