Seog Park

Orcid: 0000-0002-4049-7950

According to our database1, Seog Park authored at least 105 papers between 1989 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Nearly most influential location selection with differentially private user locations in a road network.
J. Supercomput., 2022

2021
Correction to: Efficient methods for finding an optimal network location for travel planning.
J. Supercomput., 2021

Efficient methods for finding an optimal network location for travel planning.
J. Supercomput., 2021

2020
Sparsity Reduction Technique Using Grouping Method for Matrix Factorization in Differentially Private Recommendation Systems.
IEICE Trans. Inf. Syst., 2020

Maximum Influential Location Selection With Differentially Private User Locations.
IEEE Access, 2020

Resource Capacitated Collective Travel Planning in Spatial Databases.
IEEE Access, 2020

The Collective Trip Planning Query Processing Using G-Tree Index Structure.
Proceedings of the 2020 IEEE International Conference on Big Data and Smart Computing, 2020

2019
Reverse collective spatial keyword query processing on road networks with G-tree index structure.
Inf. Syst., 2019

PRIVATA: Differentially Private Data Market Framework using Negotiation-based Pricing Mechanism.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019

Privacy Bargaining with Fairness: Privacy-Price Negotiation System for Applying Differential Privacy in Data Market Environments.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

Predictive Query Processing Considering the Movement of Both User and Objects.
Proceedings of the IEEE International Conference on Big Data and Smart Computing, 2019

Route Recommendation with Dynamic User Preference on Road Networks.
Proceedings of the IEEE International Conference on Big Data and Smart Computing, 2019

2018
DRAKO: Differentially pRivate Algorithm to meet K-anonymity for Online portal service.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

Analysis of Behavior Patterns to Identify Nicknames of a User in Online Community.
Proceedings of the 2018 IEEE International Conference on Big Data and Smart Computing, 2018

2017
Decaying inverted quadtree: index structure for supporting spatio-temporal-keyword query processing of microblog data.
Proceedings of the Symposium on Applied Computing, 2017

Identical user tracking with behavior pattern analysis in online community.
Proceedings of the Symposium on Applied Computing, 2017

Grayscale access control: Applying differential privacy to access control for Internet of Thing environment.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2017

Collaborative caching techniques for privacy-preserving location-based services in peer-to-peer environments.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

A noise parameter configuration technique to mitigate detour inference attack on differential privacy.
Proceedings of the 2017 IEEE International Conference on Big Data and Smart Computing, 2017

2015
Efficient authorization conflict detection using graph labeling in controlling access to RDF.
Comput. Stand. Interfaces, 2015

A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems.
Comput. Math. Methods Medicine, 2015

A game theoretic approach for collaborative caching techniques in privacy preserving location-based services.
Proceedings of the 2015 International Conference on Big Data and Smart Computing, 2015

2014
A Privacy Preserving Technique to Prevent Sensitive Behavior Exposure in Semantic Location-based Service.
Proceedings of the 18th International Conference in Knowledge Based and Intelligent Information and Engineering Systems, 2014

Hiding a Needle in a Haystack: Privacy Preserving Apriori algorithm inMapReduce Framework.
Proceedings of the First International Workshop on Privacy and Secuirty of Big Data, 2014

A quality enhancement of crowdsourcing based on quality evaluation and user-level task assignment framework.
Proceedings of the International Conference on Big Data and Smart Computing, BIGCOMP 2014, 2014

2013
A Method of Pre-detecting Privacy Leak in Social Network Service Using Collaborative Filtering.
Proceedings of the Database Systems for Advanced Applications, 2013

2012
Improving Korean verb-verb morphological disambiguation using lexical knowledge from unambiguous unlabeled data and selective web counts.
Pattern Recognit. Lett., 2012

A secure application invocation mechanism in mobile phones for Near Field Communication.
Proceedings of the IEEE International Conference on Consumer Electronics, 2012

2011
Scalable and efficient web services composition based on a relational database.
J. Syst. Softw., 2011

Typing ZINC Machine with Generalized Algebraic Data Types.
IEICE Trans. Inf. Syst., 2011

Efficient access control labeling scheme for secure XML query processing.
Comput. Stand. Interfaces, 2011

2010
A Schema Based Approach to Valid XML Access Control.
J. Inf. Sci. Eng., 2010

Decomposition Optimization for Minimizing Label Overflow in Prime Number Graph Labeling.
IEICE Trans. Inf. Syst., 2010

Walk-weighted subsequence kernels for protein-protein interaction extraction.
BMC Bioinform., 2010

Lightweight Access Control for Resource Limited Clients.
Proceedings of the 4th International Conference on Multimedia and Ubiquitous Engineering, 2010

Light-Weight Access Control Scheme for XML Data.
Proceedings of the Knowledge-Based and Intelligent Information and Engineering Systems, 2010

Flexible Prime Number Labeling for Resource Limited Clients.
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

Group-Based Prime Number Labeling Scheme for XML Data.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
A New Optimistic Concurrency Control in Valid XML.
J. Inf. Sci. Eng., 2009

RDFacl: A Secure Access Control Model Based on RDF Triple.
IEICE Trans. Inf. Syst., 2009

An Optimization Technique for Multiple Continuous Multiple Joins over Data Streams.
Proceedings of the Database and Expert Systems Applications, 20th International Conference, 2009

A New Labeling Scheme without Re-labeling Using Circular Concepts for Dynamic XML Data.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009

2008
An Efficient Bottom-up Filtering of XML Messages by Exploiting the Postfix Commonality of XPath Queries.
IEICE Trans. Inf. Syst., 2008

An Introduction to Authorization Conflict Problem in RDF Access Control.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2008

Access Control Labeling Scheme for Efficient Secure XML Query Processing.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2008

Efficient Secure Labeling Method under Dynamic XML Data Streams.
Proceedings of the Advances in Information and Computer Security, 2008

An RDF triple based access authorization specification considering subsumption relationships.
Proceedings of the 24th International Conference on Data Engineering Workshops, 2008

Access Control and Labeling Scheme for Dynamic XML Data.
Proceedings of the Workshops at the Grid and Pervasive Computing Conference, 2008

Efficient labeling scheme of XML data considering update operations.
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008

2007
Flexible Selection of Wavelet Coefficients Based on the Estimation Error of Predefined Queries.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007

Flexible Selection of Wavelet Coefficients for Continuous Data Stream Reduction.
Proceedings of the Advances in Databases: Concepts, 2007

Efficient Access Control for Secure XML Query Processing in Data Streams.
Proceedings of the Critical Information Infrastructures Security, 2007

PosFilter: An Efficient Filtering Technique of XML Documents Based on Postfix Sharing.
Proceedings of the Data Management. Data, 2007

SemFilter: A Simple and Efficient Semantic Filtering of XML Messages.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007

An Efficient Detection of Conflicting Updates in Valid XML.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007

2006
An Organizational Structure-Based Administration Model for Decentralized Access Control.
J. Inf. Sci. Eng., 2006

XQuery speedup by deploying structural redundancy in mapping XML into relations.
Inf. Softw. Technol., 2006

OS-DRAM: A Delegation Administration Model in a Decentralized Enterprise Environment.
Proceedings of the Advances in Web-Age Information Management, 2006

Two Phase Filtering for XML Access Control.
Proceedings of the Secure Data Management, Third VLDB Workshop, SDM 2006, Seoul, Korea, 2006

Efficient Filtering System to accelerate XML Access Control Enforcement.
Proceedings of the 2006 International Conference on Internet Computing & Conference on Computer Games Development, 2006

An Efficient Yet Secure XML Access Control Enforcement by Safe and Correct Query Modification.
Proceedings of the Database and Expert Systems Applications, 17th International Conference, 2006

2005
Periodic Streaming Data Reduction Using Flexible Adjustment of Time Section Size.
Int. J. Data Warehous. Min., 2005

2004
S-COI : The Secure Conflicts of Interest Model for Multilevel Secure Database Systems.
Proceedings of the Database Systems for Advances Applications, 2004

Searching Proper Replications in Mapping XML into Relations.
Proceedings of the Database Systems for Advances Applications, 2004

2003
Task-role-based access control model.
Inf. Syst., 2003

An Access Control Model for the Adhocracy Organization Using RBAC.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

The Freeze algorithms for concurrency control in secure real-time database systems.
Data Knowl. Eng., 2003

Access control of XML documents considering update operations.
Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003, 2003

Xquery Speedup Using Replication in Mapping XML into Relations.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003

Performance Enhancement through Structural Redundancy in Mapping XML into Relations.
Proceedings of the Eighth International Conference on Database Systems for Advanced Applications (DASFAA '03), 2003

2002
Multiversion Locking Protocol with Freezing for Secure Real-Time Database Systems.
IEEE Trans. Knowl. Data Eng., 2002

Toward an Improved RBAC Model for the Organic Organization.
Proceedings of the 9th International Conference on Parallel and Distributed Systems, 2002

Web Document Access Control Using Two-Layered Storage Structures with RBAC Server.
Proceedings of the EurAsia-ICT 2002: Information and Communication Technology, 2002

Flexible Modification of Relational Schema by X2RMap in Storing XML into Relations.
Proceedings of the EurAsia-ICT 2002: Information and Communication Technology, 2002

2001
Storage System for Supporting More Video Streams in Video Server.
Multim. Tools Appl., 2001

An Improved Administration Method on Role-Based Access Control in the Enterprise Environment.
J. Inf. Sci. Eng., 2001

