Soon Ae Chun: Research Overview
CS PhD Colloquium & Seminar
Research Interest Areas:
Click on the title to view the detailed descriptions.
Information Security and PrivacyInformation security, privacy and trust are critical element in digital age. My research contributions include developing one of the first geo-spatial authorization models to control access to geospatial data, such as high resolution imageries, maps and other geo-objects, extending the traditional RBAC with geo-credentials. This work also naturally extended to data security in mobile and pervasive environment where the goespatial location is the primary determinant for location-based information services. The geospatial location of medical emergencies is also used to pull the necessary resources to fill the required roles for medical record access. Algorithms for role recommendation for available medical emergency staff nearby the accidents are developed for medical data access control that also preserve the patient's privacy preferences.
Interorganizational workflow execution often implies sharing of data between several organizations. The conflict of interest issue may arise with the visible data and control flows in workflow execution period. The Chinese wall security model has been extended to handle this potential conflict of interest issues during decentralized workflow execution.
In addition, my current research extends to the cybersecurity education. We have established a Security Research and Education Lab (iSecure Lab) that aims to foster research and learning environment to raise the awareness and knowledge in cybersecurity and to enhance skills in assessing and controlling cybersecurity risks and attacks. The main research activity includes a self-help learning tool to easily search for the educational materials in different formats, based on the security terms and learners's learning styles and preferences. To this end, my research activities include a semi-automated Security Ontology Development and semantic tagging, linking and searching of the security learning objects.
- iSecure LAB: Integrating learning resources for Information Security Research and Education
- Cyber Security Ontology : Approaches to develop security knowledge base automatically.
- SOX: Security Ontology Expert Tool
SLOB: Cyber Security Learning using Security Ontology
- Privacy Protection in Government Mashups:
- Situation-based Role Recommendation for Medical Emergency
- Risk-based Access Control:
- Geospatial data Authorization Model (GSAM):
(GSAM: Prototype System)
- Chinese Wall Security Model for Decentralized Workflow Management:
Semantic Web and Data Integration
Social InfoButtons: Semantic Integration of Health 2.0 data
Sponsor: PSC-CUNY 2011-2013
- Developing a Health 2.0 Medical Knowledge Base
- Developing People Ontology and Semantic Search: OSWS: Ontology-supported Web Search
- Semantic Annotation and Search for Deep Web Services
- Toward Semantic
Deep Web, 2008
Why the Deep Web Needs the Semantic Web? (An Interview with SemanticWeb.com ), 2009
Cited in Greg Goth's article in IEEE Computer., 2009
- Twitter Sentiment Classification for Monitoring Public Health Concern Trends
- Mapping Public Health Concerns
- Twitter Health Data Monitoring and Visualization: EOSDS: Epidemics Outbreak and Spread Detection System (EOSDS mirror site at NJIT)
E-Government, Environmental Science Data Management
- Sensors and Crowdsourcing for Environmental Emergency Planning
- A Sensor Network-based Real-Time Flood Warning System
- Mobile Environmental Information System (m-ENVI)
- Environmental Data Modeling, Management and Integration for Decision Making
- E-Government: Human-Centered Business Services
- Customized Visualization of GeoSpatial Government Regulations
- SICOP: Spatially Integrated Coastal Permitting System (Prototype: Meadowlands Coastal Permit Assistant)
- Geospatial Workflow Customization for E-government Services
- Egovernment: Technology Transfer
Decentralized Workflow Management
With the rapid growth of Internet applications for enterprise-wide and cross-enterprise
business processes with dynamically changing participants, workflow management sys-
tems (WFMS) face various challenges: (1) cross-organizational workflow design and
definition need to be dynamic, efficiently constructed, and customized to a user's needs;
(2) workflow execution should honor the autonomy of various participating organiza-
tions, avoiding centralized control which can be a potential bottleneck and single point
of failure, and (3) service and business workflows should be customizable at run time
to adapt to changes of requirements and exception situations. This project has
contributed to the progress towards the formalization and development of a decentral-
ized workflow system that supports customized workflows that can be automatically
composed at design time, and that adds greater flexibility for dynamic workflows that
can adapt to the changing requirements and environments. This research also has
contributed to the progress towards the understanding of requirements and limitations
in developing inter-agency E-government application systems.
- Ontology-based Workflow Generation
- Decentralized Workflow Management Model:
- Dynamic Worflow Change Management
- Performance Analysis of Decentralized Workflow Model
- Chinese Wall Security Model for Conflict-of-Interests in Inter-organizational Workflow
- Automatic Generation of Geospatial Workflows
Proliferation of Web technologies and the ubiquitous Internet has resulted in a tremendous increase in the need to deliver one-stop Web services, which are often composed of multiple component services that cross organizational boundaries. It is essential that these composite Web services, referred to as service flows, be carefully composed in a dynamic and customized manner to suit to the changing needs of the customers. This composition should be conducted in such a manner that (i) the composed service flow adheres to the policies imposed by the organizations offering the component services, (ii) the selected component services are compatible with one another so that the entire composition would result in a successful service flow, and (iii) the selected component services most closely meet the customer requirements. In this research, we propose a policy-based Web service composition that utilizes the semantics associated with the component services.
We consider policies imposed by different entities while composing service flows, which include service policies (imposed by the organizations offering component services), service flow policies (associated with the entire service flow), and user policies (the user requirements expressed as policies). In addition to these policies, one may consider rules at the syntactic and semantic levels that can be used to select relevant component services in order to compose customized service flows, by considering the notions of syntactic, semantic and policy compatibility. We model the different policies and the service topic ontology using OWL, DAML-S, RuleML and RDF standards.
- Policy-based Web Service Composition
- Ontology and pragmatic Knowlege for Semantic Web
- Context Model for Pervasive Semantic Web Services