• Journal of Internet Computing and Services
    ISSN 2287 - 1136(Online) / ISSN 1598 - 0170 (Print)

Digital Library

Search: "[ keyword: access control ]" (18)
  1. 1. Design and Implementation of Smart City Data Marketplace based on oneM2M Standard IoT Platform
    SeungMyeong Jeong, Seong-yun Kim, In-Song Lee, Vol. 20, No. 6, pp. 157-166, Dec. 2019
    Keywords: oneM2M, IoT, Smart City, Data Marketplace, access control
  2. 2. A Study on the Analysis and Solutions of the Blockchain Security Issues
    Siwan Noh, Kyung-Hyune Rhee, Vol. 20, No. 4, pp. 1-11, Aug. 2019
    Keywords: Blockchain, access control, Security, Privacy
  3. 3. A Role-Based Access Control System API Supporting External Authority Interface
    Jin Ma, Hyunah Kim, Minjae Park, Vol. 19, No. 2, pp. 27-32, Apr. 2018
    Keywords: role-based access control, External Interface, Web API, Restful API
  4. 4. A Trusted Sharing Model for Patient Records based on Permissioned Blockchain
    Kyoung-jin Kim, Seng-phil Hong, Vol. 18, No. 6, pp. 75-84, Dec. 2017
    Keywords: Permissioned blockchain, role-based access control, Medical data
  5. 5. Access Control as a Service for Information Protection in Semantic Web based Smart Environment
    Isma Farah Siddiqui, Scott Uk-Jin Lee, Noorrezam Yusop, Massila Kamalrudin, Mokhtar Mohd Yusof, Safiah Sidek, Minjae Park, Hyun Ahn, Kwanghoon Pio Kim, Yousra Abdul Alsahib S.Aldeen, Mazleena Salleh, Muhammad Younas, Imran Ghani, Dayang Norhayati Abang Jawawi, Muhammad Murad Khan, Mojtaba Raeisi Nejad Dobuneh, Dayang N.A. Jawawi, Shaligram Prajapat, Ashok Sharma, Ramjeevan Singh Thakur, Noor Azeera Abdul Aziz, MohdAizainiMaarof MohdAizainiMaarof, Anazida Zainal, Mohammed HazimAlkawaz, Jung-Gyu Lee, Seung-Ryul Jeong, Do Yeon Kim, Yoosin Kim, Sang Hyun Choi, NurLiyanaSulaiman NurLiyanaSulaiman, MohdNaz'ri Mahrin, RasimahCheMohd Yusoff, Taghi Javdani Gandomani, Mina Ziaei Nafchi, Vol. 17, No. 5, pp. 9-16, Oct. 2016
    Keywords: access control, Smart Environment, Semantic web, XACML, Security requirement, security attribute, mobile application development, Data-Intensive Workflow Validation, Workflow, BPM, K-anonymity, Privacy, L-diversity, data relocation, generalization, Global Agile Development, Cloud computing, Challenges, benefits, Framework, cloud-based agile tools, Regression Testing, Prioritization, Evolutionary Algorithm, Web Application, User Session, Automatic Variable Key (AVK), cryptanalysis, Hacker, AI, genetic algorithm, swarm intelligence, cipher, Neural Network, cryptography, Artificial neural Networks (ANN), Genetic Algorithm (GA), Swarm Intelligence (SI), Features Combinations, Opinion Target Extraction, Text sentiment analysis, Conditional Random Field and Sequence Labeling Algorithm, Process Diagram, Project Monitoring, Project Management, Context Diagram, Awareness, agile practices, agile software development methodology, Agile Software Development, Agile Methods, Agile Transformation, Agile Adoption, Transition Prerequisites, Agile Transition, Grounded Theory (GT)
  6. 6. A Verifier-free Scheme for User Authentication and Access Control Using Smart Cards: Improvement of Chen-Yeh's Method
    Yong Kim, Min Gyo Chung, Vol. 14, No. 4, pp. 43-52, Aug. 2013
    Keywords: User Authentication, access control, smart card, SVA(stolen verifier attack)
  7. 7. Proxy Server Providing Multi-level Privileges for Network Cameras on the Video Surveillance System
  8. 8. Secure Knowledge Management for Prevent illegal data leakage by Internal users
  9. 9. Management of the Access Control for a WebDAV-based Collaborative System
  10. 10. Secure MAC address-based Authentication on X.509 v3 Certificate in Group Communication
    Sung-Hyuck Hong, Vol. 9, No. 4, pp. 69-78, Aug. 2008
    Keywords: Access Controls, authentication, internet security