MobiCloud: Building Secure Cloud Framework for Mobile Computing and Communication
- Dijiang Huang, Xinwen Zhang, Myong H. Kang, Jim Luo
- Computer ScienceFifth IEEE International Symposium on Service…
- 4 June 2010
The proposed MobiCloud framework enhances the operation of the ad hoc network itself by treating mobile devices as service nodes and will enhance communication by addressing trust management, secure routing, and risk management issues in the network.
A pump for rapid, reliable, secure communication
- Myong H. Kang, I. S. Moskowitz
- Computer ScienceConference on Computer and Communications…
- 1 December 1993
By adding random delays to the acknowledgment stream, it is shown how to further reduce the covert channel capacity even in the presence of cooperating Trojan horses in both the high and low systems.
QoS for Service-Oriented Middleware
- A. Sheth, J. Cardoso, J. Miller, K. Kochut, Myong H. Kang
- Computer Science
- 2002
Adding OWL-S Support to the Existing UDDI Infrastructure
- Jim Luo, B. Montrose, Anya Kim, Amitabh Khashnobish, Myong H. Kang
- Computer ScienceIEEE International Conference on Web Services…
- 18 September 2006
This paper presents a scheme that allows users to store OWL-S service descriptions in the UDDI data model and use that information to perform semantic query processing and can integrate seamlessly into the existing service-oriented architecture (SOA) infrastructure.
Protection of Identity Information in Cloud Computing without Trusted Third Party
- R. Ranchal, B. Bhargava, M. Linderman
- Computer Science29th IEEE Symposium on Reliable Distributed…
- 31 October 2010
This work proposes an approach for IDM, which is independent of TTP and has the ability to use identity data on untrusted hosts, based on the use of predicates over encrypted data and multi-party computing for negotiating a use of a cloud service.
Security Ontology for Annotating Resources
- Anya Kim, Jim Luo, Myong H. Kang
- Computer ScienceOTM Conferences
- 31 October 2005
The NRL Security Ontology is more comprehensive and better organized than existing security ontologies, capable of representing more types of security statements and can be applied to any electronic resource.
Access control mechanisms for inter-organizational workflow
- Myong H. Kang, Joon S. Park, J. Froscher
- Computer ScienceACM Symposium on Access Control Models and…
- 1 May 2001
The requirements and solutions in this paper address the scalability of existing security solutions, the separation of inter-organizational workflow security from concrete organization level security enforcement, and the enforcement of fine-grained access control for inter- Organizational workflow.
A Network Pump
- Myong H. Kang, I. S. Moskowitz, D. Lee
- Computer ScienceIEEE Trans. Software Eng.
- 1 May 1996
This paper shows how to extend the NRL data Pump to a certain MLS network architecture in order to balance the requirements of congestion control, fairness, good performance, and reliability against those of minimal threats from covert channels and denial of service attacks.
A Framework for Event Prioritization in Cyber Network Defense
- Anya Kim, Myong H. Kang, Jim Luo, A. Velasquez
- Computer Science
- 15 July 2014
A framework to prioritize events based on the potential damage that each event can incur to important hosts and missions is developed and implemented as a flexible, extensible, customizable, and user-friendly tool called ACCEPT.
Injecting RBAC to secure a Web-based workflow system
- Gail-Joon Ahn, R. Sandhu, Myong H. Kang, Joon S. Park
- Computer ScienceACM Workshop on Role-Based Access Control
- 26 July 2000
This paper describes an experiment in injecting role-based access control (RBAC) into an existing web-based workflow system and defines a simplified RBAC model to meet the needs and describes the security architecture to be applied.
...
...