George Yee

Orcid: 0000-0001-6002-5101

According to our database1, George Yee authored at least 63 papers between 2002 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Hardening Systems Against Data Corruption Attacks at Design Time.
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023

2022
A Design Approach for Minimizing Data Theft.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2022

Improving the Derivation of Sound Security Metrics.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

2021
Analyzing Structural Security Posture to Evaluate System Design Decisions.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

2019
Designing Sound Security Metrics.
Int. J. Syst. Softw. Secur. Prot., 2019

Modeling and reducing the attack surface in software systems.
Proceedings of the 11th International Workshop on Modelling in Software Engineerings, 2019

Attack Surface Identification and Reduction Model Applied in Scrum.
Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services, 2019

Designing Good Security Metrics.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

2018
Removing Software Vulnerabilities During Design.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
Adding Privacy Protection to Distributed Software Systems.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Model for Reducing Risks to Private or Sensitive Data.
Proceedings of the 9th IEEE/ACM International Workshop on Modelling in Software Engineering, 2017

2010
Towards Designing E-Services that Protect Privacy.
Int. J. Secur. Softw. Eng., 2010

Automated Threat Identification for UML.
Proceedings of the SECRYPT 2010, 2010

2009
Estimating the Privacy Protection Capability of a Web Service Provider.
Int. J. Web Serv. Res., 2009

An Automatic Privacy Policy Agreement Checker for E-services.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Security Personalization for Internet and Web Services.
Int. J. Web Serv. Res., 2008

Guest Editors' Introduction.
J. Comput. Secur., 2008

Guest Editors' Introduction.
J. Comput. Secur., 2008

A Scalable Group Key Management Protocol.
IEEE Commun. Lett., 2008

Assessing the Likelihood of Privacy Policy Compliance.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

An Efficient Privacy-Preserving Data Mining Platform.
Proceedings of The 2008 International Conference on Data Mining, 2008

Cooperative Visualization of Privacy Risks.
Proceedings of the Cooperative Design, 2008

Private Data Discovery for Privacy Compliance in Collaborative Environments.
Proceedings of the Cooperative Design, 2008

2007
Privacy Rights Management: Implementation Scenarios.
Inf. Resour. Manag. J., 2007

Protect Virtual Property in Online Gaming System.
Int. J. Softw. Eng. Knowl. Eng., 2007

A privacy controller approach for privacy protection in web services.
Proceedings of the 4th ACM Workshop On Secure Web Services, 2007

Privacy management system using social networking.
Proceedings of the IEEE International Conference on Systems, 2007

Visual Analysis of Privacy Risks in Web Services.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007

Analysis of Smart Card-Based Remote User Authentication Schemes.
Proceedings of the 2007 International Conference on Security & Management, 2007

Private Data Management in Collaborative Environments.
Proceedings of the Cooperative Design, 2007

Privacy Rights Management for Privacy Compliance Systems.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Visualization for privacy compliance.
Proceedings of the 3rd International Workshop on Visualization for Computer Security, 2006

Ensuring Privacy for Buyer-Seller E-Commerce.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

A privacy-preserving UBICOMP architecture.
Proceedings of the 2006 International Conference on Privacy, 2006

Measuring Privacy Protection in Web Services.
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006

Automated Social Network Analysis for Collaborative Work.
Proceedings of the Cooperative Design, 2006

Towards Designing Secure Online Games.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

Ensuring Privacy for E-Health Services.
Proceedings of the The First International Conference on Availability, 2006

Personalized Security for E-Services.
Proceedings of the The First International Conference on Availability, 2006

2005
An analysis of online gaming crime characteristics.
Internet Res., 2005

Context-aware privacy and security agents for distance education.
Int. J. High Perform. Comput. Netw., 2005

Semiautomatic Derivation and Use of Personal Privacy Policies in E-Business.
Int. J. E Bus. Res., 2005

AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks.
Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, 2005

Standardizing the Construction of a Digital Forensics Laboratory.
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005

Specifying Personal Privacy Policies to Avoid Unexpected Outcomes.
Proceedings of the Third Annual Conference on Privacy, 2005

Online Gaming Cheating and Security Issue.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Context-Aware Security Policy Agent for Mobile Internet Services.
Proceedings of the Intelligence in Communication Systems, 2005

Negotiated Security Policies for E-Services and Web Services.
Proceedings of the 2005 IEEE International Conference on Web Services (ICWS 2005), 2005

Protection of Virtual Property in Online Gaming.
Proceedings of the 11th International Conference on Distributed Multimedia Systems, 2005

Agent-based Transactions for Home Energy Services.
Proceedings of the 11th International Conference on Distributed Multimedia Systems, 2005

Environmentally-Aware Security Enforcement (EASE) for Cooperative Design and Engineering.
Proceedings of the Cooperative Design, 2005

An Agent Architecture for e-Services Privacy Policy Compliance.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

Using Privacy Policies to Protect Privacy in UBICOMP.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

Applying Petri Nets to Model SCORM Learning Sequence Specification in Collaborative Learning.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

Applying Word Sense Disambiguation to Question Answering System for e-Learning.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
Privacy Policy Compliance for Web Services.
Proceedings of the IEEE International Conference on Web Services (ICWS'04), 2004

Multistory Annotation System: a Novel Application of Distance Learning.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

Security and Privacy Technologies for Distance Education Applications.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
Privacy and Security in E-Learning.
Int. J. Distance Educ. Technol., 2003

Bilateral E-services Negotiation Under Uncertainty.
Proceedings of the 2003 Symposium on Applications and the Internet (SAINT 2003), 27-31 January 2003, 2003

Secure Dynamic Distributed Routing Algorithm for Ad Hoc Wireless Networks.
Proceedings of the 32nd International Conference on Parallel Processing Workshops (ICPP 2003 Workshops), 2003

Future Interactions in Policy-Driven Privacy Management.
Proceedings of the Feature Interactions in Telecommunications and Software Systems VII, 2003

2002
Anonymous Communications for Mobile Agents.
Proceedings of the Mobile Agents for Telecommunication Applications, 2002


  Loading...