Time filter

Source Type

Bucheon, South Korea

Seoul Theological University is an evangelical educational institution founded in 1911 to cultivate Christian workers and leaders on the basis of the traditions and precepts of the Korea Evangelical Holiness Church.The university was established to uphold a higher scholastic standard in conformity with the Wesleyan model of spiritual life so as to apply it to the students in order to cultivate dedicated missionaries who are well balanced with theological knowledge, faith and life experiences. Wikipedia.

Kim T.K.,Seoul Theological University | Nah J.-H.,Electronics and Telecommunications Research Institute
International Journal of Security and its Applications | Year: 2013

In this paper, we proposed the attribute binding based enhanced user authentication. User authentication is a simple process that is used to determine if an identity is real. Age restricted commerce such as lottery, online gaming, wine & spirits, tobacco, social networking, wireless and others are not invulnerable to the risks associated with identity theft and fraud. And, as this dynamic industry continues to grow, only assessing if a customer is of age will no longer be sufficient. Determining a minimum age needs to be combined with gaining a deeper insight into the validity of an identity along with fraud patters to help protect customer privacy, meet compliance and prevent fraud. The suggested model in this paper can be used to protect the child effectively in the internet environments. © 2013 SERSC. Source

Jung S.-M.,Sungkyunkwan University | Kim T.-K.,Seoul Theological University | Seo H.-S.,Korea University of Technology and Education | Lee S.-J.,Korea University of Technology and Education | Kwak J.,Soonchunhyang University
Electronic Commerce Research | Year: 2013

AMI is the core infrastructure of a smart grid and it is expected to be used for many industrial fields. The components of AMI generally include a smart meter, DCU, and MDMS. In such a system, the smart meter measures power consumption and DCU collects information from smart meters and send their data to MDMS. The MDMS is an end server to get information of the power usage and store its log and data. Since there are a lot of devices such as smart meters and DCUs in AMI, it is important to maintain the suitable number of them. In particular, it is necessary to calculate the proper number of DCUs for efficient management of AMI. In this paper, we suggest a way to predict the proper number of DCUs and this proposed method is useful to predict the total performance of heterogeneous AMI. The simulation results show that AMI is greatly influenced by the difference of performance between DCUs in the heterogeneous AMI. © 2013 Springer Science+Business Media New York. Source

Kim T.K.,Seoul Theological University
International Journal of Applied Engineering Research | Year: 2015

Age verification system in the online environment is used to restrict access to controlled content or as an authentication mechanism. Age verification will be required of ecommerce companies providing adult related content, goods or services. As a society we have established and live by a set of rules designed to keep merchandise and services intended for adults out of the reach of children. Increasing laws and regulations require service providers to provide services based on the age of users. Therefore service provider companies require knowing that the user is above or below an age, or within an age bracket when selling, marketing or distributing age-restricted or age-sensitive products, services or content. However, in the real world, most of service providers have not implemented appropriate age verification models or some have implemented inadequate models. Especially many of the online age verification models are not based on sound privacy principles. In this paper, age verification model which considering user’s privacy is suggested. Also comparisons with other models were performed. The analysis shows that the suggested model can support the user’s privacy and has low risk in online environments. © Research India Publications. Source

Jung S.-M.,Sungkyunkwan University | Jung J.-K.,Seoul Theological University | Kim T.-K.,Sungkyunkwan University | Chung T.-M.,Sungkyunkwan University
Lecture Notes in Electrical Engineering | Year: 2014

In cloud computing, the computing resources in a different physical location are integrated into various services by a virtualization technology. Cloud computing has currently received significant attention due to its many advantages. However, it has security threats of the traditional IT and also has new security threats caused by the structural features of virtualized environments. In particular, availability attacks are very threatening to cloud computing due to the feature of resource sharing. In this paper, we present the scheme to analyze the workloads by allocation of new virtual machines against availability attacks on system resources. We discuss the additional role of a resource broker to threat detection and apply proper an allocation method. Also, we define some factors and analyze several equations to get a quantitative standard against attacks on system availability. System threats and workloads can be analyzed based on these factors. If some availability attacks are detected, then we can apply a proper allocation method against these attacks by using a proposed scheme. © Springer-Verlag Berlin Heidelberg 2014. Source

Jung S.-M.,Sungkyunkwan University | Kim T.-K.,Seoul Theological University | Chung T.-M.,Sungkyunkwan University
Lecture Notes in Electrical Engineering | Year: 2013

A wireless sensor network is composed of numerous sensor nodes. There are two kinds of routing protocol for sensor neworks such as a flat-based and a hierarchical-based routing protocol. In a hierarchial-based routing protocol, the role of sensor nodes is different to reduce their energy consumption. In our previous paper, we proposed concentric clustering scheme to reduce the total residual energy of a sensor network. It is one of hierarchical-based routing protocols. There are some simulation result to show that the scheme is better than existing routing protocol. However, their are no consideration of the wireless communication characteristics in this simulation result. We should to apply these characteristics to the scheme to get precise simulation result. In particular, the network letency is important factor in the wireless communication. So, we proposed the approaches to apply network latency by using some equations. We compare a total residual energy between a conecentric clustering scheme with a consideration of network latency and without it. As shown the simulation results, energy consumption from network latency is significant and we should to apply it to get the practical simulation results. © 2013 Springer Science+Business Media. Source

Discover hidden collaborations