Proceedings of the International Conference on IT Convergence and Security 2011 by Kuinam J. KimProceedings of the International Conference on IT Convergence and Security 2011 by Kuinam J. Kim

Proceedings of the International Conference on IT Convergence and Security 2011

EditorKuinam J. Kim, Seong Jin Ahn

Paperback | March 1, 2014

Pricing and Purchase Info


Earn 1,230 plum® points

Prices and offers may vary in store


In stock online

Ships free on orders over $25

Not available in stores


As we entered the 21st century, the rapid growth of information technology has changed our lives more conveniently than we have ever speculated. Recently in all fields of the industry, heterogeneous technologies have converged with information technology resulting in a new paradigm, information technology convergence. In the process of information technology convergence, the latest issues in the structure of data, system, network, and infrastructure have become the most challenging task.

Proceedings of the International Conference on IT Convergence and Security 2011 approaches the subject matter with problems in technical convergence and convergences of security technology by looking at new issues that arise from techniques converging. The general scope is convergence security and the latest information technology with the following most important features and benefits:

1.      Introduction of the most recent information technology and its related ideas

2.      Applications and problems related to technology convergence, and its case studies

3.      Introduction of converging existing security techniques through convergence security

Overall, after reading Proceedings of the International Conference on IT Convergence and Security 2011, readers will understand the most state of the art information strategies and technologies of convergence security.

Kuinam, J, Kim is a professor and chairman of the Department of Convergence Security at Kyoung-gi University(KGU) in Kyoung-gi, Korea. He is also President of the Center for Industry Security supported by Ministry of Knowledge and Economy, Korea. His current fields of specialization are internet-based computing models, computer and net...
Title:Proceedings of the International Conference on IT Convergence and Security 2011Format:PaperbackPublished:March 1, 2014Publisher:Springer NetherlandsLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:9400798636

ISBN - 13:9789400798632

Look for similar items by category:


Table of Contents

Part 1. Security Fundamentals

A Secure Service Framework for handling Security Critical Data on the Public Cloud; Gi-Hwan Cho

The Understanding of Building Trust Model on Smartphone Application: Focusing on Users' Motivation; Hun Choi

Towards Understanding Deterrence: Information Security Managers' Perspective;  Sangseo Park


Part 2. Industrial & Business Information Security

Idea Sketch to Attribute-Based Access Control in Cloud Computing Environment;  ByungRae Cha

Realizing Security Requirements with Physical Properties; André  van Cleeff

Controlling Decryption of Personal Health Records in the Cloud; Yi-Chang Hsu

Access Control Mechanism for XML Document; Sun-Moon Jo

A Collaborative Intrusion Detection System Framework for Cloud Computing; Doan Nguyen Man

Criteria for Comparing Nations Cyberwar Capability; Hyung-Jun Seo


Part 3. Security Protocols and Applications

A RSSI-based approach for Localization of Wireless Sensor Network in Indoor; Hyochang Ahn

Semantic Search and Retrieval System for Learning Objects; Arshad Awan

Wear Leveling for PCM Using Hot Data Identification; Inhwan Choi

Monitoring and Feedback Tools for Realtime Workloads for Xen Virtual Machine; Jae Hyeok Jang

HARD: Host-Level Address Remapping Driver for Solid-State Disk; Young-Joon Jang

Ubiquitous based Personalized Hypertension Monitoring System; Jonghun Kim

Customized IPTV Content Recommendation Service Model Based On Personal Preference; Si-Jung Kim

A Study on the Touch Processes of Android Smartphone on Froyo and Gingerbread; Yeong-Gyu Lim

Case Study of QoS-assured Convergence Service Overlay in Open Service Platform Environment; Nam-Kyung Lee

Aspect Oriented Software Development using Requirement Engineering; Seung-Hyung Lee

Accelerometer-based Physical Activity Measurement; Yao Meng

A Group Data Synchronization Protocol in Mobile Environments; Ju-Geon Pak

Efficient Transmission Method for Mobile Data Synchronization Based on Data Characteristics; Kee-Hyun Park


Part 4. Convergence Security                                     

A Dynamic Buffer Management of Hybrid Solid State Disk for Media Applications; In-Pyo Cho

