default search action
Myong H. Kang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2022
- [j9]Ankur Chowdhary, Abdulhakim Sabur, Dijiang Huang, Myong H. Kang, James Kirby:
Object Oriented Policy Conflict Checking Framework in Cloud Networks (OOPC). IEEE Trans. Dependable Secur. Comput. 19(5): 2890-2906 (2022) - 2021
- [j8]Jim Luo, Myong H. Kang, Emmanuel Bisse, Mike Veldink, Dmitriy Okunev, Scott Kolb, Joseph G. Tylka, Arquimedes Canedo:
A Quad-Redundant PLC Architecture for Cyber-Resilient Industrial Control Systems. IEEE Embed. Syst. Lett. 13(4): 218-221 (2021) - 2012
- [j7]Siva K. Gorantla, Sachin Kadloor, Negar Kiyavash, Todd P. Coleman, Ira S. Moskowitz, Myong H. Kang:
Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels. IEEE Trans. Inf. Forensics Secur. 7(1): 64-75 (2012) - 2008
- [j6]John P. McDermott, James Kirby, Bruce E. Montrose, Travis Johnson, Myong H. Kang:
Re-engineering Xen internals for higher-assurance security. Inf. Secur. Tech. Rep. 13(1): 17-24 (2008) - 2007
- [j5]Anya Kim, Jim Luo, Myong H. Kang:
Security Ontology to Facilitate Web Service Description and Discovery. J. Data Semant. 9: 167-195 (2007) - 1998
- [j4]Myong H. Kang, Andrew P. Moore, Ira S. Moskowitz:
Design and Assurance Strategy for the NRL Pump. Computer 31(4): 56-64 (1998) - [j3]Ira S. Moskowitz, Steven J. Greenwald, Myong H. Kang:
An Analysis of the Timed Z-Channel. IEEE Trans. Inf. Theory 44(7): 3162-3168 (1998) - 1996
- [j2]Myong H. Kang, Ira S. Moskowitz, Daniel C. Lee:
A Network Pump. IEEE Trans. Software Eng. 22(5): 329-338 (1996) - 1994
- [j1]Myong H. Kang, Henry G. Dietz, Bharat K. Bhargava:
Multiple-Query Optimization at Algorithm-Level. Data Knowl. Eng. 14(1): 57-75 (1994)
Conference and Workshop Papers
- 2023
- [c52]Paul Cotae, Nii Emil Alexander Reindorf, Myong H. Kang, Alexander Velazquez:
Work-in-Progress: A Hybrid Collaborative Multi Agent Decision Making Algorithm With Factored-Value Max-Plus. BlackSeaCom 2023: 438-443 - 2022
- [c51]Paul Cotae, Myong H. Kang, Alexander Velazquez:
A Scalable Real-Time Distributed Multiagent Decision Making Algorithm with Cost. CCNC 2022: 745-746 - 2021
- [c50]Sunandita Patra, Alexander Velazquez, Myong H. Kang, Dana S. Nau:
Using Online Planning and Acting to Recover from Cyberattacks on Software-defined Networks. AAAI 2021: 15377-15384 - [c49]Paul Cotae, Myong H. Kang, Alexander Velazquez:
A Scalable Real-Time Multiagent Decision Making Algorithm with Cost. ISCC 2021: 1-6 - 2020
- [c48]Paul Cotae, Myong H. Kang, Alexander Velazquez:
A Cybersecurity Model for Decision-Making Problems Under Uncertainty Using Game Theory. COMM 2020: 15-22 - 2019
- [c47]Ankur Chowdhary, Dijiang Huang, Gail-Joon Ahn, Myong H. Kang, Anya Kim, Alexander Velazquez:
SDNSOC: Object Oriented SDN Framework. SDN-NFV@CODASPY 2019: 7-12 - [c46]Ankur Chowdhary, Dijiang Huang, Adel Alshamrani, Myong H. Kang, Anya Kim, Alexander Velazquez:
TRUFL: Distributed Trust Management Framework in SDN. ICC 2019: 1-6 - [c45]Abdulhakim Sabur, Ankur Chowdhary, Dijiang Huang, Myong H. Kang, Anya Kim, Alexander Velazquez:
S3: A DFW-based Scalable Security State Analysis Framework for Large-Scale Data Center Networks. RAID 2019: 473-485 - [c44]Dijiang Huang, Chun-Jen Chung, Qiuxiang Dong, Jim Luo, Myong H. Kang:
Building private blockchains over public blockchains (PoP): an attribute-based access control approach. SAC 2019: 355-363 - 2018
- [c43]Qiuxiang Dong, Dijiang Huang, Jim Luo, Myong H. Kang:
Achieving Fine-Grained Access Control with Discretionary User Revocation over Cloud Data. CNS 2018: 1-9 - [c42]Jim Luo, Qiuxiang Dong, Dijiang Huang, Myong H. Kang:
Attribute Based Encryption for Information Sharing on Tactical Mobile Networks. MILCOM 2018: 1-9 - 2016
- [c41]Paul Cotae, Myong H. Kang, Alexander Velazquez:
Spectral analysis of low rate of denial of service attacks detection based on fisher and Siegel tests. ICC 2016: 1-6 - [c40]Paul Cotae, Myong H. Kang, Alexander Velazquez:
Multiple time series fisher periodicity test for the detection of the distributed new shrew attacks. COMM 2016: 9-14 - 2012
- [c39]John P. McDermott, Bruce E. Montrose, Margery Li, James Kirby, Myong H. Kang:
Separation virtual machine monitors. ACSAC 2012: 419-428 - [c38]John P. McDermott, Bruce E. Montrose, Margery Li, James Kirby, Myong H. Kang:
The Xenon separation VMM: Secure virtualization infrastructure for military clouds. MILCOM 2012: 1-6 - 2011
- [c37]Jim Luo, Myong H. Kang:
Application Lockbox for Mobile Device Security. ITNG 2011: 336-341 - [c36]Jim Luo, Myong H. Kang:
Risk Based Mobile Access Control (RiBMAC) policy framework. MILCOM 2011: 1448-1453 - 2010
- [c35]Paul Cotae, Ira S. Moskowitz, Myong H. Kang:
Eigenvalue characterization of the capacity of discrete memoryless channels with invertible channel matrices. CISS 2010: 1-6 - [c34]Anya Kim, John P. McDermott, Myong H. Kang:
Security and Architectural Issues for National Security Cloud Computing. ICDCS Workshops 2010: 21-25 - [c33]Siva K. Gorantla, Sachin Kadloor, Todd P. Coleman, Negar Kiyavash, Ira S. Moskowitz, Myong H. Kang:
Directed information and the NRL Network Pump. ISITA 2010: 343-348 - [c32]Dijiang Huang, Xinwen Zhang, Myong H. Kang, Jim Luo:
MobiCloud: Building Secure Cloud Framework for Mobile Computing and Communication. SOSE 2010: 27-34 - [c31]Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othmane, Leszek Lilien, Anya Kim, Myong H. Kang, Mark Linderman:
Protection of Identity Information in Cloud Computing without Trusted Third Party. SRDS 2010: 368-372 - 2009
- [c30]Myong H. Kang, Amitabh Khashnobish:
A Peer-to-Peer Federated Authentication System. ITNG 2009: 382-387 - 2007
- [c29]Anya Kim, Amitabh Khashnobish, Myong H. Kang:
An Architecture for Web Services Authentication and Authorization in a Maritime Environment. ITNG 2007: 451-456 - 2006
- [c28]Jim Luo, Bruce E. Montrose, Anya Kim, Amitabh Khashnobish, Myong H. Kang:
Adding OWL-S Support to the Existing UDDI Infrastructure. ICWS 2006: 153-162 - 2005
- [c27]Myong H. Kang, Ira S. Moskowitz, Stanley Chincheck:
The Pump: A Decade of Covert Fun. ACSAC 2005: 352-360 - [c26]Jim Luo, Bruce E. Montrose, Myong H. Kang:
An Approach for Semantic Query Processing with UDDI. OTM Workshops 2005: 89-98 - [c25]Anya Kim, Jim Luo, Myong H. Kang:
Security Ontology for Annotating Resources. OTM Conferences (2) 2005: 1483-1499 - 2001
- [c24]Ira S. Moskowitz, Myong H. Kang, Liwu Chang, Garth E. Longdon:
Randomly roving agents for intrusion detection. DBSec 2001: 135-149 - [c23]Myong H. Kang, Joon S. Park, Judith N. Froscher:
Access control mechanisms for inter-organizational workflow. SACMAT 2001: 66-74 - [c22]Joon S. Park, Myong H. Kang, Judith N. Froscher:
A Secure Workflow System for Dynamic Collaboration. SEC 2001: 167-182 - [c21]Myong H. Kang, Judith N. Froscher:
A Tool for Secure Inter-Organizational Computing. WETICE 2001: 194-199 - 2000
- [c20]Gail-Joon Ahn, Ravi S. Sandhu, Myong H. Kang, Joon S. Park:
Injecting RBAC to secure a Web-based workflow system. ACM Workshop on Role-Based Access Control 2000: 1-10 - [c19]Myong H. Kang, Judith N. Froscher:
A Framework for Secure Enterprise Computing. WETICE 2000: 219-220 - 1999
- [c18]Myong H. Kang, Brian J. Eppinger, Judith N. Froscher:
Tools to Support Secure Enterprise Computing. ACSAC 1999: 143-152 - [c17]Myong H. Kang, Judith N. Froscher, Amit P. Sheth, Krys J. Kochut, John A. Miller:
A Multilevel Secure Workflow Management System. CAiSE 1999: 271-285 - [c16]Myong H. Kang, Judith N. Froscher, Brian J. Eppinger, Ira S. Moskowitz:
A Strategy for an MLS Workflow Management System. DBSec 1999: 161-174 - 1998
- [c15]Myong H. Kang, Judith N. Froscher, Brian J. Eppinger:
Towards an Infrastructure for MLS Distributed Computing. ACSAC 1998: 91-100 - 1997
- [c14]Myong H. Kang, Judith N. Froscher, Ira S. Moskowitz:
An Architecture for Multilevel Secure Interoperability. ACSAC 1997: 194-204 - [c13]Ira S. Moskowitz, Myong H. Kang:
An insecurity flow model. NSPW 1997: 61-74 - 1996
- [c12]Myong H. Kang, Ira S. Moskowitz, Bruce E. Montrose, James J. Parsonese:
A Case Study Of Two Nrl Pump Prototypes. ACSAC 1996: 32-43 - [c11]Myong H. Kang, Judith N. Froscher, Ira S. Moskowitz:
A framework for MLS interoperability. HASE 1996: 198-205 - [c10]Ira S. Moskowitz, Steven J. Greenwald, Myong H. Kang:
An Analysis of the Timed Z-channel. S&P 1996: 2-11 - 1995
- [c9]Ira S. Moskowitz, Myong H. Kang:
The Modulated-Input Modulated-Output Model. DBSec 1995: 61-75 - [c8]Myong H. Kang, Ira S. Moskowitz, Daniel C. Lee:
A network version of the Pump. S&P 1995: 144-154 - 1994
- [c7]Judith N. Froscher, Myong H. Kang, John P. McDermott, Oliver Costich, Carl E. Landwehr:
A practical approach to high assurance multilevel secure computing service. ACSAC 1994: 2-11 - [c6]Myong H. Kang, Judith N. Froscher, Ravi Mukkamala:
Architectural impact on performance of a multilevel database system. ACSAC 1994: 76-85 - [c5]Oliver Costich, Myong H. Kang, Judith N. Froscher:
The SINTRA Data Model: Structure and Operations. DBSec 1994: 97-110 - 1993
- [c4]Myong H. Kang, Ira S. Moskowitz:
A Pump for Rapid, Reliable, Secure Communication. CCS 1993: 119-129 - [c3]Oliver Costich, Myong H. Kang:
Maintaining Multilevel Transaction Atomicity in MLS Database Systems with Replicated Architecture. DBSec 1993: 329-355 - [c2]Myong H. Kang, Oliver Costich, Judith N. Froscher:
Using Object Modeling Techniques to Design MLS Data Models. Security for Object-Oriented Systems 1993: 203-211 - 1992
- [c1]Myong H. Kang, Oliver Costich, Judith N. Froscher:
A Practical Transaction Model and Untrusted Transaction Manager for a Multilevel-Secure Database System. DBSec 1992: 285-300
Informal and Other Publications
- 2018
- [i4]Ankur Chowdhary, Dijiang Huang, Adel Alshamrani, Abdulhakim Sabur, Myong H. Kang, Anya Kim, Alexander Velazquez:
SDFW: SDN-based Stateful Distributed Firewall. CoRR abs/1811.00634 (2018) - [i3]Ankur Chowdhary, Adel Alshamrani, Dijiang Huang, Myong H. Kang, Anya Kim, Alexander Velazquez:
TRUFL: Distributed Trust Management framework in SDN. CoRR abs/1811.00635 (2018) - 2017
- [i2]Qiuxiang Dong, Dijiang Huang, Jim Luo, Myong H. Kang:
HIR-CP-ABE: Hierarchical Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Secure and Flexible Data Sharing. IACR Cryptol. ePrint Arch. 2017: 1101 (2017) - [i1]Qiuxiang Dong, Dijiang Huang, Jim Luo, Myong H. Kang:
ID-HABE: Incorporating ID-based Revocation, Delegation, and Authority Hierarchy into Attribute-Based Encryption. IACR Cryptol. ePrint Arch. 2017: 1102 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint