Search the dblp DataBase
HyungHyo Lee :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
YongHoon Yi , MyongJae Kim , YoungLok Lee , HyungHyo Lee , BongNam Noh Applying RBAC Providing Restricted Permission Inheritance to a Corporate Web Environment. [Citation Graph (0, 0)][DBLP ] APWeb, 2003, pp:287-292 [Conf ] JongSoon Park , YoungLok Lee , HyungHyo Lee , BongNam Noh A Role-Based Delegation Model Using Role Hierarchy Supporting Restricted Permission Inheritance. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:294-302 [Conf ] YoungLok Lee , HyungHyo Lee , Seungyong Lee , InSu Kim , BongNam Noh Development of Event Manager and Its Application in Jini Environment. [Citation Graph (0, 0)][DBLP ] EUC Workshops, 2005, pp:704-713 [Conf ] YoungLok Lee , HyungHyo Lee , Seungyong Lee , HeeMan Park , BongNam Noh The Design and Implementation of Secure Event Manager Using SPKI/SDSI Certificate. [Citation Graph (0, 0)][DBLP ] EUC Workshops, 2005, pp:490-498 [Conf ] Seungyong Lee , Yong-Min Kim , BongNam Noh , HyungHyo Lee A New Authorization Model for Workflow Management System Using the RPI-RBAC Model. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science, 2004, pp:639-643 [Conf ] Seong Ho Lee , HyungHyo Lee , BongNam Noh A Rule-Based Intrusion Alert Correlation System for Integrated Security Management. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science, 2004, pp:365-372 [Conf ] Hyang-Chang Choi , YongHoon Yi , Jae-Hyun Seo , BongNam Noh , HyungHyo Lee A Privacy Protection Model in ID Management Using Access Control. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:82-91 [Conf ] HyungHyo Lee , Seungyong Lee , BongNam Noh A New Role-Based Authorization Model in a Corporate Workflow Systems. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:701-710 [Conf ] HyungHyo Lee , BongNam Noh Design and Analysis of Role-Based Security Model in SNMPv3 for Policy-Based Security Management. [Citation Graph (0, 0)][DBLP ] ICOIN (2), 2002, pp:430-441 [Conf ] HyungHyo Lee , BongNam Noh An Integrity Enforcement Application Design and Operation Framework in Role-Based Access Control Systems: A Session-Oriented Approach. [Citation Graph (0, 0)][DBLP ] ICPP Workshops, 1999, pp:179-184 [Conf ] Jong-Youl Park , Dong-Ik Lee , HyungHyo Lee Data Protection in Mobile Agents: One-time Key-based Approach. [Citation Graph (0, 0)][DBLP ] ISADS, 2001, pp:411-418 [Conf ] HyungHyo Lee , YoungLok Lee , BongNam Noh A New Role-Based Delegation Model Using Sub-role Hierarchies. [Citation Graph (0, 0)][DBLP ] ISCIS, 2003, pp:811-818 [Conf ] Hyang-Chang Choi , Seungyong Lee , HyungHyo Lee Design and Implementation of a Policy-Based Privacy Authorization System. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:129-140 [Conf ] HyungHyo Lee , YoungLok Lee , BongNam Noh A Framework for Modeling Organization Structure in Role Engineering. [Citation Graph (0, 0)][DBLP ] PARA, 2004, pp:1017-1024 [Conf ] InSu Kim , HeeMan Park , BongNam Noh , YoungLok Lee , Seungyong Lee , HyungHyo Lee Design and Implementation of Context-Awareness Simulation Toolkit for Context learning. [Citation Graph (0, 0)][DBLP ] SUTC (2), 2006, pp:96-103 [Conf ] Seungyong Lee , YoungLok Lee , HyungHyo Lee Jini-Based Ubiquitous Computing Middleware Supporting Event and Context Management Services. [Citation Graph (0, 0)][DBLP ] UIC, 2006, pp:786-795 [Conf ] InSu Kim , HeeMan Park , BongNam Noh , YoungLok Lee , Seungyong Lee , HyungHyo Lee Context-Awareness Simulation Toolkit - A Study on Secure Context-Based Learning in Ubiquitous Computing. [Citation Graph (0, 0)][DBLP ] WEBIST (1), 2006, pp:190-198 [Conf ] Taeyeon Kim , HeeMan Park , HyungHyo Lee A Secure Pairwise Key Establishment Scheme in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] UIC, 2007, pp:1243-1252 [Conf ] Design of an event system adopting ontology-based event model for ubiquitous environment. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.002secs