Digital Library
Search: "[ keyword: Access ]" (44)
-
Gyu-Sung Ham, Own-jeong Seo, Hoill Jung, Su-Chong Joo, Vol. 19, No. 6, pp. 31-40, Dec. 2018
10.7472/jksii.2018.19.6.31
Keywords: Dynamic Situation Authentication Mechanism and Authentication System, Emergency Status Condition, Medical Information and Access Service, u-Medical Information System Environment -
Jin Ma, Hyunah Kim, Minjae Park, Vol. 19, No. 2, pp. 27-32, Apr. 2018
10.7472/jksii.2018.19.2.27
Keywords: role-based access control, External Interface, Web API, Restful API -
Kyoung-jin Kim, Seng-phil Hong, Vol. 18, No. 6, pp. 75-84, Dec. 2017
10.7472/jksii.2017.18.6.75
Keywords: Permissioned blockchain, role-based access control, Medical data -
Hyoungjun Cho, Jong-Moon Chung, Vol. 18, No. 4, pp. 27-34, Aug. 2017
10.7472/jksii.2017.18.4.27
Keywords: Augmented Reality, 5G network, Radio Access Network -
ChoonSung Nam, DongRyeol Shin, Vol. 18, No. 2, pp. 1-12, Apr. 2017
10.7472/jksii.2017.18.2.01
Keywords: Autonomous access, Access point, Public wireless LAN, SSID, iBeacon, Android -
Deepanjal Shrestha, Seung Ryul Jeong, Vol. 17, No. 6, pp. 113-122, Dec. 2016
10.7472/jksii.2016.17.6.113
Keywords: ICT, information access, Internet, data center, tourism industry -
Yousra Abdul Alsahib S.Aldeen, Shaligram Prajapat, Mojtaba Raeisi Nejad Dobuneh, Noor Azeera Abdul Aziz, Jung-Gyu Lee, Muhammad Younas, Do Yeon Kim, Minjae Park, NurLiyanaSulaiman NurLiyanaSulaiman, Taghi Javdani Gandomani, Noorrezam Yusop, Isma Farah Siddiqui, Yoosin Kim, Mina Ziaei Nafchi, Seung-Ryul Jeong, MohdNaz'ri Mahrin, MohdAizainiMaarof MohdAizainiMaarof, Ashok Sharma, Dayang N.A. Jawawi, Imran Ghani, Mazleena Salleh, Hyun Ahn, Massila Kamalrudin, Scott Uk-Jin Lee, Ramjeevan Singh Thakur, Dayang Norhayati Abang Jawawi, Anazida Zainal, Kwanghoon Pio Kim, Sang Hyun Choi, Mokhtar Mohd Yusof, RasimahCheMohd Yusoff, Muhammad Murad Khan, Mohammed HazimAlkawaz, Safiah Sidek, Vol. 17, No. 5, pp. 9-16, Oct. 2016
10.7472/jksii.2016.17.5.09
Keywords: access control, Smart Environment, Semantic web, XACML, Security requirement, security attribute, mobile application development, Data-Intensive Workflow Validation, Workflow, BPM, K-anonymity, Privacy, L-diversity, data relocation, generalization, Global Agile Development, Cloud computing, Challenges, benefits, Framework, cloud-based agile tools, Regression Testing, Prioritization, Evolutionary Algorithm, Web Application, User Session, Automatic Variable Key (AVK), cryptanalysis, Hacker, AI, genetic algorithm, swarm intelligence, cipher, Neural Network, cryptography, Artificial neural Networks (ANN), Genetic Algorithm (GA), Swarm Intelligence (SI), Features Combinations, Opinion Target Extraction, Text sentiment analysis, Conditional Random Field and Sequence Labeling Algorithm, Process Diagram, Project Monitoring, Project Management, Context Diagram, Awareness, agile practices, agile software development methodology, Agile Software Development, Agile Methods, Agile Transformation, Agile Adoption, Transition Prerequisites, Agile Transition, Grounded Theory (GT) -
Kyoung-Jae Lee, Han-Shin Jo, Vol. 16, No. 6, pp. 1-10, Dec. 2015
10.7472/jksii.2015.16.6.01
Keywords: Heterogeneous networks, Multiple radio access technology, Adjacent channel interference ratio, Guard band, deterministic calculations -
Chang Won Jeong, Woo Hong Kim, Kwon Ha Yoon, Su Chong Joo, Vol. 16, No. 1, pp. 47-56, Feb. 2015
10.7472/jksii.2015.16.1.47
Keywords: Medical Information Dynamic Access System, Emergency Context Condition, Authorization Technology, Smart Mobile Environments -
Cheol-Joo Chae, Kwang-Nam Choi, Kiseok Choi, Yong-Hee Yae, YounJu Shin, Vol. 16, No. 1, pp. 21-28, Feb. 2015
10.7472/jksii.2015.16.1.21
Keywords: OAuth Protocol, Authorization, authentication, Access Token, E-mail Authentication