Digital Library
Search: "[ keyword: Policy ]" (20)
-
Hyeonwoo Kim, Dongwoo Kwon, Hongtaek Ju, Vol. 16, No. 2, pp. 27-40, Apr. 2015
10.7472/jksii.2015.16.2.27
Keywords: Stateless Firewall, Policy Inference, Attack Detection Threshold, Active Probing, Inference Parameters, Sweep-line Algorithm -
Yong-Beom Kim, Jeongho Kwak, Vol. 15, No. 4, pp. 67-80, Aug. 2014
10.7472/jksii.2014.15.4.67
Keywords: Smart Convergence, ICT Ecosystem, Creative Economy, ICT Policy -
Woo-Sik Lee, Nam-Gi Kim, Vol. 13, No. 1, pp. 75-82, Feb. 2012
10.7472/jksii.2012.13.1.75
Keywords: RFID Device Management Policy, ISO-IEC 24791-3, RDMPDL: RFID-devices Management Policy Definition Language, Policy Device Management API -
Jang-Ho Park, Bong-Gyou Lee, Vol. 12, No. 3, pp. 139-0, Jun. 2011
Keywords: Energy-IT Convergence, Future Industry, Critical Priority Factors, Policy Priority, ANP(Analytic Network Process) -
Ji-Hye Song, Kwang-Hoon Kim, Vol. 12, No. 1, pp. 55-70, Feb. 2011
Keywords: rXPDL, A Policy-driven RFID Data Management, RFID Application Interface, SSI Part 4 Application Interface 24791-4 -
Hyung-Jin Ahn, Hyo-Chan Bang, Kwang-Hoon Kim, Vol. 10, No. 4, pp. 177-188, Aug. 2009
Keywords: RFID Service Management Policy, Integrated control and management for RFID devices, Integrated control and management for RFID applications -
Yong-Hwan Lee, Werner Jan, Sztipanovits Janos, Vol. 10, No. 4, pp. 139-150, Aug. 2009
Keywords: DSML, Policy Model, Workflow Model, Model Verification, Model Integration -
Seng-Phil Hong, Hyun-Me Jang, Vol. 9, No. 2, pp. 51-60, Apr. 2008
Keywords: Privacy, Security, Policy, access control, Security Architecture -
Seng-Phil Hong, Jae-Hyoun Kim, Vol. 8, No. 1, pp. 99-114, Feb. 2007
Keywords: Authorization, authentication, access control, Security Policy, PKI, PMI, e-Business