Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hyung-Hyo Lee is active.

Publication


Featured researches published by Hyung-Hyo Lee.


icpp workshops on collaboration and mobile computing | 1999

An integrity enforcement application design and operation framework in role-based access control systems: A session-oriented approach

Hyung-Hyo Lee; Bong-Nam Noh

Role-based access control (RBAC) policy is being widely accepted not only as an access control policy but as a flexible permission management framework in various commercial environments. RBAC simplifies the process of security management by assigning permissions to roles not directly to individual users. As security administrators can design and manage security policies by changing the configuration of RBAC components to meet their organizations own security needs, RBAC is called policy-neutral and has ability to articulate enterprise-specific security policies. While most researches on RBAC are for defining, describing model in formal method and other important properties such as separation of duty, little work has been done on how applications should be designed and then executed in automated information systems based on RBAC security model. In this paper, we describe important, dynamic features of a session that can be used as a vehicle for building applications, and present a basic framework for session-oriented integrity enforcement application design and operation applicable to commercial environments.


INTERNATIONAL ELECTRONIC CONFERENCE ON COMPUTER SCIENCE | 2008

Secure Event Service using SPKI/SDSI Certificate in Ubiquitous

HeeMan Park; YoungLok Lee; Hyung-Hyo Lee; Bong-Nam Noh

Using an indirect event service instead of other traditional communication models has an advantage of decreasing the coupling of applications in a distributed environment and removing the need for many static dependencies. In this paper, we design and implement the secure event service for providing a secure ubiquitous computing environment. The Secure Event Service implemented in this paper enables users to perform content‐based event retrieval, and supports only eligible event consumer and event producer to publish and receive events through the secure event service. The SPKI/SDSI certificate is used for supporting authentication and authorization in the secure event service. In order to provide content‐based event retrieval, an asynchronous communication between event producers and consumers, and a disconnectedness support for mobile devices, we modify and expand the JavaSpace package.


system analysis and modeling | 2003

A Role-Based Delegation Model Using Role Hierarchy Supporting Restricted Permission Inheritance.

JongSoon Park; YoungLok Lee; Hyung-Hyo Lee; Bong-Nam Noh


Lecture Notes in Computer Science | 2006

A framework for modeling organization structure in role engineering

Hyung-Hyo Lee; YoungLok Lee; Bong-Nam Noh


information security and cryptology | 2011

Implementation of Privacy Protection Policy Language and Module For Social Network Services

Ji-Hye Kim; Hyung-Hyo Lee


international conference on web information systems and technologies | 2018

CONTEXT-AWARENESS SIMULATION TOOLKIT - A Study on Secure Context-based Learning in Ubiquitous Computing

InSu Kim; HeeMan Park; Bong-Nam Noh; YoungLok Lee; Seungyong Lee; Hyung-Hyo Lee


information security and cryptology | 2010

Integrated Privacy Protection Model based on RBAC

Hyug-Hyun Cho; HeeMan Park; YoungLok Lee; Bong-Nam Noh; Hyung-Hyo Lee


information security and cryptology | 2010

A Shortened Common Criteria Evaluation Schedule using Project Management Techniques

Soontai Park; Hyung-Hyo Lee; Bong-Nam Noh


information security and cryptology | 2006

A Policy-based Privacy Authorization System in the Internet Environment

Hyangchang Choi; HeeMan Park; Seungyong Lee; Bong-Nam Noh; Hyung-Hyo Lee


information security and cryptology | 2006

Design and implementation of Jini-based secure event service using SPKI/SDSI certificate

HeeMan Park; InSu Kim; YoungLok Lee; Hyung-Hyo Lee; Bong-Nam Noh

Collaboration


Dive into the Hyung-Hyo Lee's collaboration.

Top Co-Authors

Avatar

Bong-Nam Noh

Chonnam National University

View shared research outputs
Top Co-Authors

Avatar

YoungLok Lee

Chonnam National University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

HeeMan Park

Chonnam National University

View shared research outputs
Top Co-Authors

Avatar

Seungyong Lee

Pohang University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Hyangchang Choi

Chonnam National University

View shared research outputs
Top Co-Authors

Avatar

InSu Kim

Chonnam National University

View shared research outputs
Top Co-Authors

Avatar

Hyuk-Hwang Kim

Korea Institute for International Economic Policy

View shared research outputs
Researchain Logo
Decentralizing Knowledge