This page has only limited features, please log in for full access.

Prof. Changjoo Moon
Department of Smart Vehicle Engineering, Konkuk University, Seoul 143-701, Korea

Basic Info


Research Keywords & Expertise

0 Big Data
0 Internet of Things
0 intelligent transportation system
0 Urban Air Mobility
0 Unmanned Aerial Vehicle

Fingerprints

Big Data
Internet of Things

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

The user biography is not available.
Following
Followers
Co Authors
The list of users this user is following is empty.
Following: 0 users

Feed

Journal article
Published: 07 December 2020 in Electronics
Reads 0
Downloads 0

Self-driving cars, autonomous vehicles (AVs), and connected cars combine the Internet of Things (IoT) and automobile technologies, thus contributing to the development of society. However, processing the big data generated by AVs is a challenge due to overloading issues. Additionally, near real-time/real-time IoT services play a significant role in vehicle safety. Therefore, the architecture of an IoT system that collects and processes data, and provides services for vehicle driving, is an important consideration. In this study, we propose a fog computing server model that generates a high-definition (HD) map using light detection and ranging (LiDAR) data generated from an AV. The driving vehicle edge node transmits the LiDAR point cloud information to the fog server through a wireless network. The fog server generates an HD map by applying the Normal Distribution Transform-Simultaneous Localization and Mapping(NDT-SLAM) algorithm to the point clouds transmitted from the multiple edge nodes. Subsequently, the coordinate information of the HD map generated in the sensor frame is converted to the coordinate information of the global frame and transmitted to the cloud server. Then, the cloud server creates an HD map by integrating the collected point clouds using coordinate information.

ACS Style

Junwon Lee; Kieun Lee; Aelee Yoo; Changjoo Moon. Design and Implementation of Edge-Fog-Cloud System through HD Map Generation from LiDAR Data of Autonomous Vehicles. Electronics 2020, 9, 2084 .

AMA Style

Junwon Lee, Kieun Lee, Aelee Yoo, Changjoo Moon. Design and Implementation of Edge-Fog-Cloud System through HD Map Generation from LiDAR Data of Autonomous Vehicles. Electronics. 2020; 9 (12):2084.

Chicago/Turabian Style

Junwon Lee; Kieun Lee; Aelee Yoo; Changjoo Moon. 2020. "Design and Implementation of Edge-Fog-Cloud System through HD Map Generation from LiDAR Data of Autonomous Vehicles." Electronics 9, no. 12: 2084.

Journal article
Published: 05 November 2020 in Applied Sciences
Reads 0
Downloads 0

To provide a service that guarantees driver comfort and safety, a platform utilizing connected car big data is required. This study first aims to design and develop such a platform to improve the function of providing vehicle and road condition information of the previously defined central Local Dynamic Map (LDM). Our platform extends the range of connected car big data collection from OBU (On Board Unit) and CAN to camera, LiDAR, and GPS sensors. By using data of vehicles being driven, the range of roads available for analysis can be expanded, and the road condition determination method can be diversified. Herein, the system was designed and implemented based on the Hadoop ecosystem, i.e., Hadoop, Spark, and Kafka, to collect and store connected car big data. We propose a direction of the cooperative intelligent transport system (C-ITS) development by showing a plan to utilize the platform in the C-ITS environment.

ACS Style

Aelee Yoo; Sooyeon Shin; Junwon Lee; Changjoo Moon. Implementation of a Sensor Big Data Processing System for Autonomous Vehicles in the C-ITS Environment. Applied Sciences 2020, 10, 7858 .

AMA Style

Aelee Yoo, Sooyeon Shin, Junwon Lee, Changjoo Moon. Implementation of a Sensor Big Data Processing System for Autonomous Vehicles in the C-ITS Environment. Applied Sciences. 2020; 10 (21):7858.

Chicago/Turabian Style

Aelee Yoo; Sooyeon Shin; Junwon Lee; Changjoo Moon. 2020. "Implementation of a Sensor Big Data Processing System for Autonomous Vehicles in the C-ITS Environment." Applied Sciences 10, no. 21: 7858.

