Search the dblp DataBase
BongNam Noh :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
YongHoon Yi , MyongJae Kim , YoungLok Lee , HyungHyo Lee , BongNam Noh Applying RBAC Providing Restricted Permission Inheritance to a Corporate Web Environment. [Citation Graph (0, 0)][DBLP ] APWeb, 2003, pp:287-292 [Conf ] Gil-Jong Mun , Yong-Min Kim , DongKook Kim , BongNam Noh Improvement of Detection Ability According to Optimum Selection of Measures Based on Statistical Approach. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:254-264 [Conf ] Sang-Kil Park , Jongsoo Jang , BongNam Noh Supporting Interoperability to Multi Intrusion Detection System in Secure Networking Framework. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:397-401 [Conf ] JongSoon Park , YoungLok Lee , HyungHyo Lee , BongNam Noh A Role-Based Delegation Model Using Role Hierarchy Supporting Restricted Permission Inheritance. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:294-302 [Conf ] YoungLok Lee , HyungHyo Lee , Seungyong Lee , InSu Kim , BongNam Noh Development of Event Manager and Its Application in Jini Environment. [Citation Graph (0, 0)][DBLP ] EUC Workshops, 2005, pp:704-713 [Conf ] YoungLok Lee , HyungHyo Lee , Seungyong Lee , HeeMan Park , BongNam Noh The Design and Implementation of Secure Event Manager Using SPKI/SDSI Certificate. [Citation Graph (0, 0)][DBLP ] EUC Workshops, 2005, pp:490-498 [Conf ] Minsoo Kim , Jae-Hyun Seo , Il-Ahn Cheong , BongNam Noh Auto-generation of Detection Rules with Tree Induction Algorithm. [Citation Graph (0, 0)][DBLP ] FSKD (2), 2005, pp:160-169 [Conf ] Seungyong Lee , Yong-Min Kim , BongNam Noh , HyungHyo Lee A New Authorization Model for Workflow Management System Using the RPI-RBAC Model. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science, 2004, pp:639-643 [Conf ] Seong Ho Lee , HyungHyo Lee , BongNam Noh A Rule-Based Intrusion Alert Correlation System for Integrated Security Management. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science, 2004, pp:365-372 [Conf ] Hyang-Chang Choi , YongHoon Yi , Jae-Hyun Seo , BongNam Noh , HyungHyo Lee A Privacy Protection Model in ID Management Using Access Control. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:82-91 [Conf ] Jung-Sun Kim , Minsoo Kim , BongNam Noh A Fuzzy Expert System for Network Forensics. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:175-182 [Conf ] Jung-Sun Kim , Seungyong Lee , Minsoo Kim , Jae-Hyun Seo , BongNam Noh A Security Architecture for Adapting Multiple Access Control Models to Operating Systems. [Citation Graph (0, 0)][DBLP ] ICCSA (5), 2006, pp:922-931 [Conf ] Minsoo Kim , Jae-Hyun Seo , Seungyong Lee , BongNam Noh , Jung-Taek Seo , Eung Ki Park , Choon Sik Park An Effective Method for Analyzing Intrusion Situation Through IP-Based Classification. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:225-234 [Conf ] HyungHyo Lee , Seungyong Lee , BongNam Noh A New Role-Based Authorization Model in a Corporate Workflow Systems. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:701-710 [Conf ] Sang-Kyun Noh , Yong-Min Kim , DongKook Kim , BongNam Noh Network Anomaly Detection Based on Clustering of Sequence Patterns. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2006, pp:349-358 [Conf ] Gil-Jong Mun , Yong-Min Kim , DongKook Kim , BongNam Noh Network Intrusion Detection Using Statistical Probability Distribution. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2006, pp:340-348 [Conf ] Jun-Hyung Park , Minsoo Kim , BongNam Noh Detection Techniques for ELF Executable File Using Assembly Instruction Searching. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:230-237 [Conf ] Taeyeon Kim , BongNam Noh Internetworking between OSI and TCP/IP network managements with security features. [Citation Graph (0, 0)][DBLP ] ICNP, 1995, pp:278-285 [Conf ] Il-Ahn Cheong , Yong-Min Kim , Minsoo Kim , BongNam Noh The Causality Analysis of Protocol Measures for Detection of Attacks Based on Network. [Citation Graph (0, 0)][DBLP ] ICOIN, 2004, pp:962-972 [Conf ] HyungHyo Lee , BongNam Noh Design and Analysis of Role-Based Security Model in SNMPv3 for Policy-Based Security Management. [Citation Graph (0, 0)][DBLP ] ICOIN (2), 2002, pp:430-441 [Conf ] Haeryong Park , Hak Soo Ju , Kilsoo Chun , Jaeil Lee , Seungho Ahn , BongNam Noh The Algorithm to Enhance the Security of Multi-Agent in Distributed Computing Environment. [Citation Graph (0, 0)][DBLP ] ICPADS (2), 2006, pp:55-60 [Conf ] HyungHyo Lee , BongNam Noh An Integrity Enforcement Application Design and Operation Framework in Role-Based Access Control Systems: A Session-Oriented Approach. [Citation Graph (0, 0)][DBLP ] ICPP Workshops, 1999, pp:179-184 [Conf ] Jun-Hyung Park , Minsoo Kim , BongNam Noh , James B. D. Joshi A similarity based technique for detecting malicious executable files for computer forensics. [Citation Graph (0, 0)][DBLP ] IRI, 2006, pp:188-193 [Conf ] HyungHyo Lee , YoungLok Lee , BongNam Noh A New Role-Based Delegation Model Using Sub-role Hierarchies. [Citation Graph (0, 0)][DBLP ] ISCIS, 2003, pp:811-818 [Conf ] HyungHyo Lee , YoungLok Lee , BongNam Noh A Framework for Modeling Organization Structure in Role Engineering. [Citation Graph (0, 0)][DBLP ] PARA, 2004, pp:1017-1024 [Conf ] InSu Kim , HeeMan Park , BongNam Noh , YoungLok Lee , Seungyong Lee , HyungHyo Lee Design and Implementation of Context-Awareness Simulation Toolkit for Context learning. [Citation Graph (0, 0)][DBLP ] SUTC (2), 2006, pp:96-103 [Conf ] InSu Kim , HeeMan Park , BongNam Noh , YoungLok Lee , Seungyong Lee , HyungHyo Lee Context-Awareness Simulation Toolkit - A Study on Secure Context-Based Learning in Ubiquitous Computing. [Citation Graph (0, 0)][DBLP ] WEBIST (1), 2006, pp:190-198 [Conf ] Design of an event system adopting ontology-based event model for ubiquitous environment. [Citation Graph (, )][DBLP ] A Security Coordination Model for an Inter-Organizational Information Incidents Response Supporting Forensic Process. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.303secs