Browse > Article
http://dx.doi.org/10.6109/jkiice.2014.18.1.169

Research on Technical Requirements of Security for Migration, Combination, and Separation of Web-Contents and Development of Cooperation Service Framework in N-Screen Services  

Lee, Howon (Department of Electrical, Electronic and Control Engineering & IITC, Hankyong National University)
Abstract
According to explosion of smart-devices, demands on N-screen services based on cooperation of multiple screens are rapidly increasing. These N-screen services can provide new user-experience (UX) to users. That is, it can provide technical advances to users. On the other hand, it causes new security problems. In this paper, we analyze conventional web-security attacks, and we propose and analyze new security requirements for migration, combination, and separation of web-contents based on N-screen service scenarios. Also, we develop N-screen cooperation service framework in order to ensure user security.
Keywords
N-Screen Service; Web Content; Security Requirement; Service Framework;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Ho-Won Lee, Soo-Bin Lee, "Research on N-Screen Cooperative Service Scenarios and Framework Considering Dynamic Reconfiguration of Web Contents", Global e-Business Association e-Business Study, Vol. 13, No. 3, pp. 461-480, Sep. 2012.
2 H. R. Mun, S. H. Kim, and B. H. Chung, "Analysis on Trends for Contents Sharing Technology", ETRI Electronics and Telecommunications Trends, Vol. 25, No 4, Aug. 2010.   과학기술학회마을
3 Kim, J., D. Lee, B. C. Jung, and J. Ahn, "Ontology based information distribution in the pervasive display environment", IEEE PERCOM'2010 Workshops, pp.171- 175, 2010.
4 Kim, J., U. Farman, S. Lee, S. Jo, H. Lee, and W. Ryu, "Dynamic addition and deletion of devices in N-screen environment", ICUFN, pp. 118-122, 2012.
5 Yoon, C., T. Um, and H. Lee, "Classification of N-Screen Services and its standardization", ICACT, pp. 597-602, 2012.
6 J. G. Choi, B. N. Noh, "Security Technology Research in Cloud Computing Environment", Journal of Security Engineering, Vol. 8, No. 3, Jun. 2011.
7 J. S. Park, E. K, Cho, and S. G. Kang, "Security Technology for World Wide Web", ETRI Electronics and Telecommunications Trends, Vol. 11 No. 4, Dec. 1996.
8 G. B. Cho, "A Survey of Information Security Technology in the Ubiquitous Environments", Samsung SDS Consulting Review, No. 3, 2005.
9 Michael, C., Developer's Guide To Web Application Security, Syngress, 2007.
10 Shreeraj, S., Web 2.0 Security: Defending Ajax, RIA, and SOA, Thomson, 2007.