An Efficient Live Stream Community Management Scheme for the Mobile Environment; Chung-Pyo Hong

Unclogging the libjpeg performance bottleneck: a stream-parallel DCT retro-fitted with sequential legacy code; Jingun Hong

Development of Real-time Gesture Recognition System using Visual Interaction; Sung Kwan Kang

Architecture of Image Encryption hardware using Two dimensional Cellular Automata; Abdul Raouf Khan

Simulation of 3D Information Visualization; Gui-Jung Kim

Group Based Vehicular Machine to Machine Communication Scheme in Cellular Networks; Kyu Chul Kim

Development of Real-time Location-based Multimedia Style Slop Information Retrieval System; Sung-Ho Kim

Augmented Reality-Based Role-Playing Contents for Education; Sukhyun Lim

Vertex Propagation for Fast Ray-casting of Digital Elevation Model; Eun-Seok Lee

A Study of a Network Capacity Planning by Analyzing Joint Probability of a Virtual Organization; Kyuho Lee

Image Registration for Sub-Pixel Using Pyramid Edge Images; Jae-Young Lee

Real-time Camera Tracking Using Planar Object Detection; Ahr-Hyun Lee

Performance Analysis of Routing Methods over Mobile IPv6 Networks; Reza Malekian

Robust Estimation of Heights of Moving People using a Single Camera; Sang-Wook Park


Part 5. IT Convergence Applications

Goal-Heuristic analysis Method for an Adaptive Process Mining; Sujin Baek

Security Threat modeling and Requirement Analysis Method based on Goal-Scenario; Sujin Baek

An Effective Learning Method in Art Using Virtual Reality and Ontology; Sang-Jin Cha

Development of Pain Prescription Decision Systems for Nursing Intervention; Kyung Yong Chung

Performance Sensibility Influence of Recommended Makeup Styles; Kyung Yong Chung

Affective Social Network; Hyun-Jun Kim

A Study on the Metadata Extraction and Repository Based on Web Service Meta Broker; Sung-Ho Sim

Discovering Knowledge Flow in Social Network; Hyun-Jun Kim

Model Optimization with Graph Transformation and PSO algorithm for Model Transformation Verification; Jong-Won Ko

Pattern Based Model Transformation Using Mapping Patterns for Model Transformation Verification; Jong-Won Ko

Improved Performance of Emotion Extraction through Banned words; Seung-Bo Park

Potential Emotion Word in Movie Dialog; Seung-Bo Park

Story Modeling for Green Light Decision Making; Seung-Bo Park

Developing Service-Oriented Computing Model; Hamid S. Mcheick

An Extended XML Compression Technique for XML Element Retrieval; Tanakorn Wichaiwong


Part 6. Mobile Computing and Future Networks

Standby Power Control System based on User's Location for Energy Saving in Smart Home; Kyoung-Mi Im

Context-Aware Architecture for Improvement of Energy efficiency and Growth Promotion of Plants; Hyungsun Kim

Energy Saving of Plant Cultivation System using LED Control System based on Ultrasonic Sensor; Hyungsun Kim

Improvement of Energy Efficiency in Plant Factories through the Measurement of Plant Bioelectrical Potential; Sookyoun Kwon

Fuel Cell System Control Algorithm for Stable Operation of Residential Fuel Cell System; Sunhoe Kim

Types of Fuel Cells and Applications for Electricity and Heat Co-Generation; Sunhoe Kim

Integrated Energy Management System Framework for the Distributed Smart Meters in Smart Grid Environment; Yoon-Sik Yoo


Part 7. Multimedia and Information Visualization

Malware Detection Techniques using Artificial Immune; Mohamed Ahmed Mohamed Ali

A Survey on P2P Botnet Detection; Kyoung-Soo Han

A Study on Instruction Substitution Analysis of Metamorphic Malware; Kyoung-Soo Han

An Analysis of Malware Attached in Spam; Kyoung-Soo Han

Detection Methods for Malware Variant using API Call Related Graphs; Kyoung-Soo Han

Malware Classification Methods using API Sequence Characteristics; Kyoung-Soo Han


Part 8. Web Technology and Software Engineering

Practical Firewall Policy Inspection using Anomaly Detection and Its Visualization; Jung-Min Kang