MobiCloud: building secure cloud framework for mobile computing and communication D Huang, X Zhang, M Kang, J Luo 2010 fifth IEEE international symposium on service oriented system …, 2010 | 295 | 2010 |
Access control mechanisms for inter-organizational workflow MH Kang, JS Park, JN Froscher Proceedings of the sixth ACM symposium on Access control models and …, 2001 | 283 | 2001 |
Security ontology for annotating resources A Kim, J Luo, M Kang On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE …, 2005 | 240 | 2005 |
A pump for rapid, reliable, secure communication MH Kang, IS Moskowitz Proceedings of the 1st ACM Conference on Computer and Communications …, 1993 | 225 | 1993 |
Covert channels-here to stay? IS Moskowitz, MH Kang Proceedings of COMPASS'94-1994 IEEE 9th Annual Conference on Computer …, 1994 | 218 | 1994 |
Injecting RBAC to secure a web-based workflow system GJ Ahn, R Sandhu, M Kang, J Park Proceedings of the fifth ACM workshop on Role-based access control, 1-10, 2000 | 169 | 2000 |
A network pump MH Kang, IS Moskowitz, DC Lee IEEE Transactions on Software Engineering 22 (5), 329-338, 1996 | 156 | 1996 |
Protection of identity information in cloud computing without trusted third party R Ranchal, B Bhargava, LB Othmane, L Lilien, A Kim, M Kang, ... 2010 29th IEEE symposium on reliable distributed systems, 368-372, 2010 | 141 | 2010 |
Qos for service-oriented middleware A Sheth, J Cardoso, J Miller, K Kochut, M Kang Proceedings of the Conference on Systemics, Cybernetics and Informatics, 130-141, 2002 | 126 | 2002 |
The pump: A decade of covert fun MH Kang, IS Moskowitz, S Chincheck 21st Annual Computer Security Applications Conference (ACSAC'05), 7 pp.-360, 2005 | 105 | 2005 |
Adding OWL-S support to the existing UDDI infrastructure J Luo, B Montrose, A Kim, A Khashnobish, M Kang 2006 IEEE International Conference on Web Services (ICWS'06), 153-162, 2006 | 81 | 2006 |
DAPT 2020-constructing a benchmark dataset for advanced persistent threats S Myneni, A Chowdhary, A Sabur, S Sengupta, G Agrawal, D Huang, ... Deployable Machine Learning for Security Defense: First International …, 2020 | 67 | 2020 |
A network version of the pump MH Kang, IS Moskowitz, DC Lee Proceedings 1995 IEEE Symposium on Security and Privacy, 144-154, 1995 | 67 | 1995 |
Design and assurance strategy for the NRL pump MH Kang, AP Moore, IS Moskowitz Proceedings 1997 High-Assurance Engineering Workshop, 64-71, 1997 | 64 | 1997 |
An analysis of the timed Z-channel IS Moskowitz, SJ Greenwald, MH Kang Proceedings 1996 IEEE Symposium on Security and Privacy, 2-11, 1996 | 61 | 1996 |
Systems and methods for providing increased computer security S Chincheck, MH Kang, IS Moskowitz, J Parsonese US Patent 7,149,897, 2006 | 60 | 2006 |
A multilevel secure workflow management system MH Kang, JN Froscher, AP Sheth, KJ Kochut, JA Miller Advanced Information Systems Engineering: 11th International Conference …, 1999 | 51 | 1999 |
An insecurity flow model IS Moskowitz, MH Kang Proceedings of the 1997 workshop on New security paradigms, 61-74, 1998 | 47 | 1998 |
A framework for automatic web service composition A Kim, M Kang, C Meadows, E Ioup, J Sample Washington DC, US Naval research Lab, 2009 | 43 | 2009 |
Determining asset criticality for cyber defense A Kim, MH Kang Office of Naval Research, Tech. Rep. NRL/MR/5540–11-9350, 2011 | 31 | 2011 |