The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

BongNam Noh: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. YongHoon Yi, MyongJae Kim, YoungLok Lee, HyungHyo Lee, BongNam Noh
    Applying RBAC Providing Restricted Permission Inheritance to a Corporate Web Environment. [Citation Graph (0, 0)][DBLP]
    APWeb, 2003, pp:287-292 [Conf]
  2. Gil-Jong Mun, Yong-Min Kim, DongKook Kim, BongNam Noh
    Improvement of Detection Ability According to Optimum Selection of Measures Based on Statistical Approach. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:254-264 [Conf]
  3. Sang-Kil Park, Jongsoo Jang, BongNam Noh
    Supporting Interoperability to Multi Intrusion Detection System in Secure Networking Framework. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:397-401 [Conf]
  4. JongSoon Park, YoungLok Lee, HyungHyo Lee, BongNam Noh
    A Role-Based Delegation Model Using Role Hierarchy Supporting Restricted Permission Inheritance. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:294-302 [Conf]
  5. YoungLok Lee, HyungHyo Lee, Seungyong Lee, InSu Kim, BongNam Noh
    Development of Event Manager and Its Application in Jini Environment. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:704-713 [Conf]
  6. YoungLok Lee, HyungHyo Lee, Seungyong Lee, HeeMan Park, BongNam Noh
    The Design and Implementation of Secure Event Manager Using SPKI/SDSI Certificate. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:490-498 [Conf]
  7. Minsoo Kim, Jae-Hyun Seo, Il-Ahn Cheong, BongNam Noh
    Auto-generation of Detection Rules with Tree Induction Algorithm. [Citation Graph (0, 0)][DBLP]
    FSKD (2), 2005, pp:160-169 [Conf]
  8. Seungyong Lee, Yong-Min Kim, BongNam Noh, HyungHyo Lee
    A New Authorization Model for Workflow Management System Using the RPI-RBAC Model. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science, 2004, pp:639-643 [Conf]
  9. Seong Ho Lee, HyungHyo Lee, BongNam Noh
    A Rule-Based Intrusion Alert Correlation System for Integrated Security Management. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science, 2004, pp:365-372 [Conf]
  10. Hyang-Chang Choi, YongHoon Yi, Jae-Hyun Seo, BongNam Noh, HyungHyo Lee
    A Privacy Protection Model in ID Management Using Access Control. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:82-91 [Conf]
  11. Jung-Sun Kim, Minsoo Kim, BongNam Noh
    A Fuzzy Expert System for Network Forensics. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:175-182 [Conf]
  12. Jung-Sun Kim, Seungyong Lee, Minsoo Kim, Jae-Hyun Seo, BongNam Noh
    A Security Architecture for Adapting Multiple Access Control Models to Operating Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (5), 2006, pp:922-931 [Conf]
  13. Minsoo Kim, Jae-Hyun Seo, Seungyong Lee, BongNam Noh, Jung-Taek Seo, Eung Ki Park, Choon Sik Park
    An Effective Method for Analyzing Intrusion Situation Through IP-Based Classification. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:225-234 [Conf]
  14. HyungHyo Lee, Seungyong Lee, BongNam Noh
    A New Role-Based Authorization Model in a Corporate Workflow Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:701-710 [Conf]
  15. Sang-Kyun Noh, Yong-Min Kim, DongKook Kim, BongNam Noh
    Network Anomaly Detection Based on Clustering of Sequence Patterns. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2006, pp:349-358 [Conf]
  16. Gil-Jong Mun, Yong-Min Kim, DongKook Kim, BongNam Noh
    Network Intrusion Detection Using Statistical Probability Distribution. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2006, pp:340-348 [Conf]
  17. Jun-Hyung Park, Minsoo Kim, BongNam Noh
    Detection Techniques for ELF Executable File Using Assembly Instruction Searching. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:230-237 [Conf]
  18. Taeyeon Kim, BongNam Noh
    Internetworking between OSI and TCP/IP network managements with security features. [Citation Graph (0, 0)][DBLP]
    ICNP, 1995, pp:278-285 [Conf]
  19. Il-Ahn Cheong, Yong-Min Kim, Minsoo Kim, BongNam Noh
    The Causality Analysis of Protocol Measures for Detection of Attacks Based on Network. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2004, pp:962-972 [Conf]
  20. HyungHyo Lee, BongNam Noh
    Design and Analysis of Role-Based Security Model in SNMPv3 for Policy-Based Security Management. [Citation Graph (0, 0)][DBLP]
    ICOIN (2), 2002, pp:430-441 [Conf]
  21. Haeryong Park, Hak Soo Ju, Kilsoo Chun, Jaeil Lee, Seungho Ahn, BongNam Noh
    The Algorithm to Enhance the Security of Multi-Agent in Distributed Computing Environment. [Citation Graph (0, 0)][DBLP]
    ICPADS (2), 2006, pp:55-60 [Conf]
  22. HyungHyo Lee, BongNam Noh
    An Integrity Enforcement Application Design and Operation Framework in Role-Based Access Control Systems: A Session-Oriented Approach. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 1999, pp:179-184 [Conf]
  23. Jun-Hyung Park, Minsoo Kim, BongNam Noh, James B. D. Joshi
    A similarity based technique for detecting malicious executable files for computer forensics. [Citation Graph (0, 0)][DBLP]
    IRI, 2006, pp:188-193 [Conf]
  24. HyungHyo Lee, YoungLok Lee, BongNam Noh
    A New Role-Based Delegation Model Using Sub-role Hierarchies. [Citation Graph (0, 0)][DBLP]
    ISCIS, 2003, pp:811-818 [Conf]
  25. HyungHyo Lee, YoungLok Lee, BongNam Noh
    A Framework for Modeling Organization Structure in Role Engineering. [Citation Graph (0, 0)][DBLP]
    PARA, 2004, pp:1017-1024 [Conf]
  26. InSu Kim, HeeMan Park, BongNam Noh, YoungLok Lee, Seungyong Lee, HyungHyo Lee
    Design and Implementation of Context-Awareness Simulation Toolkit for Context learning. [Citation Graph (0, 0)][DBLP]
    SUTC (2), 2006, pp:96-103 [Conf]
  27. InSu Kim, HeeMan Park, BongNam Noh, YoungLok Lee, Seungyong Lee, HyungHyo Lee
    Context-Awareness Simulation Toolkit - A Study on Secure Context-Based Learning in Ubiquitous Computing. [Citation Graph (0, 0)][DBLP]
    WEBIST (1), 2006, pp:190-198 [Conf]

  28. Design of an event system adopting ontology-based event model for ubiquitous environment. [Citation Graph (, )][DBLP]


  29. A Security Coordination Model for an Inter-Organizational Information Incidents Response Supporting Forensic Process. [Citation Graph (, )][DBLP]


Search in 0.015secs, Finished in 0.017secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002