Seog PARK


Typing ZINC Machine with Generalized Algebraic Data Types
Kwanghoon CHOI Seog PARK 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/06/01
Vol. E94-D  No. 6  pp. 1190-1200
Type of Manuscript:  PAPER
Category: Software System
Keyword: 
type systemZINC machinegeneralized algebraic data typefunctional language
 Summary | Full Text:PDF(1MB)

Decomposition Optimization for Minimizing Label Overflow in Prime Number Graph Labeling
Jaehoon KIM Seog PARK 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/07/01
Vol. E93-D  No. 7  pp. 1889-1899
Type of Manuscript:  PAPER
Category: Dependable Computing
Keyword: 
graph labelingprime numbergraph decompositionaccess controlquery processing
 Summary | Full Text:PDF(1.1MB)

RDFacl: A Secure Access Control Model Based on RDF Triple
Jaehoon KIM Seog PARK 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/01/01
Vol. E92-D  No. 1  pp. 41-50
Type of Manuscript:  PAPER
Category: Application Information Security
Keyword: 
database securityaccess controlauthorization conflictRDF/OWL dataSemantic Web
 Summary | Full Text:PDF(1MB)

An Efficient Bottom-up Filtering of XML Messages by Exploiting the Postfix Commonality of XPath Queries
Jaehoon KIM Youngsoo KIM Seog PARK 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/08/01
Vol. E91-D  No. 8  pp. 2124-2133
Type of Manuscript:  PAPER
Category: Contents Technology and Web Information Systems
Keyword: 
XML data filteringbottom-up approachpostfix sharingnondeterministic finite automaton
 Summary | Full Text:PDF(1.2MB) | (Errata[Uploaded on September 1,2008])

An Access Control Model for the Adhocracy Organization Using RBAC
Won Bo SHIM Seog PARK 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A  No. 1  pp. 165-175
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Protocols etc.
Keyword: 
Role Based Access ControlAccess Control Modeladhocracycomputer security
 Summary | Full Text:PDF(1.3MB)