Chang-Joo Moon
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Bibliography
2022
Motion Estimation and Hand Gesture Recognition-Based Human-UAV Interaction Approach in Real Time.
Sensors, 2022
2013
IEICE Trans. Inf. Syst., 2013
Database Security System for Applying Sophisticated Access Control via Database Firewall Server.
Comput. Informatics, 2013
2010
IEEE Trans. Consumer Electron., 2010
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2010
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010
2009
User Privacy Enhanced Access Control Model in Social Network Environment.
Proceedings of the 2009 International Conference on Semantic Web & Web Services, 2009
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009
An anonymous communication model for privacy-enhanced location based service using an echo agent.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009
A Database Firewall Server Using Data Masking.
Proceedings of the 2009 International Conference on Security & Management, 2009
2008
Home gateway operating model using reference monitor for enhanced user comfort and privacy.
IEEE Trans. Consumer Electron., 2008
2007
Visual modeling and formal specification of constraints of RBAC using semantic web technology.
Knowl. Based Syst., 2007
Proceedings of the Selected Papers of the Fifth International Conference on, 2007
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007
2006
J. Intell. Inf. Syst., 2006
Formal Verification of Bundle Authentication Mechanism in Osgi Service Platform: Ban Logic.
Int. J. Softw. Eng. Knowl. Eng., 2006
An Effective Policy Management Framework Using RBAC model for Service Platform based on Components.
Proceedings of the Fourth International Conference on Software Engineering, 2006
Proceedings of the Information Networking, 2006
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006
2005
Bridging Real World Semantics to Model World Semantics for Taxonomy Based Knowledge Representation System.
J. Comput. Sci. Technol., 2005
The Conflict Detection Between Permission Assignment Constraints in Role-Based Access Control.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005
Proceedings of the Advances in Web Intelligence Third International Atlantic Web IntelligenceConference, 2005
Bundle Authentication and Authorization Using XML Security in the OSGi Service Platform.
Proceedings of the 4th Annual ACIS International Conference on Computer and Information Science (ICIS 2005), 2005
2004
Symmetric RBAC model that takes the separation of duty and role hierarchies into consideration.
Comput. Secur., 2004
Inconsistency Detection of Authorization Policies in Distributed Component Environment.
Proceedings of the Information Security Applications, 5th International Workshop, 2004
Proceedings of the Database Systems for Advances Applications, 2004
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004
Proceedings of the Systems Modeling and Simulation: Theory and Applications, 2004
Proceedings of the Systems Modeling and Simulation: Theory and Applications, 2004
Proceedings of the Systems Modeling and Simulation: Theory and Applications, 2004
Proceedings of the Artificial Intelligence and Simulation, 2004
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004