Myong Kang
Myong Kang
Verified email at
Cited by
Cited by
MobiCloud: building secure cloud framework for mobile computing and communication
D Huang, X Zhang, M Kang, J Luo
2010 fifth IEEE international symposium on service oriented system …, 2010
Access control mechanisms for inter-organizational workflow
MH Kang, JS Park, JN Froscher
Proceedings of the sixth ACM symposium on Access control models and …, 2001
Security ontology for annotating resources
A Kim, J Luo, M Kang
On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE …, 2005
A pump for rapid, reliable, secure communication
MH Kang, IS Moskowitz
Proceedings of the 1st ACM Conference on Computer and Communications …, 1993
Covert channels-here to stay?
IS Moskowitz, MH Kang
Proceedings of COMPASS'94-1994 IEEE 9th Annual Conference on Computer …, 1994
Injecting RBAC to secure a web-based workflow system
GJ Ahn, R Sandhu, M Kang, J Park
Proceedings of the fifth ACM workshop on Role-based access control, 1-10, 2000
A network pump
MH Kang, IS Moskowitz, DC Lee
IEEE Transactions on Software Engineering 22 (5), 329-338, 1996
Protection of identity information in cloud computing without trusted third party
R Ranchal, B Bhargava, LB Othmane, L Lilien, A Kim, M Kang, ...
2010 29th IEEE symposium on reliable distributed systems, 368-372, 2010
Qos for service-oriented middleware
A Sheth, J Cardoso, J Miller, K Kochut, M Kang
Proceedings of the Conference on Systemics, Cybernetics and Informatics, 130-141, 2002
The pump: A decade of covert fun
MH Kang, IS Moskowitz, S Chincheck
21st Annual Computer Security Applications Conference (ACSAC'05), 7 pp.-360, 2005
Adding OWL-S support to the existing UDDI infrastructure
J Luo, B Montrose, A Kim, A Khashnobish, M Kang
2006 IEEE International Conference on Web Services (ICWS'06), 153-162, 2006
A network version of the pump
MH Kang, IS Moskowitz, DC Lee
Proceedings 1995 IEEE Symposium on Security and Privacy, 144-154, 1995
Design and assurance strategy for the NRL pump
MH Kang, AP Moore, IS Moskowitz
Proceedings 1997 High-Assurance Engineering Workshop, 64-71, 1997
DAPT 2020-constructing a benchmark dataset for advanced persistent threats
S Myneni, A Chowdhary, A Sabur, S Sengupta, G Agrawal, D Huang, ...
Deployable Machine Learning for Security Defense: First International …, 2020
Systems and methods for providing increased computer security
S Chincheck, MH Kang, IS Moskowitz, J Parsonese
US Patent 7,149,897, 2006
An analysis of the timed Z-channel
IS Moskowitz, SJ Greenwald, MH Kang
Proceedings 1996 IEEE Symposium on Security and Privacy, 2-11, 1996
A multilevel secure workflow management system
MH Kang, JN Froscher, AP Sheth, KJ Kochut, JA Miller
Advanced Information Systems Engineering: 11th International Conference …, 1999
An insecurity flow model
IS Moskowitz, MH Kang
Proceedings of the 1997 workshop on New security paradigms, 61-74, 1998
A framework for automatic web service composition
A Kim, M Kang, C Meadows, E Ioup, J Sample
Washington DC, US Naval research Lab, 2009
Determining asset criticality for cyber defense
A Kim, MH Kang
Navel Research Lab Wasington, 2011
The system can't perform the operation now. Try again later.
Articles 1–20