The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

HyungHyo Lee: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. YongHoon Yi, MyongJae Kim, YoungLok Lee, HyungHyo Lee, BongNam Noh
    Applying RBAC Providing Restricted Permission Inheritance to a Corporate Web Environment. [Citation Graph (0, 0)][DBLP]
    APWeb, 2003, pp:287-292 [Conf]
  2. JongSoon Park, YoungLok Lee, HyungHyo Lee, BongNam Noh
    A Role-Based Delegation Model Using Role Hierarchy Supporting Restricted Permission Inheritance. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:294-302 [Conf]
  3. YoungLok Lee, HyungHyo Lee, Seungyong Lee, InSu Kim, BongNam Noh
    Development of Event Manager and Its Application in Jini Environment. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:704-713 [Conf]
  4. YoungLok Lee, HyungHyo Lee, Seungyong Lee, HeeMan Park, BongNam Noh
    The Design and Implementation of Secure Event Manager Using SPKI/SDSI Certificate. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:490-498 [Conf]
  5. Seungyong Lee, Yong-Min Kim, BongNam Noh, HyungHyo Lee
    A New Authorization Model for Workflow Management System Using the RPI-RBAC Model. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science, 2004, pp:639-643 [Conf]
  6. Seong Ho Lee, HyungHyo Lee, BongNam Noh
    A Rule-Based Intrusion Alert Correlation System for Integrated Security Management. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science, 2004, pp:365-372 [Conf]
  7. Hyang-Chang Choi, YongHoon Yi, Jae-Hyun Seo, BongNam Noh, HyungHyo Lee
    A Privacy Protection Model in ID Management Using Access Control. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:82-91 [Conf]
  8. HyungHyo Lee, Seungyong Lee, BongNam Noh
    A New Role-Based Authorization Model in a Corporate Workflow Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:701-710 [Conf]
  9. HyungHyo Lee, BongNam Noh
    Design and Analysis of Role-Based Security Model in SNMPv3 for Policy-Based Security Management. [Citation Graph (0, 0)][DBLP]
    ICOIN (2), 2002, pp:430-441 [Conf]
  10. HyungHyo Lee, BongNam Noh
    An Integrity Enforcement Application Design and Operation Framework in Role-Based Access Control Systems: A Session-Oriented Approach. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 1999, pp:179-184 [Conf]
  11. Jong-Youl Park, Dong-Ik Lee, HyungHyo Lee
    Data Protection in Mobile Agents: One-time Key-based Approach. [Citation Graph (0, 0)][DBLP]
    ISADS, 2001, pp:411-418 [Conf]
  12. HyungHyo Lee, YoungLok Lee, BongNam Noh
    A New Role-Based Delegation Model Using Sub-role Hierarchies. [Citation Graph (0, 0)][DBLP]
    ISCIS, 2003, pp:811-818 [Conf]
  13. Hyang-Chang Choi, Seungyong Lee, HyungHyo Lee
    Design and Implementation of a Policy-Based Privacy Authorization System. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:129-140 [Conf]
  14. HyungHyo Lee, YoungLok Lee, BongNam Noh
    A Framework for Modeling Organization Structure in Role Engineering. [Citation Graph (0, 0)][DBLP]
    PARA, 2004, pp:1017-1024 [Conf]
  15. InSu Kim, HeeMan Park, BongNam Noh, YoungLok Lee, Seungyong Lee, HyungHyo Lee
    Design and Implementation of Context-Awareness Simulation Toolkit for Context learning. [Citation Graph (0, 0)][DBLP]
    SUTC (2), 2006, pp:96-103 [Conf]
  16. Seungyong Lee, YoungLok Lee, HyungHyo Lee
    Jini-Based Ubiquitous Computing Middleware Supporting Event and Context Management Services. [Citation Graph (0, 0)][DBLP]
    UIC, 2006, pp:786-795 [Conf]
  17. InSu Kim, HeeMan Park, BongNam Noh, YoungLok Lee, Seungyong Lee, HyungHyo Lee
    Context-Awareness Simulation Toolkit - A Study on Secure Context-Based Learning in Ubiquitous Computing. [Citation Graph (0, 0)][DBLP]
    WEBIST (1), 2006, pp:190-198 [Conf]
  18. Taeyeon Kim, HeeMan Park, HyungHyo Lee
    A Secure Pairwise Key Establishment Scheme in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    UIC, 2007, pp:1243-1252 [Conf]

  19. Design of an event system adopting ontology-based event model for ubiquitous environment. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002