Search Results - "BongNam Noh"
-
1
The algorithm to enhance the security of multi-agent in distributed computing environment
Published in 12th International Conference on Parallel and Distributed Systems - (ICPADS'06) (2006)“…The usages of public key infrastructure (PKI) in secure e-mail service, e-commerce service, client authentication service with SSL, etc. have increased…”
Get full text
Conference Proceeding -
2
An integrity enforcement application design and operation framework in role-based access control systems: A session-oriented approach
“…Role-based access control (RBAC) policy is being widely accepted not only as an access control policy but as a flexible permission management framework in…”
Get full text
Conference Proceeding -
3
A Security Coordination Model for an Inter-Organizational Information Incidents Response Supporting Forensic Process
Published in 2008 Fourth International Conference on Networked Computing and Advanced Information Management (01-09-2008)“…The high cost for information security incident response makes organizations hesitate to possess their own expert security team. Also organizations are still…”
Get full text
Conference Proceeding -
4
Trends of Biometric and Test Techniques of K-NBTC
Published in The 9th International Conference on Advanced Communication Technology (01-02-2007)“…As biometric technology spreads into a number of application areas, it is most important to promote the commercialization of the biometric system, and secure…”
Get full text
Conference Proceeding -
5
Robust bootstrapping memory analysis against anti-forensics
Published in Digital investigation (07-08-2016)“…Memory analysis is increasingly used to collect digital evidence in incident response. With the fast growth in memory analysis, however, anti-forensic…”
Get full text
Journal Article -
6
Internetworking between OSI and TCP/IP network managements with security features
Published in Proceedings of International Conference on Network Protocols (1995)“…To integrate both the OSI network and the TCP/IP internet the application gateway with powerful and flexible paradigms has been used, but micro-managements of…”
Get full text
Conference Proceeding -
7
Design of Context-Awareness Simulation Toolkit for Ubiquitous Computing
Published in 2006 IEEE International Symposium on Industrial Electronics (01-07-2006)“…The study deals with the most important elements of ubiquitous computing, that is, the toolkit to acquire, express and safely use the context information. To…”
Get full text
Conference Proceeding -
8
Design and Implementation of Context-Awareness Simulation Toolkit for Context learning
Published in IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06) (2006)“…The study deals with the most important elements of ubiquitous computing, that is, the toolkit to acquire, express and safely use the context information. To…”
Get full text
Conference Proceeding