Journal article
Published: 30 November 2016 in Journal of Institute of Control, Robotics and Systems
Reads 0
Downloads 0
ACS Style

Chang-Joo Moon; Mi-Young Choi; Jungkeun Park. Data Aggregation Method using Shuffled Row Major Indexing on Wireless Mesh Sensor Network. Journal of Institute of Control, Robotics and Systems 2016, 22, 984 -990.

AMA Style

Chang-Joo Moon, Mi-Young Choi, Jungkeun Park. Data Aggregation Method using Shuffled Row Major Indexing on Wireless Mesh Sensor Network. Journal of Institute of Control, Robotics and Systems. 2016; 22 (11):984-990.

Chicago/Turabian Style

Chang-Joo Moon; Mi-Young Choi; Jungkeun Park. 2016. "Data Aggregation Method using Shuffled Row Major Indexing on Wireless Mesh Sensor Network." Journal of Institute of Control, Robotics and Systems 22, no. 11: 984-990.

Journal article
Published: 01 February 2015 in Applied Mathematics & Information Sciences
Reads 0
Downloads 0
ACS Style

Jungkeun Park; Trung Kien Nguyen; Do Dang Thach; Ok-Chul Jung; Chang-Joo Moon. Data Scalability Design for Multi-Satellite Management based on E-R Model. Applied Mathematics & Information Sciences 2015, 9, 165 -170.

AMA Style

Jungkeun Park, Trung Kien Nguyen, Do Dang Thach, Ok-Chul Jung, Chang-Joo Moon. Data Scalability Design for Multi-Satellite Management based on E-R Model. Applied Mathematics & Information Sciences. 2015; 9 (1):165-170.

Chicago/Turabian Style

Jungkeun Park; Trung Kien Nguyen; Do Dang Thach; Ok-Chul Jung; Chang-Joo Moon. 2015. "Data Scalability Design for Multi-Satellite Management based on E-R Model." Applied Mathematics & Information Sciences 9, no. 1: 165-170.

Journal article
Published: 01 January 2013 in IEICE Transactions on Information and Systems
Reads 0
Downloads 0

The Semantic Web uses RDF/RDFS, which can enable a machine to understand web data without human interference. But most web data is not available in RDF/RDFS documents because most web data is still stored in databases. It is much more favorable to use stored data in a database to build the Semantic Web. This paper proposes an enhanced relational RDF/RDFS interoperable data model (ER2iDM) and a transformation procedure from relational data model (RDM) to RDF/RDFS based on ER2iDM. The ER2iDM is a data model that plays the role of an inter-mediator between RDM and RDF/RDFS during a transformation procedure. The data and schema information in the database are migrated to the ER2iDM according to the proposed translation procedures without incurring loss of meaning of the entities, relationships, and data. The RDF/RDFS generation tool makes a RDF/RDFS XML document automatically from the ER2iDM. The proposed ER2iDM and transformation procedure provides detailed guidelines for transformation from RDM to RDF/RDFS unlike existing studies; therefore, we can more efficiently build up the Semantic Web using database stored data.

ACS Style

Mi-Young Choi; Chang-Joo Moon; Doo-Kwon Baik. Transformation of a Relational Database to RDF/RDFS with ER2iDM. IEICE Transactions on Information and Systems 2013, E96.D, 1478 -1488.

AMA Style

Mi-Young Choi, Chang-Joo Moon, Doo-Kwon Baik. Transformation of a Relational Database to RDF/RDFS with ER2iDM. IEICE Transactions on Information and Systems. 2013; E96.D (7):1478-1488.

Chicago/Turabian Style

Mi-Young Choi; Chang-Joo Moon; Doo-Kwon Baik. 2013. "Transformation of a Relational Database to RDF/RDFS with ER2iDM." IEICE Transactions on Information and Systems E96.D, no. 7: 1478-1488.

Journal article
Published: 30 April 2012 in Advanced Science Letters
Reads 0
Downloads 0
ACS Style

Chang-Joo Moon; Toan Dang; Daewon Jung; Jungkeun Park. Software Component Reusability Design for Open Satellite Ground Control System. Advanced Science Letters 2012, 9, 817 -821.

