default search action
Somchart Fugkeaw
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Somchart Fugkeaw, Lyhour Hak, Thanaruk Theeramunkong:
Achieving Secure, Verifiable, and Efficient Boolean Keyword Searchable Encryption for Cloud Data Warehouse. IEEE Access 12: 49848-49864 (2024) - [j18]Somchart Fugkeaw, Lyhour Hak:
PPAC-CDW: A Privacy-Preserving Access Control Scheme With Fast OLAP Query and Efficient Revocation for Cloud Data Warehouse. IEEE Access 12: 78743-78758 (2024) - [j17]Somchart Fugkeaw, Rohan Prasad Gupta, Khanadech Worapaluk:
Secure and Fine-Grained Access Control With Optimized Revocation for Outsourced IoT EHRs With Adaptive Load-Sharing in Fog-Assisted Cloud Environment. IEEE Access 12: 82753-82768 (2024) - [j16]Somchart Fugkeaw, Sorravich Rattagool, Pawat Jiangthiranan, Peerawichaya Pholwiset:
FPRESSO: Fast and Privacy-Preserving SSO Authentication With Dynamic Load Balancing for Multi-Cloud-Based Web Applications. IEEE Access 12: 157888-157900 (2024) - [j15]Somchart Fugkeaw, Phatwasin Suksai, Lyhour Hak:
SSF-CDW: achieving scalable, secure, and fast OLAP query for encrypted cloud data warehouse. J. Cloud Comput. 13(1): 129 (2024) - [c47]Jakkarin Lapmoon, Thunpisit Kosolsriwiwat, Sirinyaporn Jiraporn, Somchart Fugkeaw:
Enabling Dynamic Vulnerability Assessment for Multi-web Application Using Executable Directed Acyclic Graph. AINA (2) 2024: 9-21 - [c46]Teeramaet Bongkodmalee, Supasake Vongvipaporn, Preravitch Siripanich, Somchart Fugkeaw, Chalee Vorakulpipat:
A Design and Development of Web Application Vulnerability Detection Using Graph-Based Modeling Analysis Over CAPEC. JCSSE 2024: 28-34 - [c45]Rohan Prasad Gupta, Chalee Vorakulpipat, Somchart Fugkeaw, Apichon Witayangkurn:
A Scalable and Secure Outsourced IoT Electronic Health Records with Efficient User Revocation Using Fog-Assisted Cloud Model. JCSSE 2024: 61-67 - [c44]Thean Thepa, Pongsapon Ateetanan, Pratuck Khubpatiwitthayakul, Somchart Fugkeaw:
Design and Development of Scalable SIEM as a Service using Spark and Anomaly Detection. JCSSE 2024: 199-205 - [c43]Thean Thepa, Bhodhikorn Tulyatham, Pimchanok Sirisatit, Somchart Fugkeaw:
A Cloud-Based SQLi Detection System Using Multi-Layer Regular Expression. KST 2024: 6-11 - [c42]Phutthachat Kanjanamek, Nuttakarn Chaiyabud, Natsareeya Kitikhungumjon, Somchart Fugkeaw:
An Adaptive Cloud-Based Image Steganography System with Fast Stego Retrieval. KST 2024: 29-34 - [c41]Panipak Wongbubpha, Pavida Malitong, Napathsara Pinthong, Somchart Fugkeaw:
Enabling Efficient Cloud-Based Data Collection System for Smart Home IoT Data Using Data Binning and Lossless Compression. KST 2024: 132-137 - [c40]Pichapa Vanpech, Kanchicha Peerabenjakul, Napatsawan Suriwong, Somchart Fugkeaw:
Detecting Cyberbullying on Social Networks Using Language Learning Model. KST 2024: 161-166 - [c39]Lyhour Hak, Somchart Fugkeaw, Hiroyuki Sato:
LSAC: A Lightweight, Scalable, and Anonymous Cross-Domain Authentication Scheme in IoMT. MobileCloud 2024: 8-15 - 2023
- [j14]Somchart Fugkeaw:
Achieving Decentralized and Dynamic SSO-Identity Access Management System for Multi-Application Outsourced in Cloud. IEEE Access 11: 25480-25491 (2023) - [j13]Somchart Fugkeaw, Leon Wirz, Lyhour Hak:
Secure and Lightweight Blockchain-Enabled Access Control for Fog-Assisted IoT Cloud Based Electronic Medical Records Sharing. IEEE Access 11: 62998-63012 (2023) - [j12]Pattavee Sanchol, Somchart Fugkeaw:
A Fully Outsourced Attribute-Based Signcryption Scheme Supporting Privacy-Preserving Policy Update in Mobile Cloud Computing. IEEE Access 11: 145915-145930 (2023) - [j11]Somchart Fugkeaw:
An efficient and scalable vaccine passport verification system based on ciphertext policy attribute-based encryption and blockchain. J. Cloud Comput. 12(1): 111 (2023) - [j10]Somchart Fugkeaw:
Secure Data Sharing With Efficient Key Update for Industrial Cloud-Based Access Control. IEEE Trans. Serv. Comput. 16(1): 575-587 (2023) - [c38]Somchart Fugkeaw:
Implementing An Outsourced Dual-Proxy Signing and Decryption Scheme in Mobile Cloud Computing. IPDPS Workshops 2023: 299-307 - [c37]Tanakrit Jaichuen, Nanthaphop Ren, Pichai Wongapinya, Somchart Fugkeaw:
BLUR & TRACK: Real-time Face Detection with Immediate Blurring and Efficient Tracking. JCSSE 2023: 167-172 - [c36]Khanadech Worapaluk, Somchart Fugkeaw:
An Efficiently Revocable Cloud-based Access Control Using Proxy Re-encryption and Blockchain. JCSSE 2023: 178-183 - [c35]Somchart Fugkeaw, Narongsak Moolkaew, Theerapat Wiwattanapornpanit, Thanyathon Saengsena, Pattavee Sanchol:
A Resilient Cloud-based DDoS Attack Detection and Prevention System. JCSSE 2023: 184-189 - [c34]Somchart Fugkeaw, Narinthorn Chinvorarat, Nutchanon Charnwutiwong, Korn Chaisuwan, Worapas Pruktipinyopap:
A Dynamic and Efficient Crypto-Steganography System for Securing Multiple Files in Cloud. KST 2023: 1-5 - [c33]Somchart Fugkeaw, Lyhour Hak, Nutsuda Ploysopond, Witchaya Apichonkit, Sirapop Lahankaew:
LightPEN: Optimizing the Vulnerability Exposures for Lightweight Penetration Test. KST 2023: 1-5 - [c32]Somchart Fugkeaw, Intanont Langsanam, Hasatorn Saviphan:
Design and Implementation of Fast and Secure SSO Authentication for Multi-Application Services Deployed in Cloud. KST 2023: 1-6 - [c31]Somchart Fugkeaw, Leon Wirz, Lyhour Hak:
An Efficient Medical Records Access Control with Auditable Outsourced Encryption and Decryption. KST 2023: 1-6 - [c30]Tanasart Phuangtong, Nitipoom Jaroonchaipipat, Nontawat Thanundonsuk, Parich Sakda, Somchart Fugkeaw:
RANDES: A Ransomware Detection System based on Machine Learning. KST 2023: 1-6 - [c29]Leon Wirz, Asipan Ketphet, Nattapol Chiewnawintawat, Rinrada Tanthanathewin, Somchart Fugkeaw:
OWADIS: Rapid Discovery of OWASP10 Vulnerability based on Hybrid IDS. KST 2023: 1-6 - 2022
- [j9]Somchart Fugkeaw:
Enabling Trust and Privacy-Preserving e-KYC System Using Blockchain. IEEE Access 10: 49028-49039 (2022) - [j8]Somchart Fugkeaw, Pattavee Sanchol:
A Review on Data Access Control Schemes in Mobile Cloud Computing: State-of-the-Art Solutions and Research Directions. SN Comput. Sci. 3(1): 42 (2022) - [c28]Leon Wirz, Rinrada Tanthanathewin, Asipan Ketphet, Somchart Fugkeaw:
Design and Development of A Cloud-Based IDS using Apache Kafka and Spark Streaming. JCSSE 2022: 1-6 - [c27]Kankanok Vimala, Somchart Fugkeaw:
VAPE-BRIDGE: Bridging OpenVAS Results for Automating Metasploit Framework. KST 2022: 69-74 - [c26]Pattavee Sanchol, Somchart Fugkeaw, Hiroyuki Sato:
A Mobile Cloud-based Access Control with Efficiently Outsourced Decryption. MobileCloud 2022: 1-8 - 2021
- [j7]Somchart Fugkeaw:
A Fine-Grained and Lightweight Data Access Control Model for Mobile Cloud Computing. IEEE Access 9: 836-848 (2021) - [j6]Somchart Fugkeaw:
A Lightweight Policy Update Scheme for Outsourced Personal Health Records Sharing. IEEE Access 9: 54862-54871 (2021) - [c25]Somchart Fugkeaw, Pattavee Sanchol:
Proxy-Assisted Digital Signing Scheme for Mobile Cloud Computing. KST 2021: 78-83 - [c24]Somchart Fugkeaw, Ananya Chaturasrivilai, Pitchayapa Tasungnoen, Weerapat Techaudomthaworn:
AP2I: Adaptive PII Scanning and Consent Discovery System. KST 2021: 231-236 - [c23]Somchart Fugkeaw, Nichakorn Kuasomboon, Pathitta Panakitkul:
DBIM: An Efficient and Resilient PII Data Breach Incident Management System. KST 2021: 237-242 - [c22]Somchart Fugkeaw:
WorkTrue: An Efficient and Secure Cloud-based Workflow Management System. PDP 2021: 285-290
2010 – 2019
- 2018
- [j5]Somchart Fugkeaw, Hiroyuki Sato:
Scalable and secure access control policy update for outsourced big data. Future Gener. Comput. Syst. 79: 364-373 (2018) - [c21]Somchart Fugkeaw, Hiroyuki Sato:
Enabling Dynamic and Efficient Data Access Control in Cloud Computing Based on Attribute Certificate Management and CP-ABE. PDP 2018: 454-461 - 2017
- [j4]Somchart Fugkeaw, Hiroyuki Sato:
Achieving Scalable and Optimized Attribute Revocation in Cloud Computing. IEICE Trans. Inf. Syst. 100-D(5): 973-983 (2017) - [c20]Somchart Fugkeaw, Hiroyuki Sato:
Enforcing Hidden Access Policy for Supporting Write Access in Cloud Storage Systems. CLOSER 2017: 530-536 - 2016
- [j3]Somchart Fugkeaw, Hiroyuki Sato:
Embedding lightweight proxy re-encryption for efficient attribute revocation in cloud computing. Int. J. High Perform. Comput. Netw. 9(4): 299-309 (2016) - [c19]Somchart Fugkeaw, Hiroyuki Sato:
Improved Lightweight Proxy Re-encryption for Flexible and Scalable Mobile Revocation Management in Cloud Computing. CLOUD 2016: 894-899 - [c18]Somchart Fugkeaw, Hiroyuki Sato:
Key Update as a Service (KAAS): An Agent-Based Modeling for Cloud-Based Access Control. BigData Congress 2016: 430-437 - [c17]Somchart Fugkeaw, Hiroyuki Sato:
Updating Policies in CP-ABE-Based Access Control: An Optimized and Secure Service. ESOCC 2016: 3-17 - 2015
- [c16]Somchart Fugkeaw, Hiroyuki Sato:
Enabling Constraints and Dynamic Preventive Access Control Policy Enforcement in the Cloud. ARES 2015: 576-583 - [c15]Somchart Fugkeaw, Hiroyuki Sato:
An Extended CP-ABE Based Access Control Model for Data Outsourced in the Cloud. COMPSAC Workshops 2015: 73-78 - [c14]Somchart Fugkeaw, Hiroyuki Sato:
CLOUD-CAT: A collaborative access control tool for data outsourced in cloud computing. ICDIM 2015: 243-248 - 2012
- [c13]Somchart Fugkeaw:
Achieving privacy and security in multi-owner data outsourcing. ICDIM 2012: 239-244 - 2010
- [p1]Somchart Fugkeaw, Jarernsri L. Mitrpanont, Piyawit Manpanpanich, Sekpon Juntapremjitt:
Developing Access Control Model of Web OLAP over Trusted and Collaborative Data Warehouses. Emergent Web Intelligence 2010: 393-413
2000 – 2009
- 2009
- [j2]Somchart Fugkeaw, Piyawit Manpanpanich:
Design and Development of the Dynamic DRBAC Model using PMI and XACML-based Authorization. J. Digit. Inf. Manag. 7(2): 63-73 (2009) - [j1]Somchart Fugkeaw, Piyawit Manpanpanich:
Data Authentication and the Corresponding Provenance Information Management. J. Digit. Inf. Manag. 7(2): 74-82 (2009) - [c12]Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt:
A-COLD: Access Control of Web OLAP over Multi-data Warehouse. ARES 2009: 469-474 - 2008
- [c11]Sekpon Juntapremjitt, Somchart Fugkeaw, Piyawit Manpanpanich:
An SSO-Capable Distributed RBAC Model with High Availability across Administrative Domain. AINA Workshops 2008: 121-126 - 2007
- [c10]Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt:
Exploiting X.509 Certificate and Multi-agent System Architecture for Role-Based Access Control and Authentication Management. CIT 2007: 733-738 - [c9]Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt:
A development of multi-SSO authentication and RBAC model in the distributed systems. ICDIM 2007: 297-302 - [c8]Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt:
A Robust Single Sign-On Model Based on Multi-Agent System and PKI. ICN 2007: 101 - [c7]Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt:
Multi-Application Authentication Based on Multi-Agent System. IMECS 2007: 1316-1321 - [c6]Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt:
Achieving DRBAC Authorization in Multi-trust Domains with MAS Architecture and PMI. PRIMA 2007: 339-348 - [c5]Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt:
AmTRUE: Authentication Management and Trusted Role-based Authorization in Multi-Application and Multi-User Environment. SECURWARE 2007: 216-221 - 2006
- [c4]Jarernsri L. Mitrpanont, Somchart Fugkeaw:
Direct Access Versioning for Multidimensional Database Schema Creation. CIT 2006: 17 - [c3]Jarernsri L. Mitrpanont, Somchart Fugkeaw:
Design and development of a multiversion OLAP application. SAC 2006: 493-497 - 2005
- [c2]Jarernsri L. Mitrpanont, Somchart Fugkeaw:
OLAP Application Development for Multiple Versions Query in Multidimensional Database Systems. CAINE 2005: 152-157 - [c1]Jarernsri L. Mitrpanont, Somchart Fugkeaw:
Multi-Version and Evolution Support for Multidimensional Database Schema. Databases and Applications 2005: 151-156
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint