Myong H. Kang

According to our database1, Myong H. Kang authored at least 63 papers between 1992 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Work-in-Progress: A Hybrid Collaborative Multi Agent Decision Making Algorithm With Factored-Value Max-Plus.
Proceedings of the IEEE International Black Sea Conference on Communications and Networking, 2023

2022
Object Oriented Policy Conflict Checking Framework in Cloud Networks (OOPC).
IEEE Trans. Dependable Secur. Comput., 2022

A Scalable Real-Time Distributed Multiagent Decision Making Algorithm with Cost.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

2021
A Quad-Redundant PLC Architecture for Cyber-Resilient Industrial Control Systems.
IEEE Embed. Syst. Lett., 2021

A Scalable Real-Time Multiagent Decision Making Algorithm with Cost.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

Using Online Planning and Acting to Recover from Cyberattacks on Software-defined Networks.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
A Cybersecurity Model for Decision-Making Problems Under Uncertainty Using Game Theory.
Proceedings of the 13th International Conference on Communications, 2020

2019
Building private blockchains over public blockchains (PoP): an attribute-based access control approach.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

S3: A DFW-based Scalable Security State Analysis Framework for Large-Scale Data Center Networks.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

TRUFL: Distributed Trust Management Framework in SDN.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

SDNSOC: Object Oriented SDN Framework.
Proceedings of the SDN-NFV@CODASPY 2019, 2019

2018
SDFW: SDN-based Stateful Distributed Firewall.
CoRR, 2018

Attribute Based Encryption for Information Sharing on Tactical Mobile Networks.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Achieving Fine-Grained Access Control with Discretionary User Revocation over Cloud Data.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
ID-HABE: Incorporating ID-based Revocation, Delegation, and Authority Hierarchy into Attribute-Based Encryption.
IACR Cryptol. ePrint Arch., 2017

HIR-CP-ABE: Hierarchical Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Secure and Flexible Data Sharing.
IACR Cryptol. ePrint Arch., 2017

2016
Multiple time series fisher periodicity test for the detection of the distributed new shrew attacks.
Proceedings of the International Conference on Communications, 2016

Spectral analysis of low rate of denial of service attacks detection based on fisher and Siegel tests.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2012
Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels.
IEEE Trans. Inf. Forensics Secur., 2012

The Xenon separation VMM: Secure virtualization infrastructure for military clouds.
Proceedings of the 31st IEEE Military Communications Conference, 2012

Separation virtual machine monitors.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
Risk Based Mobile Access Control (RiBMAC) policy framework.
Proceedings of the MILCOM 2011, 2011

Application Lockbox for Mobile Device Security.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011

2010
Protection of Identity Information in Cloud Computing without Trusted Third Party.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

MobiCloud: Building Secure Cloud Framework for Mobile Computing and Communication.
Proceedings of the Fifth IEEE International Symposium on Service-Oriented System Engineering, 2010

Directed information and the NRL Network Pump.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

Security and Architectural Issues for National Security Cloud Computing.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010

Eigenvalue characterization of the capacity of discrete memoryless channels with invertible channel matrices.
Proceedings of the 44th Annual Conference on Information Sciences and Systems, 2010

2009
A Peer-to-Peer Federated Authentication System.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

2008
Re-engineering Xen internals for higher-assurance security.
Inf. Secur. Tech. Rep., 2008

2007
Security Ontology to Facilitate Web Service Description and Discovery.
J. Data Semant., 2007

An Architecture for Web Services Authentication and Authorization in a Maritime Environment.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

2006
Adding OWL-S Support to the Existing UDDI Infrastructure.
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006

2005
An Approach for Semantic Query Processing with UDDI.
Proceedings of the On the Move to Meaningful Internet Systems 2005: OTM 2005 Workshops, 2005

Security Ontology for Annotating Resources.
Proceedings of the On the Move to Meaningful Internet Systems 2005: CoopIS, 2005

The Pump: A Decade of Covert Fun.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2001
A Tool for Secure Inter-Organizational Computing.
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001

A Secure Workflow System for Dynamic Collaboration.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

Access control mechanisms for inter-organizational workflow.
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001

Randomly roving agents for intrusion detection.
Proceedings of the Database and Application Security XV, 2001

2000
A Framework for Secure Enterprise Computing.
Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2000), 2000

Injecting RBAC to secure a Web-based workflow system.
Proceedings of the Fifth ACM Workshop on Role-Based Access Control, 2000

1999
A Strategy for an MLS Workflow Management System.
Proceedings of the Research Advances in Database and Information Systems Security, 1999

A Multilevel Secure Workflow Management System.
Proceedings of the Advanced Information Systems Engineering, 1999

Tools to Support Secure Enterprise Computing.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

1998
An Analysis of the Timed Z-Channel.
IEEE Trans. Inf. Theory, 1998

Design and Assurance Strategy for the NRL Pump.
Computer, 1998

Towards an Infrastructure for MLS Distributed Computing.
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998

1997
An insecurity flow model.
Proceedings of the 1997 Workshop on New Security Paradigms, 1997

An Architecture for Multilevel Secure Interoperability.
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997

1996
A Network Pump.
IEEE Trans. Software Eng., 1996

A framework for MLS interoperability.
Proceedings of the 1st High-Assurance Systems Engineering Workshop (HASE '96), 1996

A Case Study Of Two Nrl Pump Prototypes.
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996

1995
A network version of the Pump.
Proceedings of the 1995 IEEE Symposium on Security and Privacy, 1995

The Modulated-Input Modulated-Output Model.
Proceedings of the Database Security IX: Status and Prospects, 1995

1994
Multiple-Query Optimization at Algorithm-Level.
Data Knowl. Eng., 1994

The SINTRA Data Model: Structure and Operations.
Proceedings of the Database Security, 1994

Architectural impact on performance of a multilevel database system.
Proceedings of the 10th Annual Computer Security Applications Conference, 1994

A practical approach to high assurance multilevel secure computing service.
Proceedings of the 10th Annual Computer Security Applications Conference, 1994

1993
Using Object Modeling Techniques to Design MLS Data Models.
Proceedings of the Security for Object-Oriented Systems, 1993

Maintaining Multilevel Transaction Atomicity in MLS Database Systems with Replicated Architecture.
Proceedings of the Database Security, 1993

A Pump for Rapid, Reliable, Secure Communication.
Proceedings of the CCS '93, 1993

1992
A Practical Transaction Model and Untrusted Transaction Manager for a Multilevel-Secure Database System.
Proceedings of the Database Security, 1992


  Loading...