AMA Style

Chang-Joo Moon, Toan Dang, Daewon Jung, Jungkeun Park. Software Component Reusability Design for Open Satellite Ground Control System. Advanced Science Letters. 2012; 9 (1):817-821.

Chicago/Turabian Style

Chang-Joo Moon; Toan Dang; Daewon Jung; Jungkeun Park. 2012. "Software Component Reusability Design for Open Satellite Ground Control System." Advanced Science Letters 9, no. 1: 817-821.

Journal article
Published: 31 March 2012 in Journal of Digital Contents Society
Reads 0
Downloads 0
ACS Style

Eun-Ae Cho; Chang-Joo Moon; Dae-Ha Park. A Categorization Method based on RCBAC for Enhanced Contents and Social Networking Service for User. Journal of Digital Contents Society 2012, 13, 101 -110.

AMA Style

Eun-Ae Cho, Chang-Joo Moon, Dae-Ha Park. A Categorization Method based on RCBAC for Enhanced Contents and Social Networking Service for User. Journal of Digital Contents Society. 2012; 13 (1):101-110.

Chicago/Turabian Style

Eun-Ae Cho; Chang-Joo Moon; Dae-Ha Park. 2012. "A Categorization Method based on RCBAC for Enhanced Contents and Social Networking Service for User." Journal of Digital Contents Society 13, no. 1: 101-110.

Book chapter
Published: 01 January 2012 in Lecture Notes in Electrical Engineering
Reads 0
Downloads 0

Calculation in the sensor node requires very little electric power in a wireless sensor network, but communication among nodes requires much electric power. The data aggregation procedure collects the source data from sensor nodes and transfers the data to a sink node, so this procedure is the representative work in a sensor network. A major research topic in the sensor network field is to find the node which can minimize communication frequency among sensor nodes because all sensors in a wireless sensor network depend on battery electric power. This paper proposes algorithms by which sensing data are transferred to the sink node by way of a minimal number hops using a hash function in a mesh wireless sensor network. The proposed algorithms are worked in an N x N mesh wireless sensor network to concurrently perform global data aggregation and local data aggregation. Concurrent data aggregation is possible because an N x N mesh network has a unique address using the shuffled row major indexing method. Also, the proposed algorithms reduce the electric power requirement compared to existing methods by using the hash function which consumes little resource.

ACS Style

Mi-Young Choi; Chang-Joo Moon; Doo-Kwon Baik. The Shortest Path Data Aggregation Using Hash Function on Mesh Wireless Sensor Network. Lecture Notes in Electrical Engineering 2012, 409 -416.

AMA Style

Mi-Young Choi, Chang-Joo Moon, Doo-Kwon Baik. The Shortest Path Data Aggregation Using Hash Function on Mesh Wireless Sensor Network. Lecture Notes in Electrical Engineering. 2012; ():409-416.

Chicago/Turabian Style

Mi-Young Choi; Chang-Joo Moon; Doo-Kwon Baik. 2012. "The Shortest Path Data Aggregation Using Hash Function on Mesh Wireless Sensor Network." Lecture Notes in Electrical Engineering , no. : 409-416.

Journal article
Published: 18 October 2011 in Aircraft Engineering and Aerospace Technology
Reads 0
Downloads 0

Performance enhancement of real-time computing for small unmanned helicopter autopilot

ACS Style

Nodir Kodirov; Doo-Hyun Kim; Junyeong Kim; Seunghwa Song; Changjoo Moon. Performance enhancement of real‐time computing for small unmanned helicopter autopilot. Aircraft Engineering and Aerospace Technology 2011, 83, 344 -352.

AMA Style

Nodir Kodirov, Doo-Hyun Kim, Junyeong Kim, Seunghwa Song, Changjoo Moon. Performance enhancement of real‐time computing for small unmanned helicopter autopilot. Aircraft Engineering and Aerospace Technology. 2011; 83 (6):344-352.

Chicago/Turabian Style

Nodir Kodirov; Doo-Hyun Kim; Junyeong Kim; Seunghwa Song; Changjoo Moon. 2011. "Performance enhancement of real‐time computing for small unmanned helicopter autopilot." Aircraft Engineering and Aerospace Technology 83, no. 6: 344-352.

Conference paper
Published: 01 December 2010 in 2010 IEEE International Conference on Service-Oriented Computing and Applications (SOCA)
Reads 0
Downloads 0

The growing demand for a Semantic Web is focusing attention on Semantic Web trials that use a huge amount of data from a relational database (RDB). Hence, the literature on the transformation of RDB data to resource description framework (RDF) statements has consequently become very important. The relational data model (RDM), the base of RDB, represents real world data using relationships [1]. In existing research, the mapping of RDB data to RDF only generates an RDF triple statement from an RDB table structure in a flat level; existing research does not consider the mapping of RDM which describes the business rules. In RDM, the relationship describes real world business rules by connecting the two entities. If one entity relates to itself, then it has a recursive relationship which helps to explain the logical data model and extend its flexibility. The recursive relationship is a necessary relation type of most data models to describe more complex business rules. This paper suggests a mapping method to map the two types of recursive relationships to the resource description framework schema (RDFS). One type of recursive relationship is generated during the integration process with different entities at different levels in a hierarchical structure while the other is generated at the hierarchical structure between the instances of an attribute in an entity. The transformed RDFS, including the class, subclasses, and subproperties minimizes the loss of data meaning and enables the process of the inference function to be used with RDB data. The method of transforming RDB data to inferable, transitive RDF/RDFS with SQL implies that the most difficult step of writing a Semantic Web can be automated. In short, the proposed method enables a Semantic Web to be built with greater efficiency.

ACS Style

Mi-Young Choi; Chang-Joo Moon; Doo-Kwon Baik; Young-Jun Wie; Joong-Hee Park. The RDFS mapping for recursive relationship of relational data model. 2010 IEEE International Conference on Service-Oriented Computing and Applications (SOCA) 2010, 1 -6.

AMA Style

Mi-Young Choi, Chang-Joo Moon, Doo-Kwon Baik, Young-Jun Wie, Joong-Hee Park. The RDFS mapping for recursive relationship of relational data model. 2010 IEEE International Conference on Service-Oriented Computing and Applications (SOCA). 2010; ():1-6.

Chicago/Turabian Style

Mi-Young Choi; Chang-Joo Moon; Doo-Kwon Baik; Young-Jun Wie; Joong-Hee Park. 2010. "The RDFS mapping for recursive relationship of relational data model." 2010 IEEE International Conference on Service-Oriented Computing and Applications (SOCA) , no. : 1-6.

Journal article
Published: 15 July 2010 in IEEE Transactions on Consumer Electronics
Reads 0
Downloads 0

This paper proposes an SAMD (Synchronization Algorithms based on Message Digest) algorithm based on message digest in order to facilitate data synchronization between a server-side database and a mobile database. The SAMD algorithm makes the images at the server-side database and the mobile database uses message digest tables to compare two images in order to select the rows needed for synchronization. If the two images are different, the synchronization progresses according to synchronization policy. The SAMD algorithm does not use techniques that are dependent on specific database venders; neither does it use triggers, stored procedures or timestamps. The SAMD uses only the standard SQL functions for the synchronization. Therefore the SAMD algorithm can be used in any combinations of server-side database and mobile database because of its independence of database vender. This feature is important in order to build efficient mobile business systems because the upcoming mobile business environment has heterogeneous characteristics in which diverse mobile devices, mobile databases, and RDBMS exist.

ACS Style

Mi-Young Choi; Eun-Ae Cho; Dae-Ha Park; Chang-Joo Moon; Doo-Kwon Baik. A database synchronization algorithm for mobile devices. IEEE Transactions on Consumer Electronics 2010, 56, 392 -398.

AMA Style

Mi-Young Choi, Eun-Ae Cho, Dae-Ha Park, Chang-Joo Moon, Doo-Kwon Baik. A database synchronization algorithm for mobile devices. IEEE Transactions on Consumer Electronics. 2010; 56 (2):392-398.

Chicago/Turabian Style

Mi-Young Choi; Eun-Ae Cho; Dae-Ha Park; Chang-Joo Moon; Doo-Kwon Baik. 2010. "A database synchronization algorithm for mobile devices." IEEE Transactions on Consumer Electronics 56, no. 2: 392-398.

Conference paper
Published: 01 January 2009 in 2009 Fifth International Joint Conference on INC, IMS and IDC
Reads 0
Downloads 0

A large scale organization's data architecture should be able to offer a method to share and reuse existing data. It should also suppress data duplication for efficient data management and high data quality. For this purpose efficient data search and systematic building of existing data should be supported. Were it not for these points, the data isolated from system development would call for data duplication and deteriorate the quality of data. Therefore data taxonomy methodology and data taxonomic procedures are necessary to build a data structuralization and efficient data search. Data taxonomy provides some methods to enable needed data elements to be searched fast and also it offers some advantages for adaptable techniques to the same data elements in one classification system such as analysis, statistical forecasting, and maintenance. This article suggests a data taxonomy for fast data search for data sharing and reuse. Since data are engaged in different systems they can be candidates for data consolidation or integration through data taxonomy, too. In order to meet this purpose, data taxonomy should be independent from other classifications but for data itself. This article's data taxonomy is built upon the intrinsic nature of data based on data creation. Also this article shows a deployment method for data elements used in various areas according to a suggested taxonomy with a data taxonomic procedure. With a case study, this article shows that a suggested data taxonomy and taxonomic procedure can be applied to real world data.

ACS Style

Mi-Young Choi; Jong-Youn Bae; Chang-Joo Moon; Doo-Kwon Baik. A Methodology for Developing Data Taxonomy for Data Architecture. 2009 Fifth International Joint Conference on INC, IMS and IDC 2009, 833 -838.

AMA Style

Mi-Young Choi, Jong-Youn Bae, Chang-Joo Moon, Doo-Kwon Baik. A Methodology for Developing Data Taxonomy for Data Architecture. 2009 Fifth International Joint Conference on INC, IMS and IDC. 2009; ():833-838.

Chicago/Turabian Style

Mi-Young Choi; Jong-Youn Bae; Chang-Joo Moon; Doo-Kwon Baik. 2009. "A Methodology for Developing Data Taxonomy for Data Architecture." 2009 Fifth International Joint Conference on INC, IMS and IDC , no. : 833-838.

Conference paper
Published: 01 January 2009 in Proceedings of the 3rd International Conference on Intelligent Information Processing
Reads 0
Downloads 0

A ubiquitous computing environment provides comfortable conditions for anyone to access diverse networks without being concerned about time, place, or device. The Location-Based Service (LBS), for example, provides various convenient services using an individual's location information. However, on the flip side of this convenience, if a user's location information is exposed, it can lead to serious privacy problems. This paper proposes an anonymous communication model that uses an echo agent for LBS to guarantee privacy. Located between the user and the service provider, the echo agent sends both the real user's route and dummy routes to prevent user location information from being grasped and traced by service providers. It maintains an effective data schema to collect, store, and use the users' past routes and dummy routes through the heuristic algorithm. Finally, it develops and applies the policies to manage them. Unlike existing methods, this model provides powerful anonymity because it generates dummy routes which are similar to the real routes of users. In addition, in terms of the simulation result for dummy generation, the proposed model reduces the probability of the wrong node generation to a tenth of the existing model's one. Thus, privacy of user location information can be protected via this method.

ACS Style

Eun-Ae Cho; Chang-Joo Moon; Hyun-Soo Im; Doo-Kwon Baik. An anonymous communication model for privacy-enhanced location based service using an echo agent. Proceedings of the 3rd International Conference on Intelligent Information Processing 2009, 290 -297.

AMA Style

Eun-Ae Cho, Chang-Joo Moon, Hyun-Soo Im, Doo-Kwon Baik. An anonymous communication model for privacy-enhanced location based service using an echo agent. Proceedings of the 3rd International Conference on Intelligent Information Processing. 2009; ():290-297.

Chicago/Turabian Style

Eun-Ae Cho; Chang-Joo Moon; Hyun-Soo Im; Doo-Kwon Baik. 2009. "An anonymous communication model for privacy-enhanced location based service using an echo agent." Proceedings of the 3rd International Conference on Intelligent Information Processing , no. : 290-297.

Conference paper
Published: 01 January 2009 in 2009 Fifth International Joint Conference on INC, IMS and IDC
Reads 0
Downloads 0

The existing synchronization solutions of mobile database are not independent from the database server because they use database dependent information such as metadata or use specific functions of database server such as trigger and time stamp. These constraints are critical weak point in ubiquitous environment because various applications are running in various devices and servers in ubiquitous environment. Therefore, there is must need synchronization algorithms of mobile database which is independent of the vender of synchronization solution and mobile database in ubiquitous environment. This paper suggests SAMD (Synchronization Algorithms based on Message Digest) in order to resolve the problems mentioned above. SAMD resolves synchronization problems using only standard SQL queries as certified by the ISO (International Organization for Standardization). This is followed by a possible synchronization of any data combination regardless of the kind of database of server side or mobile database. In conclusion, the SAMD is effective solution for mobile database synchronization in ubiquitous environment.

ACS Style

Mi-Young Choi; Eun-Ae Cho; Dae-Ha Park; Jong-Youn Bae; Chang-Joo Moon; Doo-Kwon Baik. A Synchronization Algorithm of Mobile Database for Ubiquitous Computing. 2009 Fifth International Joint Conference on INC, IMS and IDC 2009, 416 -419.

AMA Style

Mi-Young Choi, Eun-Ae Cho, Dae-Ha Park, Jong-Youn Bae, Chang-Joo Moon, Doo-Kwon Baik. A Synchronization Algorithm of Mobile Database for Ubiquitous Computing. 2009 Fifth International Joint Conference on INC, IMS and IDC. 2009; ():416-419.

Chicago/Turabian Style

Mi-Young Choi; Eun-Ae Cho; Dae-Ha Park; Jong-Youn Bae; Chang-Joo Moon; Doo-Kwon Baik. 2009. "A Synchronization Algorithm of Mobile Database for Ubiquitous Computing." 2009 Fifth International Joint Conference on INC, IMS and IDC , no. : 416-419.

Conference paper
Published: 01 November 2008 in 2008 Third International Conference on Convergence and Hybrid Information Technology
Reads 0
Downloads 0

The recent Web technology has been developed by three mainsprings which include integration, virtualization, and socialization. The Web technology provides the increment of the social networking ability. However it deepens the exposure of privacy about personal information as more complicating and difficult problems. Representatively, it is impossible to define and manage the specific relation, so the personal information and interest can be inferred from collecting and summarizing the contents. Also, there are some problems that it is hard to construct the information owner's own social network. Thus this paper proposes the new access control model which enhances the user privacy of the existing access control methods in web 2.0. This method prevents privacy such as personal inclination from being exposed and enables to define and manage the specific relation. By doing this the information owners can construct their social network. This social network can be applied and extended to Web contents.

ACS Style

Eun-Ae Cho; Chang-Joo Moon; Dae-Ha Park; Doo-Kwon Baik. An Approach to Privacy Enhancement for Access Control Model in Web 3.0. 2008 Third International Conference on Convergence and Hybrid Information Technology 2008, 2, 1046 -1051.

AMA Style

Eun-Ae Cho, Chang-Joo Moon, Dae-Ha Park, Doo-Kwon Baik. An Approach to Privacy Enhancement for Access Control Model in Web 3.0. 2008 Third International Conference on Convergence and Hybrid Information Technology. 2008; 2 ():1046-1051.

Chicago/Turabian Style

Eun-Ae Cho; Chang-Joo Moon; Dae-Ha Park; Doo-Kwon Baik. 2008. "An Approach to Privacy Enhancement for Access Control Model in Web 3.0." 2008 Third International Conference on Convergence and Hybrid Information Technology 2, no. : 1046-1051.

Journal article
Published: 15 July 2008 in IEEE Transactions on Consumer Electronics
Reads 0
Downloads 0

In home network environments, user comfort and privacy are key prerequisites for customer satisfaction and data security. Although methods such as ACLs and others control the user-access for home network devices, most existing methods have yet to satisfactorily address the issues related to a user's comfort level and his or her protection of privacy. Therefore, this paper outlines the proposal for home gateway operating model using reference monitor in an OSGi service platform, whose goal is to enhance the operation required to efficiently meet a user's access, convenience, and privacy concerns. The reference monitor is a collection of access controls for objects, and is also capable of providing the facilities for access control. Furthermore, it adds the element of comfort to user access control, because it is intended as a core part of how subjects interact with objects. The proposed model is based on an RBAC model to effectively manage access control. Its policy is classified into two types (e.g., user-role assignment policy and permission-role assignment policy) in an attempt to not only better protect user privacy, but also to improve the performance of the policy operation. It is argued that the new home gateway model provides sufficient and effective guidelines to suggest future access control policies.

ACS Style

Eun-Ae Cho; Chang-Joo Moon; Doo-Kwon Baik. Home gateway operating model using reference monitor for enhanced user comfort and privacy. IEEE Transactions on Consumer Electronics 2008, 54, 494 -500.

AMA Style

Eun-Ae Cho, Chang-Joo Moon, Doo-Kwon Baik. Home gateway operating model using reference monitor for enhanced user comfort and privacy. IEEE Transactions on Consumer Electronics. 2008; 54 (2):494-500.

Chicago/Turabian Style

Eun-Ae Cho; Chang-Joo Moon; Doo-Kwon Baik. 2008. "Home gateway operating model using reference monitor for enhanced user comfort and privacy." IEEE Transactions on Consumer Electronics 54, no. 2: 494-500.

Conference paper
Published: 01 January 2008 in 2008 Digest of Technical Papers - International Conference on Consumer Electronics
Reads 0
Downloads 0

In home network environments, user comfort, and privacy are very important issues that need to be addressed. The reference monitor is the collection of access controls for devices, files, memory, and other kinds of objects and it is also able to provide advanced facilities for access control. In order to meet the user's requirements for comfortability and privacy, a reference monitor model is proposed for improving the home gateway in the OSGi service platform. The proposed model is based on the RBAC model, and the policy is classified into two types: User-role assignment policy and Permission-role assignment policy. The policies are in XML format. With the use of the proposed reference monitor model, more effective guidelines can be provided for user access control in home networks.

ACS Style

Eun-Ae Cho; Chang-Joo Moon; Doo-Kwon Baik. A Reference Monitor Model for Improving User Comfort and Privacy of Home Gateway in OSGi Service Platform. 2008 Digest of Technical Papers - International Conference on Consumer Electronics 2008, 1 .

AMA Style

Eun-Ae Cho, Chang-Joo Moon, Doo-Kwon Baik. A Reference Monitor Model for Improving User Comfort and Privacy of Home Gateway in OSGi Service Platform. 2008 Digest of Technical Papers - International Conference on Consumer Electronics. 2008; ():1.

Chicago/Turabian Style

Eun-Ae Cho; Chang-Joo Moon; Doo-Kwon Baik. 2008. "A Reference Monitor Model for Improving User Comfort and Privacy of Home Gateway in OSGi Service Platform." 2008 Digest of Technical Papers - International Conference on Consumer Electronics , no. : 1.

Conference paper
Published: 01 October 2007 in 7th IEEE International Conference on Computer and Information Technology (CIT 2007)
Reads 0
Downloads 0

It becomes increasingly common to use distributed services according to development of wire/wireless network. Home network area is also based on distributed environment which use a lot of services. Various technologies already have been used in home network. However, the research of information security part is insufficient. Thus, in this paper, we enhance our previous work by applying SSL component as a bundle format. This framework includes efficient user access control based on OSGi service platform from the former researches. This paper can cover the venerability between home gateway and authorization server in existing OSGi service platform. Therefore we provide the advantages of pre-studied framework and user information protection simultaneously.

