Search the dblp DataBase
Young-Gab Kim :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Hee-Young Lim , Young-Gab Kim , Chang-Joo Moon , Doo-Kwon Baik Bundle Authentication and Authorization Using XML Security in the OSGi Service Platform. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2005, pp:502-507 [Conf ] Young-Gab Kim , Chang-Joo Moon , Dae-Ha Park , Doo-Kwon Baik A Service Bundle Authentication Mechanism in the OSGi Service Platform. [Citation Graph (0, 0)][DBLP ] AINA (1), 2004, pp:420-425 [Conf ] Dongwon Jeong , Young-Gab Kim , Hoh Peter In SA-RFID: Situation-Aware RFID Architecture Analysis in Ubiquitous Computing. [Citation Graph (0, 0)][DBLP ] APSEC, 2004, pp:738-739 [Conf ] Eun-Ae Cho , Young-Gab Kim , Chang-Joo Moon , Doo-Kwon Baik Design and Implementation of an SSL Component Based on CBD. [Citation Graph (0, 0)][DBLP ] AsiaSim, 2004, pp:478-486 [Conf ] Hoh Peter In , Young-Gab Kim , Taek Lee , Chang-Joo Moon , Yoon-Jung Jung , In-Jung Kim A Security Risk Analysis Model for Information Systems. [Citation Graph (0, 0)][DBLP ] AsiaSim, 2004, pp:505-513 [Conf ] Jeong-Oog Lee , Myeong-Cheol Ko , Jinsoo Kim , Chang-Joo Moon , Young-Gab Kim , Hoh Peter In Analyzing Web Interfaces of Databases for Retrieving Web Information. [Citation Graph (0, 0)][DBLP ] AWCC, 2004, pp:331-336 [Conf ] Young-Gab Kim , Chang-Joo Moon , Dongwon Jeong , Jeong-Oog Lee , Chee-Yang Song , Doo-Kwon Baik Context-Aware Access Control Mechanism for Ubiquitous Applications. [Citation Graph (0, 0)][DBLP ] AWIC, 2005, pp:236-242 [Conf ] Chang-Joo Moon , Woojin Paik , Young-Gab Kim , JuHum Kwon The Conflict Detection Between Permission Assignment Constraints in Role-Based Access Control. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:265-278 [Conf ] Young-Gab Kim , Chang-Joo Moon , Dae-Ha Park , Doo-Kwon Baik A MAC-Based Service Bundle Authentication Mechanism in the OSGi Service Platform. [Citation Graph (0, 0)][DBLP ] DASFAA, 2004, pp:137-145 [Conf ] Young-Gab Kim , Taek Lee , Hoh Peter In , Yoon Jung Chung , In-Jung Kim , Doo-Kwon Baik A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:175-185 [Conf ] Sung-Won Moon , Young-Gab Kim , Chang-Joo Moon , Doo-Kwon Baik Password-Based User Authentication Protocol for Mobile Environment. [Citation Graph (0, 0)][DBLP ] ICOIN, 2006, pp:743-753 [Conf ] Dongwon Jeong , Young-Gab Kim , Young-Shil Kim , Lee-Sub Lee , Soo-Hyun Park , Doo-Kwon Baik A Secure Migration Mechanism of Mobile Agents Under Mobile Agent Environments. [Citation Graph (0, 0)][DBLP ] PARA, 2004, pp:974-982 [Conf ] Dongwon Jeong , Young-Gab Kim , Soo-Hyun Park , Doo-Kwon Baik Uniformly Handling Metadata Registries. [Citation Graph (0, 0)][DBLP ] SERA, 2004, pp:81-91 [Conf ] Jin-Woo Kim , Young-Gab Kim , JuHum Kwon , Sung-Ho Hong , Chee-Yang Song , Doo-Kwon Baik An enterprise architecture framework based on a common information technology domain (EAFIT) for improving interoperability among heterogeneous information systems. [Citation Graph (0, 0)][DBLP ] SERA, 2005, pp:198-205 [Conf ] Young-Gab Kim , Jin-Woo Kim , Sung-Ook Shin , Doo-Kwon Baik Managing Variability for Software Product-Line. [Citation Graph (0, 0)][DBLP ] SERA, 2006, pp:74-81 [Conf ] Young-Gab Kim , Dongwon Jeong , Doo-Kwon Baik Verifying a MAC-Based Service Bundle Authentication Mechanism for the OSGi Service Platform. [Citation Graph (0, 0)][DBLP ] WAIM, 2004, pp:684-689 [Conf ] Dongwon Jeong , Young-Gab Kim , Doo-Kwon Baik SQL/MDR: Query Language for Consistent Access of Metadata Registries Based on SQL3. [Citation Graph (0, 0)][DBLP ] WAIM, 2004, pp:239-248 [Conf ] Dongwon Jeong , Young-Gab Kim , Soo-Hyun Park An Integrity Checking Mechanism of Mobile Agents under a Closed Environment with Trusted Hosts. [Citation Graph (0, 0)][DBLP ] International Journal of Software Engineering and Knowledge Engineering, 2006, v:16, n:1, pp:141-151 [Journal ] Young-Gab Kim , Chang-Joo Moon , Dongwon Jeong , Doo-Kwon Baik Formal Verification of Bundle Authentication Mechanism in Osgi Service Platform: Ban Logic. [Citation Graph (0, 0)][DBLP ] International Journal of Software Engineering and Knowledge Engineering, 2006, v:16, n:2, pp:153-174 [Journal ] Jin-Woo Kim , JuHum Kwon , Young-Gab Kim , Chee-Yang Song , Hyun Seok Kim , Doo-Kwon Baik EAFoC: Enterprise Architecture Framework Based on Commonality. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2006, v:21, n:6, pp:952-964 [Journal ] Young-Gab Kim , Dongwon Jeong , Soo-Hyun Park , Jongin Lim , Doo-Kwon Baik Modeling and Simulation for Security Risk Propagation in Critical Information Systems. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:858-868 [Conf ] Young-Gab Kim , Jongin Lim Quantitative Risk Analysis and Evaluation in Information Systems: A Case Study. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (3), 2007, pp:1040-1047 [Conf ] Young-Gab Kim , Jongin Lim HMM-Based Approach for Evaluating Risk Propagation. [Citation Graph (0, 0)][DBLP ] PAISI, 2007, pp:325-326 [Conf ] Method for Evaluating the Security Risk of a Website Against Phishing Attacks. [Citation Graph (, )][DBLP ] Embedded System Architecture for an FMC Mobile Handset. [Citation Graph (, )][DBLP ] Search in 1.253secs, Finished in 1.255secs