The Work Concept RBAC Model for the Access Control of the Distributed Web Server Environment.
Proceedings of the Web Intelligence: Research and Development, 2001

Implementing Web Access Control System for the Multiple Web Servers in the Same Domain Using RBAC Concept.
Proceedings of the Eigth International Conference on Parallel and Distributed Systems, 2001

Schemes for Utilizing Efficiently Disk Bandwidth and Buffer in Video Server.
Proceedings of the Eigth International Conference on Parallel and Distributed Systems, 2001

A Process of Abstracting T-RBAC Aspects from Enterprise Environment.
Proceedings of the Database Systems for Advanced Applications, Proceedings of the 7th International Conference on Database Systems for Advanced Applications (DASFAA 2001), 18-20 April 2001, 2001

Enterprise Model as a Basis of Administration on Role-Based Access Control.
Proceedings of the Third International Symposium on Cooperative Database Systems and Applications, 2001

2000
A Transaction Management Scheme with Mark in Decision Supporting Environments.
Proceedings of the WISE 2000, 2000

A concurrency control protocol for read-only transactions in real-time secure database systems.
Proceedings of the 7th International Workshop on Real-Time Computing and Applications Symposium (RTCSA 2000), 2000

Task-Role Based Access Control (T-RBAC): An Improved Access Control Model for Enterprise Environment.
Proceedings of the Database and Expert Systems Applications, 11th International Conference, 2000

An Integration Model of Role-Based Access Control and Activity Based Access Control Using Task.
Proceedings of the Data and Application Security, 2000

1999
Efficient Storage and Retrieval Scheme of Video Streams in VOD Server.
Proceedings of the Internet, Multimedia Systems and Applications, 1999

Site-Locking Protocol for Global Concurrency Control in Multidatabase Systems.
Proceedings of the 1999 International Database Engineering and Applications Symposium, 1999

Data Placement and Retrieval Policy for Serving Video Operations through Sequential Access in Video Server.
Proceedings of the Internet Applications, 5th International Computer Science Conference, 1999

Concurrency Control for Global Transaction Management in MDBSs.
Proceedings of the Database and Expert Systems Applications, 10th International Conference, 1999

Storage Server for Processing Video Transactions through Sequential Access in Multimedia DBMS.
Proceedings of the 1999 International Symposium on Database Applications in Non-Traditional Environments (DANTE '99), 1999

1998
Two Version Concurrency Control Algorithm with Query Locking for Decision Support.
Proceedings of the Advances in Database Technologies, 1998

Alternative Correctness Criteria for Multiversion Concurrency Control and its Applications in Advanced Database Systems.
Proceedings of the Ninth International Workshop on Database and Expert Systems Applications, 1998

1997
Optimistic Concurrency Control for Maintaining the Global Integrity Constraint in MDBSs.
Proceedings of the Integrity and Internal Control in Information Systems, 1997

Enhancement of Alternative Version Concurrency Control Using Dynamic Adjustment of Serialization Order.
Proceedings of the Real-Time Database and Information Systems, 1997

Alternative Correctness Criteria for Multiversion Concurrency Control and a Locking Protocol via Freezing.
Proceedings of the International Database Engineering and Applications Symposium, 1997

Priority-Driven Secure Multiversion Locking Protocol for Real-Time Secure Database Systems.
Proceedings of the Database Securty XI: Status and Prospects, 1997

1996
A multiversion locking protocol for real-time databases with multilevel security.
Proceedings of the Third International Workshop on Real-Time Computing Systems Application (RTCSA '96), October 30, 1996

Management of Fuzzy Objects with Fuzzy Attribute Values in a Fuzzy Object Oriented Data Model.
Proceedings of the Flexible Query-Answering Systems, 1996

A Process of Fuzzy Query on New Fuzzy Object Oriented Data Model.
Proceedings of the Database and Expert Systems Applications, 7th International Conference, 1996

A Fuzzy Association Algebra Based on a Fuzzy Object Oriented Data Model.
Proceedings of the COMPSAC '96, 1996

Classification of Weak Correctness Criteria for Real-Time Database Applications.
Proceedings of the COMPSAC '96, 1996

1995
A Priority-Based Scheduling Algorithm for Real-Time Databases.
J. Inf. Sci. Eng., 1995

1992
An Integrated Real-Time Locking Protocol.
Proceedings of the Eighth International Conference on Data Engineering, 1992

1991
Real-Time Database Scheduling: Design, Implementation, and Performance Evaluation.
Proceedings of the Database Systems for Advanced Applications '91, 1991

1989
An Extension of Counting Method for Efficient Processing of the Cyclic Data.
Proceedings of the International Symposium on Database Systems for Advanced Applications, 1989


  Loading...