HyungHyo Lee

According to our database1, HyungHyo Lee authored at least 19 papers between 1999 and 2008.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2008
Design of an event system adopting ontology-based event model for ubiquitous environment.
Proceedings of the CSTST 2008: Proceedings of the 5th International Conference on Soft Computing as Transdisciplinary Science and Technology, 2008

2007
A Secure Pairwise Key Establishment Scheme in Wireless Ad Hoc Networks.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007

2006
Context-Awareness Simulation Toolkit - A Study on Secure Context-Based Learning in Ubiquitous Computing.
Proceedings of the WEBIST 2006, 2006

Jini-Based Ubiquitous Computing Middleware Supporting Event and Context Management Services.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

Design and Implementation of Context-Awareness Simulation Toolkit for Context learning.
Proceedings of the IEEE International Conference on Sensor Networks, 2006

Design and Implementation of a Policy-Based Privacy Authorization System.
Proceedings of the Intelligence and Security Informatics, 2006

2005
A Privacy Protection Model in ID Management Using Access Control.
Proceedings of the Computational Science and Its Applications, 2005

The Design and Implementation of Secure Event Manager Using SPKI/SDSI Certificate.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

Development of Event Manager and Its Application in Jini Environment.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

2004
A Framework for Modeling Organization Structure in Role Engineering.
Proceedings of the Applied Parallel Computing, 2004

A New Role-Based Authorization Model in a Corporate Workflow Systems.
Proceedings of the Computational Science and Its Applications, 2004

A Rule-Based Intrusion Alert Correlation System for Integrated Security Management.
Proceedings of the Computational Science, 2004

A New Authorization Model for Workflow Management System Using the RPI-RBAC Model.
Proceedings of the Computational Science, 2004

2003
A New Role-Based Delegation Model Using Sub-role Hierarchies.
Proceedings of the Computer and Information Sciences, 2003

A Role-Based Delegation Model Using Role Hierarchy Supporting Restricted Permission Inheritance.
Proceedings of the International Conference on Security and Management, 2003

Applying RBAC Providing Restricted Permission Inheritance to a Corporate Web Environment.
Proceedings of the Web Technologies and Applications, 5th Asian-Pacific Web Conference, 2003

2002
Design and Analysis of Role-Based Security Model in SNMPv3 for Policy-Based Security Management.
Proceedings of the Information Networking, 2002

2001
Data Protection in Mobile Agents: One-time Key-based Approach.
Proceedings of the Fifth International Symposium on Autonomous Decentralized Systems, 2001

1999
An Integrity Enforcement Application Design and Operation Framework in Role-Based Access Control Systems: A Session-Oriented Approach.
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999


  Loading...