• Journal of Internet Computing and Services
    ISSN 2287 - 1136(Online) / ISSN 1598 - 0170 (Print)
    http://jics.or.kr/

Digital Library


Search: " keyword: access control" (17)
  1. 1. A Study on the Analysis and Solutions of the Blockchain Security Issues
    Siwan Noh, Kyung-Hyune Rhee, Vol. 20, No. 4, pp. 1-11, Aug. 2019
    10.7472/jksii.2019.20.4.01
    Keywords: Blockchain, access control, Security, Privacy
  2. 2. A Role-Based Access Control System API Supporting External Authority Interface
    Jin Ma, Hyunah Kim, Minjae Park, Vol. 19, No. 2, pp. 27-32, Apr. 2018
    10.7472/jksii.2018.19.2.27
    Keywords: role-based access control, External Interface, Web API, Restful API
  3. 3. A Trusted Sharing Model for Patient Records based on Permissioned Blockchain
    Kyoung-jin Kim, Seng-phil Hong, Vol. 18, No. 6, pp. 75-84, Dec. 2017
    10.7472/jksii.2017.18.6.75
    Keywords: Permissioned blockchain, role-based access control, Medical data
  4. 4. Access Control as a Service for Information Protection in Semantic Web based Smart Environment
    Isma Farah Siddiqui, Scott Uk-Jin Lee, Noorrezam Yusop, Massila Kamalrudin, Mokhtar Mohd Yusof, Safiah Sidek, Minjae Park, Hyun Ahn, Kwanghoon Pio Kim, Yousra Abdul Alsahib S.Aldeen, Mazleena Salleh, Muhammad Younas, Imran Ghani, Dayang Norhayati Abang Jawawi, Muhammad Murad Khan, Mojtaba Raeisi Nejad Dobuneh, Dayang N.A. Jawawi, Shaligram Prajapat, Ashok Sharma, Ramjeevan Singh Thakur, Noor Azeera Abdul Aziz, MohdAizainiMaarof MohdAizainiMaarof, Anazida Zainal, Mohammed HazimAlkawaz, Jung-Gyu Lee, Seung-Ryul Jeong, Do Yeon Kim, Yoosin Kim, Sang Hyun Choi, NurLiyanaSulaiman NurLiyanaSulaiman, MohdNaz'ri Mahrin, RasimahCheMohd Yusoff, Taghi Javdani Gandomani, Mina Ziaei Nafchi, Vol. 17, No. 5, pp. 9-16, Oct. 2016
    10.7472/jksii.2016.17.5.09
    Keywords: access control, Smart Environment, Semantic web, XACML, Security requirement, security attribute, mobile application development, Data-Intensive Workflow Validation, Workflow, BPM, K-anonymity, Privacy, L-diversity, data relocation, generalization, Global Agile Development, Cloud computing, Challenges, benefits, Framework, cloud-based agile tools, Regression Testing, Prioritization, Evolutionary Algorithm, Web Application, User Session, Automatic Variable Key (AVK), cryptanalysis, Hacker, AI, genetic algorithm, swarm intelligence, cipher, Neural Network, cryptography, Artificial neural Networks (ANN), Genetic Algorithm (GA), Swarm Intelligence (SI), Features Combinations, Opinion Target Extraction, Text sentiment analysis, Conditional Random Field and Sequence Labeling Algorithm, Process Diagram, Project Monitoring, Project Management, Context Diagram, Awareness, agile practices, agile software development methodology, Agile Software Development, Agile Methods, Agile Transformation, Agile Adoption, Transition Prerequisites, Agile Transition, Grounded Theory (GT)
  5. 5. A Verifier-free Scheme for User Authentication and Access Control Using Smart Cards: Improvement of Chen-Yeh's Method
    Yong Kim, Min Gyo Chung, Vol. 14, No. 4, pp. 43-52, Aug. 2013
    10.7472/jksii.2013.14.4.43
    Keywords: User Authentication, access control, smart card, SVA(stolen verifier attack)
  6. 6. Proxy Server Providing Multi-level Privileges for Network Cameras on the Video Surveillance System
  7. 7. Secure Knowledge Management for Prevent illegal data leakage by Internal users
  8. 8. Management of the Access Control for a WebDAV-based Collaborative System
  9. 9. Secure MAC address-based Authentication on X.509 v3 Certificate in Group Communication
    Sung-Hyuck Hong, Vol. 9, No. 4, pp. 69-78, Aug. 2008
    Keywords: Access Controls, authentication, internet security
  10. 10. Applied Method of Privacy Information Protection Mechanism in e-business environments
    Seng-Phil Hong, Hyun-Me Jang, Vol. 9, No. 2, pp. 51-60, Apr. 2008
    Keywords: Privacy, Security, Policy, access control, Security Architecture