2007 |
18 | EE | Taeyeon Kim,
HeeMan Park,
HyungHyo Lee:
A Secure Pairwise Key Establishment Scheme in Wireless Ad Hoc Networks.
UIC 2007: 1243-1252 |
2006 |
17 | EE | Hyang-Chang Choi,
Seungyong Lee,
HyungHyo Lee:
Design and Implementation of a Policy-Based Privacy Authorization System.
ISI 2006: 129-140 |
16 | EE | InSu Kim,
HeeMan Park,
BongNam Noh,
YoungLok Lee,
Seungyong Lee,
HyungHyo Lee:
Design and Implementation of Context-Awareness Simulation Toolkit for Context learning.
SUTC (2) 2006: 96-103 |
15 | EE | Seungyong Lee,
YoungLok Lee,
HyungHyo Lee:
Jini-Based Ubiquitous Computing Middleware Supporting Event and Context Management Services.
UIC 2006: 786-795 |
14 | | InSu Kim,
HeeMan Park,
BongNam Noh,
YoungLok Lee,
Seungyong Lee,
HyungHyo Lee:
Context-Awareness Simulation Toolkit - A Study on Secure Context-Based Learning in Ubiquitous Computing.
WEBIST (1) 2006: 190-198 |
2005 |
13 | EE | YoungLok Lee,
HyungHyo Lee,
Seungyong Lee,
HeeMan Park,
BongNam Noh:
The Design and Implementation of Secure Event Manager Using SPKI/SDSI Certificate.
EUC Workshops 2005: 490-498 |
12 | EE | YoungLok Lee,
HyungHyo Lee,
Seungyong Lee,
InSu Kim,
BongNam Noh:
Development of Event Manager and Its Application in Jini Environment.
EUC Workshops 2005: 704-713 |
11 | EE | Hyang-Chang Choi,
YongHoon Yi,
Jae-Hyun Seo,
BongNam Noh,
HyungHyo Lee:
A Privacy Protection Model in ID Management Using Access Control.
ICCSA (2) 2005: 82-91 |
2004 |
10 | EE | HyungHyo Lee,
Seungyong Lee,
BongNam Noh:
A New Role-Based Authorization Model in a Corporate Workflow Systems.
ICCSA (1) 2004: 701-710 |
9 | EE | Seong Ho Lee,
HyungHyo Lee,
BongNam Noh:
A Rule-Based Intrusion Alert Correlation System for Integrated Security Management.
International Conference on Computational Science 2004: 365-372 |
8 | EE | Seungyong Lee,
Yong-Min Kim,
BongNam Noh,
HyungHyo Lee:
A New Authorization Model for Workflow Management System Using the RPI-RBAC Model.
International Conference on Computational Science 2004: 639-643 |
7 | EE | HyungHyo Lee,
YoungLok Lee,
BongNam Noh:
A Framework for Modeling Organization Structure in Role Engineering.
PARA 2004: 1017-1024 |
2003 |
6 | EE | YongHoon Yi,
MyongJae Kim,
YoungLok Lee,
HyungHyo Lee,
BongNam Noh:
Applying RBAC Providing Restricted Permission Inheritance to a Corporate Web Environment.
APWeb 2003: 287-292 |
5 | EE | HyungHyo Lee,
YoungLok Lee,
BongNam Noh:
A New Role-Based Delegation Model Using Sub-role Hierarchies.
ISCIS 2003: 811-818 |
4 | | JongSoon Park,
YoungLok Lee,
HyungHyo Lee,
BongNam Noh:
A Role-Based Delegation Model Using Role Hierarchy Supporting Restricted Permission Inheritance.
Security and Management 2003: 294-302 |
2002 |
3 | EE | HyungHyo Lee,
BongNam Noh:
Design and Analysis of Role-Based Security Model in SNMPv3 for Policy-Based Security Management.
ICOIN (2) 2002: 430-441 |
2001 |
2 | EE | Jong-Youl Park,
Dong-Ik Lee,
HyungHyo Lee:
Data Protection in Mobile Agents: One-time Key-based Approach.
ISADS 2001: 411-418 |
1999 |
1 | EE | HyungHyo Lee,
BongNam Noh:
An Integrity Enforcement Application Design and Operation Framework in Role-Based Access Control Systems: A Session-Oriented Approach.
ICPP Workshops 1999: 179-184 |