Yung-Chuan Lee

Learn More
The purpose of this paper is to introduce an innovative framework for implementation of ambient intelligence (AmI) environments. Compared to the existing state-of-the-art approaches, this framework creates a more decentralized and distributed AmI environment. In addition, the proposed approach is not limited to one specific domain, unlike many others. The(More)
In this paper, we propose a new failure-recovery model for workflow management systems (WfMSs). This model is supported with a new language, called the workflow failure-handling (WfFH) language, which allows the workflow designer to write programs so that s/he can use data-flow analysis technology to guide the failure recovery in workflow execution. With(More)
—Without the security assurance from the underlining operating system, software agents and agencies are constantly under security threats through the operating system. Although the security issues between software agents and agencies have been studied intensively, any formulated counter-measurement of these issues are subject to attacks that are able to(More)
Pi-Calculus is a formal method for describing and analyzing the behavior of large distributed and concurrent systems. Pi-calculus offers a conceptual framework for describing and analyzing the concurrent systems whose configuration may change during the computation. With all the advantages that pi-calculus offers, it does not provide any methods for(More)
Covert channel attacks utilise shared resources to indirectly transmit sensitive information to unauthorised parties. Current operating systems (e.g. SELinux) rely on tagging the filesystem with security labels and enforcing security policies at the time of access to a file or resource. However, such mechanisms do not provide strong protection against(More)
— Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging the filesystem with access control properties. However, such mechanisms do not provide strong protection against information laundering via covert channels. Colored Linux [20], an(More)
An agent is a computational entity that interacts with one or more counterparts or real-world systems with the following key features to varying degrees: (a) autonomy, (b) reactiveness, (c) pro-activeness, and (d) social abilities. An agent may also be mobile, in which case the agent migrates along with its associated data, state and logic to another host(More)