ACS Style

Eun-Ae Cho; Chang-Joo Moon; Dae-Ha Park; Doo-Kwon Baik. Home Network Framework Based on OSGi Service Platform Using SSL Component Bundle. 7th IEEE International Conference on Computer and Information Technology (CIT 2007) 2007, 755 -760.

AMA Style

Eun-Ae Cho, Chang-Joo Moon, Dae-Ha Park, Doo-Kwon Baik. Home Network Framework Based on OSGi Service Platform Using SSL Component Bundle. 7th IEEE International Conference on Computer and Information Technology (CIT 2007). 2007; ():755-760.

Chicago/Turabian Style

Eun-Ae Cho; Chang-Joo Moon; Dae-Ha Park; Doo-Kwon Baik. 2007. "Home Network Framework Based on OSGi Service Platform Using SSL Component Bundle." 7th IEEE International Conference on Computer and Information Technology (CIT 2007) , no. : 755-760.

Journal article
Published: 31 May 2007 in Knowledge-Based Systems
Reads 0
Downloads 0

The role-based access control (RBAC) model has garnered great interest in the security community due to the flexible and secure nature of its applicability to the complex and sophisticated information system. One import aspect of RBAC is the enforcing of security policy, called constraint, which controls the behavior of components in RBAC. Much research has been conducted to specify constraints. However, more work is needed on the aspect of sharing information resources for providing better interoperability in the widely dispersed ubiquitous information system environment. This paper provides visual modeling of RBAC policy and specifies constraints of RBAC by employing a semantic web ontology language (OWL) to enhance understanding of constraints for machines and people in a ubiquitous computing environment. Using OWL, constraints were precisely formalized according to the constraint patterns and the effectiveness of OWL specification was demonstrated by showing the reasoning process.

ACS Style

JuHum Kwon; Chang-Joo Moon. Visual modeling and formal specification of constraints of RBAC using semantic web technology. Knowledge-Based Systems 2007, 20, 350 -356.

AMA Style

JuHum Kwon, Chang-Joo Moon. Visual modeling and formal specification of constraints of RBAC using semantic web technology. Knowledge-Based Systems. 2007; 20 (4):350-356.

Chicago/Turabian Style

JuHum Kwon; Chang-Joo Moon. 2007. "Visual modeling and formal specification of constraints of RBAC using semantic web technology." Knowledge-Based Systems 20, no. 4: 350-356.

Conference paper
Published: 01 November 2006 in 2006 International Conference on Hybrid Information Technology
Reads 0
Downloads 0

The ubiquitous computing environment is an environment that freely shares all data anytime, anywhere, and through any device without considering constraints. However, the personal or private information in ubiquitous computing could be disclosed, shared from anyone, or used maliciously without consent from the owner of the data. Thus, privacy is one of the major issues in such an environment. Of many security methods, which are able to protect the privacy, The role-based access control (RBAC) model, a typical access control model within the enterprise environment, has been widely studied, applied to various applications, and implemented. However, much existing research for access control has not solved the privacy concerns within ubiquitous computing. This paper proposes a method and framework of user-centric and efficient access control to handle personal privacy within ubiquitous computing environment by using both proposed model based on core component of RBAC model and privacy policies

ACS Style

Sung-Ho Hong; Eun-Ae Cho; Chang-Joo Moon; Doo-Kwon Baik. RBAC-Based Access Control Framework for ensuring Privacy in Ubiquitous Computing. 2006 International Conference on Hybrid Information Technology 2006, 1, 278 -283.

AMA Style

Sung-Ho Hong, Eun-Ae Cho, Chang-Joo Moon, Doo-Kwon Baik. RBAC-Based Access Control Framework for ensuring Privacy in Ubiquitous Computing. 2006 International Conference on Hybrid Information Technology. 2006; 1 ():278-283.

Chicago/Turabian Style

Sung-Ho Hong; Eun-Ae Cho; Chang-Joo Moon; Doo-Kwon Baik. 2006. "RBAC-Based Access Control Framework for ensuring Privacy in Ubiquitous Computing." 2006 International Conference on Hybrid Information Technology 1, no. : 278-283.