dblp.uni-trier.dewww.uni-trier.de

HyungHyo Lee

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2007
18EETaeyeon Kim, HeeMan Park, HyungHyo Lee: A Secure Pairwise Key Establishment Scheme in Wireless Ad Hoc Networks. UIC 2007: 1243-1252
2006
17EEHyang-Chang Choi, Seungyong Lee, HyungHyo Lee: Design and Implementation of a Policy-Based Privacy Authorization System. ISI 2006: 129-140
16EEInSu Kim, HeeMan Park, BongNam Noh, YoungLok Lee, Seungyong Lee, HyungHyo Lee: Design and Implementation of Context-Awareness Simulation Toolkit for Context learning. SUTC (2) 2006: 96-103
15EESeungyong Lee, YoungLok Lee, HyungHyo Lee: Jini-Based Ubiquitous Computing Middleware Supporting Event and Context Management Services. UIC 2006: 786-795
14 InSu Kim, HeeMan Park, BongNam Noh, YoungLok Lee, Seungyong Lee, HyungHyo Lee: Context-Awareness Simulation Toolkit - A Study on Secure Context-Based Learning in Ubiquitous Computing. WEBIST (1) 2006: 190-198
2005
13EEYoungLok Lee, HyungHyo Lee, Seungyong Lee, HeeMan Park, BongNam Noh: The Design and Implementation of Secure Event Manager Using SPKI/SDSI Certificate. EUC Workshops 2005: 490-498
12EEYoungLok Lee, HyungHyo Lee, Seungyong Lee, InSu Kim, BongNam Noh: Development of Event Manager and Its Application in Jini Environment. EUC Workshops 2005: 704-713
11EEHyang-Chang Choi, YongHoon Yi, Jae-Hyun Seo, BongNam Noh, HyungHyo Lee: A Privacy Protection Model in ID Management Using Access Control. ICCSA (2) 2005: 82-91
2004
10EEHyungHyo Lee, Seungyong Lee, BongNam Noh: A New Role-Based Authorization Model in a Corporate Workflow Systems. ICCSA (1) 2004: 701-710
9EESeong Ho Lee, HyungHyo Lee, BongNam Noh: A Rule-Based Intrusion Alert Correlation System for Integrated Security Management. International Conference on Computational Science 2004: 365-372
8EESeungyong Lee, Yong-Min Kim, BongNam Noh, HyungHyo Lee: A New Authorization Model for Workflow Management System Using the RPI-RBAC Model. International Conference on Computational Science 2004: 639-643
7EEHyungHyo Lee, YoungLok Lee, BongNam Noh: A Framework for Modeling Organization Structure in Role Engineering. PARA 2004: 1017-1024
2003
6EEYongHoon Yi, MyongJae Kim, YoungLok Lee, HyungHyo Lee, BongNam Noh: Applying RBAC Providing Restricted Permission Inheritance to a Corporate Web Environment. APWeb 2003: 287-292
5EEHyungHyo Lee, YoungLok Lee, BongNam Noh: A New Role-Based Delegation Model Using Sub-role Hierarchies. ISCIS 2003: 811-818
4 JongSoon Park, YoungLok Lee, HyungHyo Lee, BongNam Noh: A Role-Based Delegation Model Using Role Hierarchy Supporting Restricted Permission Inheritance. Security and Management 2003: 294-302
2002
3EEHyungHyo Lee, BongNam Noh: Design and Analysis of Role-Based Security Model in SNMPv3 for Policy-Based Security Management. ICOIN (2) 2002: 430-441
2001
2EEJong-Youl Park, Dong-Ik Lee, HyungHyo Lee: Data Protection in Mobile Agents: One-time Key-based Approach. ISADS 2001: 411-418
1999
1EEHyungHyo Lee, BongNam Noh: An Integrity Enforcement Application Design and Operation Framework in Role-Based Access Control Systems: A Session-Oriented Approach. ICPP Workshops 1999: 179-184

Coauthor Index

1Hyang-Chang Choi [11] [17]
2InSu Kim [12] [14] [16]
3MyongJae Kim [6]
4Taeyeon Kim [18]
5Yong-Min Kim [8]
6Dong-Ik Lee [2]
7Seong Ho Lee [9]
8Seungyong Lee [8] [10] [12] [13] [14] [15] [16] [17]
9YoungLok Lee [4] [5] [6] [7] [12] [13] [14] [15] [16]
10BongNam Noh (Bong-Nam Noh) [1] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [16]
11HeeMan Park [13] [14] [16] [18]
12Jong-Youl Park [2]
13JongSoon Park [4]
14Jae-Hyun Seo [11]
15YongHoon Yi [6] [11]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)