The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Young-Gab Kim: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hee-Young Lim, Young-Gab Kim, Chang-Joo Moon, Doo-Kwon Baik
    Bundle Authentication and Authorization Using XML Security in the OSGi Service Platform. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:502-507 [Conf]
  2. Young-Gab Kim, Chang-Joo Moon, Dae-Ha Park, Doo-Kwon Baik
    A Service Bundle Authentication Mechanism in the OSGi Service Platform. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2004, pp:420-425 [Conf]
  3. Dongwon Jeong, Young-Gab Kim, Hoh Peter In
    SA-RFID: Situation-Aware RFID Architecture Analysis in Ubiquitous Computing. [Citation Graph (0, 0)][DBLP]
    APSEC, 2004, pp:738-739 [Conf]
  4. Eun-Ae Cho, Young-Gab Kim, Chang-Joo Moon, Doo-Kwon Baik
    Design and Implementation of an SSL Component Based on CBD. [Citation Graph (0, 0)][DBLP]
    AsiaSim, 2004, pp:478-486 [Conf]
  5. Hoh Peter In, Young-Gab Kim, Taek Lee, Chang-Joo Moon, Yoon-Jung Jung, In-Jung Kim
    A Security Risk Analysis Model for Information Systems. [Citation Graph (0, 0)][DBLP]
    AsiaSim, 2004, pp:505-513 [Conf]
  6. Jeong-Oog Lee, Myeong-Cheol Ko, Jinsoo Kim, Chang-Joo Moon, Young-Gab Kim, Hoh Peter In
    Analyzing Web Interfaces of Databases for Retrieving Web Information. [Citation Graph (0, 0)][DBLP]
    AWCC, 2004, pp:331-336 [Conf]
  7. Young-Gab Kim, Chang-Joo Moon, Dongwon Jeong, Jeong-Oog Lee, Chee-Yang Song, Doo-Kwon Baik
    Context-Aware Access Control Mechanism for Ubiquitous Applications. [Citation Graph (0, 0)][DBLP]
    AWIC, 2005, pp:236-242 [Conf]
  8. Chang-Joo Moon, Woojin Paik, Young-Gab Kim, JuHum Kwon
    The Conflict Detection Between Permission Assignment Constraints in Role-Based Access Control. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:265-278 [Conf]
  9. Young-Gab Kim, Chang-Joo Moon, Dae-Ha Park, Doo-Kwon Baik
    A MAC-Based Service Bundle Authentication Mechanism in the OSGi Service Platform. [Citation Graph (0, 0)][DBLP]
    DASFAA, 2004, pp:137-145 [Conf]
  10. Young-Gab Kim, Taek Lee, Hoh Peter In, Yoon Jung Chung, In-Jung Kim, Doo-Kwon Baik
    A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:175-185 [Conf]
  11. Sung-Won Moon, Young-Gab Kim, Chang-Joo Moon, Doo-Kwon Baik
    Password-Based User Authentication Protocol for Mobile Environment. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2006, pp:743-753 [Conf]
  12. Dongwon Jeong, Young-Gab Kim, Young-Shil Kim, Lee-Sub Lee, Soo-Hyun Park, Doo-Kwon Baik
    A Secure Migration Mechanism of Mobile Agents Under Mobile Agent Environments. [Citation Graph (0, 0)][DBLP]
    PARA, 2004, pp:974-982 [Conf]
  13. Dongwon Jeong, Young-Gab Kim, Soo-Hyun Park, Doo-Kwon Baik
    Uniformly Handling Metadata Registries. [Citation Graph (0, 0)][DBLP]
    SERA, 2004, pp:81-91 [Conf]
  14. Jin-Woo Kim, Young-Gab Kim, JuHum Kwon, Sung-Ho Hong, Chee-Yang Song, Doo-Kwon Baik
    An enterprise architecture framework based on a common information technology domain (EAFIT) for improving interoperability among heterogeneous information systems. [Citation Graph (0, 0)][DBLP]
    SERA, 2005, pp:198-205 [Conf]
  15. Young-Gab Kim, Jin-Woo Kim, Sung-Ook Shin, Doo-Kwon Baik
    Managing Variability for Software Product-Line. [Citation Graph (0, 0)][DBLP]
    SERA, 2006, pp:74-81 [Conf]
  16. Young-Gab Kim, Dongwon Jeong, Doo-Kwon Baik
    Verifying a MAC-Based Service Bundle Authentication Mechanism for the OSGi Service Platform. [Citation Graph (0, 0)][DBLP]
    WAIM, 2004, pp:684-689 [Conf]
  17. Dongwon Jeong, Young-Gab Kim, Doo-Kwon Baik
    SQL/MDR: Query Language for Consistent Access of Metadata Registries Based on SQL3. [Citation Graph (0, 0)][DBLP]
    WAIM, 2004, pp:239-248 [Conf]
  18. Dongwon Jeong, Young-Gab Kim, Soo-Hyun Park
    An Integrity Checking Mechanism of Mobile Agents under a Closed Environment with Trusted Hosts. [Citation Graph (0, 0)][DBLP]
    International Journal of Software Engineering and Knowledge Engineering, 2006, v:16, n:1, pp:141-151 [Journal]
  19. Young-Gab Kim, Chang-Joo Moon, Dongwon Jeong, Doo-Kwon Baik
    Formal Verification of Bundle Authentication Mechanism in Osgi Service Platform: Ban Logic. [Citation Graph (0, 0)][DBLP]
    International Journal of Software Engineering and Knowledge Engineering, 2006, v:16, n:2, pp:153-174 [Journal]
  20. Jin-Woo Kim, JuHum Kwon, Young-Gab Kim, Chee-Yang Song, Hyun Seok Kim, Doo-Kwon Baik
    EAFoC: Enterprise Architecture Framework Based on Commonality. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2006, v:21, n:6, pp:952-964 [Journal]
  21. Young-Gab Kim, Dongwon Jeong, Soo-Hyun Park, Jongin Lim, Doo-Kwon Baik
    Modeling and Simulation for Security Risk Propagation in Critical Information Systems. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:858-868 [Conf]
  22. Young-Gab Kim, Jongin Lim
    Quantitative Risk Analysis and Evaluation in Information Systems: A Case Study. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (3), 2007, pp:1040-1047 [Conf]
  23. Young-Gab Kim, Jongin Lim
    HMM-Based Approach for Evaluating Risk Propagation. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:325-326 [Conf]

  24. Method for Evaluating the Security Risk of a Website Against Phishing Attacks. [Citation Graph (, )][DBLP]


  25. Embedded System Architecture for an FMC Mobile Handset. [Citation Graph (, )][DBLP]


Search in 0.055secs, Finished in 0.057secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002