default search action
George Yee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c50]John Breton, Jason Jaskolka, George O. M. Yee:
Hardening Systems Against Data Corruption Attacks at Design Time. FPS (1) 2023: 391-407 - 2022
- [c49]George O. M. Yee:
Improving the Derivation of Sound Security Metrics. COMPSAC 2022: 1804-1809 - [c48]George O. M. Yee:
A Design Approach for Minimizing Data Theft. CSCI 2022: 983-989 - 2021
- [c47]Joe Samuel, Jason Jaskolka, George O. M. Yee:
Analyzing Structural Security Posture to Evaluate System Design Decisions. QRS 2021: 8-17
2010 – 2019
- 2019
- [j13]George O. M. Yee:
Designing Sound Security Metrics. Int. J. Syst. Softw. Secur. Prot. 10(1): 1-21 (2019) - [c46]George O. M. Yee:
Designing Good Security Metrics. COMPSAC (2) 2019: 580-585 - [c45]George O. M. Yee:
Attack Surface Identification and Reduction Model Applied in Scrum. Cyber Security 2019: 1-8 - [c44]George O. M. Yee:
Modeling and reducing the attack surface in software systems. MiSE@ICSE 2019: 55-62 - 2018
- [c43]George Yee:
Removing Software Vulnerabilities During Design. COMPSAC (2) 2018: 504-509 - 2017
- [c42]George O. M. Yee:
Model for Reducing Risks to Private or Sensitive Data. MiSE@ICSE 2017: 19-25 - [c41]George O. M. Yee:
Adding Privacy Protection to Distributed Software Systems. SECRYPT 2017: 351-358 - 2010
- [j12]George O. M. Yee:
Towards Designing E-Services that Protect Privacy. Int. J. Secur. Softw. Eng. 1(2): 18-34 (2010) - [c40]George Yee, Xingli Xie, Shikharesh Majumdar:
Automated Threat Identification for UML. SECRYPT 2010: 521-527
2000 – 2009
- 2009
- [j11]George O. M. Yee:
Estimating the Privacy Protection Capability of a Web Service Provider. Int. J. Web Serv. Res. 6(2): 20-41 (2009) - [c39]George O. M. Yee:
An Automatic Privacy Policy Agreement Checker for E-services. ARES 2009: 307-315 - 2008
- [j10]Ronggong Song, Larry Korba, George O. M. Yee:
A Scalable Group Key Management Protocol. IEEE Commun. Lett. 12(7): 541-543 (2008) - [j9]George O. M. Yee, Ali A. Ghorbani, Patrick C. K. Hung:
Guest Editors' Introduction. J. Comput. Secur. 16(2): 103-106 (2008) - [j8]George O. M. Yee, Chunming Rong, Laurence Tianruo Yang:
Guest Editors' Introduction. J. Comput. Secur. 16(3): 261-264 (2008) - [j7]George O. M. Yee, Larry Korba:
Security Personalization for Internet and Web Services. Int. J. Web Serv. Res. 5(1): 1-23 (2008) - [c38]George O. M. Yee, Larry Korba, Ronggong Song:
Cooperative Visualization of Privacy Risks. CDVE 2008: 45-53 - [c37]Larry Korba, Yunli Wang, Liqiang Geng, Ronggong Song, George Yee, Andrew S. Patrick, Scott Buffett, Hongyu Liu, Yonghua You:
Private Data Discovery for Privacy Compliance in Collaborative Environments. CDVE 2008: 142-150 - [c36]Ronggong Song, Larry Korba, George Yee:
An Efficient Privacy-Preserving Data Mining Platform. DMIN 2008: 480-486 - [c35]George O. M. Yee, Larry Korba, Ronggong Song:
Assessing the Likelihood of Privacy Policy Compliance. SEC 2008: 723-727 - 2007
- [j6]Ronggong Song, Larry Korba, George Yee, Ying-Chieh Chen:
Protect Virtual Property in Online Gaming System. Int. J. Softw. Eng. Knowl. Eng. 17(4): 483-496 (2007) - [j5]Larry Korba, Ronggong Song, George Yee:
Privacy Rights Management: Implementation Scenarios. Inf. Resour. Manag. J. 20(1): 14-27 (2007) - [c34]Ronggong Song, Larry Korba, George Yee:
Privacy Rights Management for Privacy Compliance Systems. AINA Workshops (1) 2007: 620-625 - [c33]Larry Korba, Ronggong Song, George Yee, Andrew S. Patrick, Scott Buffett, Yunli Wang, Liqiang Geng:
Private Data Management in Collaborative Environments. CDVE 2007: 88-96 - [c32]Ronggong Song, Larry Korba, George Yee:
Analysis of Smart Card-Based Remote User Authentication Schemes. Security and Management 2007: 323-329 - [c31]George Yee:
Visual Analysis of Privacy Risks in Web Services. ICWS 2007: 671-678 - [c30]Ronggong Song, Larry Korba, George Yee:
Privacy management system using social networking. SMC 2007: 3327-3332 - [c29]George O. M. Yee:
A privacy controller approach for privacy protection in web services. SWS 2007: 44-51 - 2006
- [c28]George Yee:
Personalized Security for E-Services. ARES 2006: 140-147 - [c27]George Yee, Larry Korba, Ronggong Song:
Ensuring Privacy for E-Health Services. ARES 2006: 321-328 - [c26]George Yee, Larry Korba, Ronggong Song, Ying-Chieh Chen:
Towards Designing Secure Online Games. AINA (2) 2006: 44-48 - [c25]Larry Korba, Ronggong Song, George Yee, Andrew S. Patrick:
Automated Social Network Analysis for Collaborative Work. CDVE 2006: 1-8 - [c24]George Yee:
Measuring Privacy Protection in Web Services. ICWS 2006: 647-654 - [c23]George Yee:
A privacy-preserving UBICOMP architecture. PST 2006: 27 - [c22]George Yee, Larry Korba, Ronggong Song:
Ensuring Privacy for Buyer-Seller E-Commerce. SEC 2006: 13-24 - [c21]George Yee:
Visualization for privacy compliance. VizSEC 2006: 117-122 - 2005
- [j4]George Yee, Larry Korba:
Semiautomatic Derivation and Use of Personal Privacy Policies in E-Business. Int. J. E Bus. Res. 1(1): 54-69 (2005) - [j3]George Yee, Larry Korba, Nigel H. Lin, Timothy K. Shih:
Context-aware privacy and security agents for distance education. Int. J. High Perform. Comput. Netw. 3(5/6): 395-404 (2005) - [j2]Ying-Chieh Chen, Patrick S. Chen, Jing-Jang Hwang, Larry Korba, Ronggong Song, George Yee:
An analysis of online gaming crime characteristics. Internet Res. 15(3): 246-261 (2005) - [c20]Jason C. Hung, Ching-Sheng Wang, Che-Yu Yang, Mao-Shuen Chiu, George Yee:
Applying Word Sense Disambiguation to Question Answering System for e-Learning. AINA 2005: 157-162 - [c19]Hsiau Wen Lin, Wen-Chih Chang, George Yee, Timothy K. Shih, Chun-Chia Wang, Hsuan-Che Yang:
Applying Petri Nets to Model SCORM Learning Sequence Specification in Collaborative Learning. AINA 2005: 203-208 - [c18]George Yee, Larry Korba:
An Agent Architecture for e-Services Privacy Policy Compliance. AINA 2005: 374-379 - [c17]George Yee:
Using Privacy Policies to Protect Privacy in UBICOMP. AINA 2005: 633-638 - [c16]Larry Korba, Yuefei Xu, Ronggong Song, George Yee:
Environmentally-Aware Security Enforcement (EASE) for Cooperative Design and Engineering. CDVE 2005: 140-148 - [c15]Ronggong Song, Larry Korba, George Yee, Ying-Chieh Chen:
Protection of Virtual Property in Online Gaming. DMS 2005: 119-124 - [c14]Ronggong Song, Larry Korba, George Yee:
Agent-based Transactions for Home Energy Services. DMS 2005: 367-372 - [c13]George Yee, Larry Korba:
Negotiated Security Policies for E-Services and Web Services. ICWS 2005: 605-612 - [c12]George Yee, Larry Korba:
Context-Aware Security Policy Agent for Mobile Internet Services. INTELLCOMM 2005: 249-259 - [c11]Ying-Chieh Chen, Jing-Jang Hwang, Ronggong Song, George Yee, Larry Korba:
Online Gaming Cheating and Security Issue. ITCC (1) 2005: 518-523 - [c10]George Yee, Larry Korba:
Specifying Personal Privacy Policies to Avoid Unexpected Outcomes. PST 2005 - [c9]Patrick S. Chen, Lawrence M. F. Tsai, Ying-Chieh Chen, George Yee:
Standardizing the Construction of a Digital Forensics Laboratory. SADFE 2005: 40-47 - [c8]Ronggong Song, Larry Korba, George Yee:
AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks. SASN 2005: 33-42 - 2004
- [c7]Timothy K. Shih, Yi-Chun Liao, Han-Bin Chang, Mei-Yen Kuan, George Yee:
Multistory Annotation System: a Novel Application of Distance Learning. AINA (2) 2004: 116-119 - [c6]Nigel H. Lin, Larry Korba, George Yee, Timothy K. Shih, Hsiau Wen Lin:
Security and Privacy Technologies for Distance Education Applications. AINA (1) 2004: 580-586 - [c5]George Yee, Larry Korba:
Privacy Policy Compliance for Web Services. ICWS 2004: 158-165 - 2003
- [j1]Khalil El-Khatib, Larry Korba, Yuefei Xu, George Yee:
Privacy and Security in E-Learning. Int. J. Distance Educ. Technol. 1(4): 1-19 (2003) - [c4]George Yee, Larry Korba:
Future Interactions in Policy-Driven Privacy Management. FIW 2003: 231-238 - [c3]Khalil El-Khatib, Larry Korba, Ronggong Song, George Yee:
Secure Dynamic Distributed Routing Algorithm for Ad Hoc Wireless Networks. ICPP Workshops 2003: 359-366 - [c2]George Yee, Larry Korba:
Bilateral E-services Negotiation Under Uncertainty. SAINT 2003: 352-355 - 2002
- [c1]Larry Korba, Ronggong Song, George Yee:
Anonymous Communications for Mobile Agents. MATA 2002: 171-181
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-19 00:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint