dblp.uni-trier.dewww.uni-trier.de

Sangkyun Kim

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2007
22EESangkyun Kim: Governance of Information Security: New Paradigm of Security Management. Computational Intelligence in Information Assurance and Security 2007: 235-254
21EESangkyun Kim, Hong Joo Lee: A study on decision consolidation methods using analytic models for security systems. Computers & Security 26(2): 145-153 (2007)
20EESangkyun Kim: Special section: Information engineering and enterprise architecture in distributed computing environments. Future Generation Comp. Syst. 23(2): 262 (2007)
19EEMinhyung Kim, Sangkyun Kim, Arcy J. Kong: High performance AAA architecture for massive IPv4 networks. Future Generation Comp. Syst. 23(2): 275-279 (2007)
18EESangkyun Kim: Methodology of security engineering for industrial security management systems. Journal of Systems and Software 80(10): 1589 (2007)
17EESangkyun Kim: IT compliance of industrial information systems: Technology management and industrial engineering perspective. Journal of Systems and Software 80(10): 1590-1593 (2007)
16EESungho Kwon, Sangsoo Jang, Jaeill Lee, Sangkyun Kim: Common defects in information security management system of Korean companies. Journal of Systems and Software 80(10): 1631-1638 (2007)
2006
15EESangkyun Kim, Hong Joo Lee: Security Engineering Methodology Based on Problem Solving Theory. ICCSA (4) 2006: 639-648
14EEHong Joo Lee, Choon Seong Leem, Sangkyun Kim: A Study on the Development of Usability Evaluation Framework (Focusing on Digital TV). ICCSA (4) 2006: 716-725
13EEHeejun Park, Sangkyun Kim, Hong Joo Lee: General Drawing of the Integrated Framework for Security Governance. KES (1) 2006: 1234-1241
12EEHong Joo Lee, Choon Seong Leem, Sangkyun Kim: A Study on Development of Business Factor in Ubiquitous Technology. KES (1) 2006: 1259-1266
2005
11EESangkyun Kim, Ilhoon Choi: A Case Study on the Development of Employee Internet Management System. ICCSA (3) 2005: 1229-1238
10EESangkyun Kim, Hong Joo Lee: Cost-Benefit Analysis of Security Investments: Methodology and Case Study. ICCSA (3) 2005: 1239-1248
9EEHong Joo Lee, Hee-Jun Park, Sangkyun Kim: A Study on Authentication Mechanism Using Robot Vacuum Cleaner. ICCSA (4) 2005: 122-127
8EEChoon Seong Leem, Sangkyun Kim, Hong Joo Lee: Assessment Methodology on Maturity Level of ISMS. KES (3) 2005: 609-615
7EEHong Joo Lee, Sangkyun Kim, Choon Seong Leem: CSFs for HCI in Ubiquitous Computing Environments. KES (3) 2005: 616-620
6EEMinhyung Kim, Sangkyun Kim, Myungwhan Choi: Practical Design Recovery Techniques for Embedded Operating System on Complying with RTCA/DO-178B and ISO/IEC15408. KES (3) 2005: 621-627
2004
5EESangkyun Kim, Choon Seong Leem: Implementation of the Security System for Instant Messengers. CIS 2004: 739-744
4EESangkyun Kim, Choon Seong Leem: A Case Study on the Real-Time Click Stream Analysis System. CIS 2004: 788-793
3EESangkyun Kim, Choon Seong Leem: An Information Engineering Methodology for the Security Strategy Planning. ICCSA (1) 2004: 597-607
2EESangkyun Kim, Hong Joo Lee, Choon Seong Leem: Architecture of Authentication Mechanism for Emerging T-commerce Environments. PCM (1) 2004: 540-547
2002
1EEChoon Seong Leem, Sangkyun Kim: Introduction to an integrated methodology for development and implementation of enterprise information systems. Journal of Systems and Software 60(3): 249-261 (2002)

Coauthor Index

1Ilhoon Choi [11]
2Myungwhan Choi [6]
3Sangsoo Jang [16]
4Minhyung Kim [6] [19]
5Arcy J. Kong [19]
6Sungho Kwon [16]
7Hong Joo Lee [2] [7] [8] [9] [10] [12] [13] [14] [15] [21]
8Jaeill Lee [16]
9Choon Seong Leem [1] [2] [3] [4] [5] [7] [8] [12] [14]
10Hee-Jun Park [9]
11Heejun Park [13]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)