Follow
Myong Kang
Myong Kang
Verified email at nrl.navy.mil
Title
Cited by
Cited by
Year
MobiCloud: building secure cloud framework for mobile computing and communication
D Huang, X Zhang, M Kang, J Luo
2010 fifth IEEE international symposium on service oriented system …, 2010
2872010
Access control mechanisms for inter-organizational workflow
MH Kang, JS Park, JN Froscher
Proceedings of the sixth ACM symposium on Access control models and …, 2001
2742001
Security ontology for annotating resources
A Kim, J Luo, M Kang
NAVAL RESEARCH LAB WASHINGTON DC, 2005
2342005
A pump for rapid, reliable, secure communication
MH Kang, IS Moskowitz
Proceedings of the 1st ACM Conference on Computer and Communications …, 1993
2191993
Covert channels-here to stay?
IS Moskowitz, MH Kang
Proceedings of COMPASS'94-1994 IEEE 9th Annual Conference on Computer …, 1994
2071994
Injecting RBAC to secure a web-based workflow system
GJ Ahn, R Sandhu, M Kang, J Park
Proceedings of the fifth ACM workshop on Role-based access control, 1-10, 2000
1672000
A network pump
MH Kang, IS Moskowitz, DC Lee
IEEE Transactions on Software Engineering 22 (5), 329-338, 1996
1551996
Protection of identity information in cloud computing without trusted third party
R Ranchal, B Bhargava, LB Othmane, L Lilien, A Kim, M Kang, ...
2010 29th IEEE symposium on reliable distributed systems, 368-372, 2010
1372010
Qos for service-oriented middleware
A Sheth, J Cardoso, J Miller, K Kochut, M Kang
Proceedings of the Conference on Systemics, Cybernetics and Informatics, 130-141, 2002
1262002
The pump: A decade of covert fun
MH Kang, IS Moskowitz, S Chincheck
21st Annual Computer Security Applications Conference (ACSAC'05), 7 pp.-360, 2005
1052005
Adding OWL-S support to the existing UDDI infrastructure
J Luo, B Montrose, A Kim, A Khashnobish, M Kang
2006 IEEE International Conference on Web Services (ICWS'06), 153-162, 2006
822006
A network version of the pump
MH Kang, IS Moskowitz, DC Lee
Proceedings 1995 IEEE Symposium on Security and Privacy, 144-154, 1995
671995
Design and assurance strategy for the NRL pump
MH Kang, AP Moore, IS Moskowitz
Proceedings 1997 High-Assurance Engineering Workshop, 64-71, 1997
661997
An analysis of the timed Z-channel
IS Moskowitz, SJ Greenwald, MH Kang
Proceedings 1996 IEEE Symposium on Security and Privacy, 2-11, 1996
611996
Systems and methods for providing increased computer security
S Chincheck, MH Kang, IS Moskowitz, J Parsonese
US Patent 7,149,897, 2006
592006
A multilevel secure workflow management system
MH Kang, JN Froscher, AP Sheth, KJ Kochut, JA Miller
501999
An insecurity flow model
IS Moskowitz, MH Kang
Proceedings of the 1997 workshop on New security paradigms, 61-74, 1998
441998
A framework for automatic web service composition
A Kim, M Kang, C Meadows, E Ioup, J Sample
Naval Research Lab Washington DC Center For High Assurance Computing Systems …, 2009
392009
Multiple-query optimization at algorithm-level
MH Kang, HG Dietz, B Bhargava
Data & knowledge engineering 14 (1), 57-75, 1994
321994
DAPT 2020-constructing a benchmark dataset for advanced persistent threats
S Myneni, A Chowdhary, A Sabur, S Sengupta, G Agrawal, D Huang, ...
Deployable Machine Learning for Security Defense: First International …, 2020
302020
The system can't perform the operation now. Try again later.
Articles 1–20