Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Lightweight IEC 61850 Secure Communication Module for Microgrids

    Microgrid systems use distributed renewable energy resources to reduce dependency of traditional power systems. These energy devices are located at various places because of their characteristic and communicat...

    Yun-Sam Kim, Gunhee Lee, JungMin Kang in Advances on Broad-Band Wireless Computing,… (2017)

  2. No Access

    Chapter and Conference Paper

    Testing the Differential Impact of Structural Paths in PLS Analysis: A Bootstrap** Approach

    Researchers are often interested in examining the relative impact of PLS structural paths. As such, this paper focuses on how one assesses the impact of various antecedent constructs to a particular endogenous...

    Wynne W. Chin, Yong ** Kim, Gunhee Lee in New Perspectives in Partial Least Squares … (2013)

  3. Chapter and Conference Paper

    A Privacy-Aware Service Protocol for Ubiquitous Computing Environments

    In a ubiquitous computing environment, every service should have the characteristic of context-awareness and location information is an important factor to grasp a user’s context. Thus, location privacy is an ...

    Gunhee Lee, Song-hwa Chae, Inwhan Hwang in Emerging Directions in Embedded and Ubiqui… (2006)

  4. Chapter and Conference Paper

    An Effective Method for Location Privacy in Ubiquitous Computing

    In ubiquitous computing environment, every service should have the characteristic of context-awareness. Since physical location is important information to grasp a user’s context, the service provider should m...

    Gunhee Lee, Wonil Kim, Dong-kyoo Kim in Embedded and Ubiquitous Computing – EUC 20… (2005)

  5. No Access

    Chapter and Conference Paper

    RPS: An Extension of Reference Monitor to Prevent Race-Attacks

    Most software involves some vulnerabilities because of various potential factors such as design flaw and program bug. Among them, a faulty assumption on file access results in a side-effect as known TOCTTOU vu...

    Jongwoon Park, Gunhee Lee, Sangha Lee in Advances in Multimedia Information Process… (2005)

  6. No Access

    Chapter and Conference Paper

    An Alert Reasoning Method for Intrusion Detection System Using Attribute Oriented Induction

    The intrusion detection system (IDS) is used as one of the solutions against the Internet attack. However the IDS reports extremely many alerts as compared with the number of the real attack. Thus the operator...

    Jungtae Kim, Gunhee Lee, Jung-taek Seo in Information Networking. Convergence in Bro… (2005)

  7. No Access

    Chapter and Conference Paper

    Y-AOI: Y-Means Based Attribute Oriented Induction Identifying Root Cause for IDSs

    The attribute oriented induction (AOI) is a kind of aggregation method. By generalizing the attributes of the alert, it creates several clusters that includes a set of alerts having similar or the same cause. ...

    Jungtae Kim, Gunhee Lee, Jung-taek Seo in Fuzzy Systems and Knowledge Discovery (2005)

  8. No Access

    Chapter and Conference Paper

    Effective Web-Related Resource Security Using Distributed Role Hierarchy

    The recent trend of access control on the Web-related resource is that the service provider differentiates services according to the user’s attributes such as membership class or job position. For proper and s...

    Gunhee Lee, Wonil Kim, Dong-kyoo Kim in Advances in Web-Age Information Management (2004)

  9. No Access

    Chapter and Conference Paper

    A Novel Method to Support User’s Consent in Usage Control for Stable Trust in E-business

    In the recent Web environment, the key issue is not who can use the resource, but how to control the usage of resources. Usage control (UCON) is a consolidate solution for this problem. UCON can be applied to ...

    Gunhee Lee, Wonil Kim, Dong-kyoo Kim in Computational Science and Its Applications… (2004)

  10. No Access

    Chapter and Conference Paper

    Web Security Using Distributed Role Hierarchy

    Today the Web becomes an essential part of everyday life. In company, school, or public office, people are hooked on computers to connect to the Web. On the other hand, we begin to encounter with web security ...

    Gunhee Lee, Hong** Yeh, Wonil Kim, Dong-Kyoo Kim in Grid and Cooperative Computing (2004)