• Journal of Internet Computing and Services
    ISSN 2287 - 1136(Online) / ISSN 1598 - 0170 (Print)

Digital Library

Search: " keyword: RMI" (14)
  1. 1. A study on primary control area for information security management system (ISMS): focusing on the finance-related organizations
  2. 2. A Trusted Sharing Model for Patient Records based on Permissioned Blockchain
    Kyoung-jin Kim, Seng-phil Hong, Vol. 18, No. 6, pp. 75-84, Dec. 2017
    Keywords: Permissioned blockchain, role-based access control, Medical data
  3. 3. A Study on the Determinant Factors of the Social Capital Construction through Social Media: Focused on college students
    Byung-Hye Lee, Vol. 17, No. 2, pp. 97-108, Apr. 2016
    Keywords: Social Media, Social Capital, Determinant Factors, trust
  4. 4. A Study of Security Checks for Android Least Privilege - focusing on mobile financial services -
    Byung-chul Cho, Jin-young Choi, Vol. 17, No. 1, pp. 91-100, Feb. 2016
    Keywords: Mobile Security, android security, permissions, least privilege
  5. 5. On Frequency Separation among Radio Access Technologies in Heterogeneous Networks
  6. 6. Overview of Personal Information Protection Act in Korea
    Ilhwan Kim, Jaeho Sung, Vol. 16, No. 4, pp. 141-148, Aug. 2015
    Keywords: IT, Personal Information, Personal Information Protection Act, Right to Informational Self Determination, E Government
  7. 7. Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives
    Hong Ryeol Ryu, Moses Hong, Taekyoung Kwon, Vol. 15, No. 3, pp. 79-90, Jun. 2014
    Keywords: Phishing, Pharming, Password, authentication, Social Engineering, HCI
  8. 8. Explicating Factors explaining Self-Disclosure in the Usage of Micro-blog
  9. 9. Design and Implementation of the Interoperability method for the Remote OSGi services
    Eun-Hoe Kim, Ki-Hyun Yun, Jae-Young Choi, Vol. 12, No. 1, pp. 11-26, Feb. 2011
    Keywords: OSGI, interoperability, RMI, proxy, emote service
  10. 10. A Workflow Determinacy Decision Mechanism