Digital Library
Search: "[ keyword: access control ]" (18)
-
SeungMyeong Jeong, Seong-yun Kim, In-Song Lee, Vol. 20, No. 6, pp. 157-166, Dec. 2019
10.7472/jksii.2019.20.6.157
Keywords: oneM2M, IoT, Smart City, Data Marketplace, access control -
Siwan Noh, Kyung-Hyune Rhee, Vol. 20, No. 4, pp. 1-11, Aug. 2019
10.7472/jksii.2019.20.4.01
Keywords: Blockchain, access control, Security, Privacy -
Jin Ma, Hyunah Kim, Minjae Park, Vol. 19, No. 2, pp. 27-32, Apr. 2018
10.7472/jksii.2018.19.2.27
Keywords: role-based access control, External Interface, Web API, Restful API -
Kyoung-jin Kim, Seng-phil Hong, Vol. 18, No. 6, pp. 75-84, Dec. 2017
10.7472/jksii.2017.18.6.75
Keywords: Permissioned blockchain, role-based access control, Medical data -
Yousra Abdul Alsahib S.Aldeen, Shaligram Prajapat, Mojtaba Raeisi Nejad Dobuneh, Noor Azeera Abdul Aziz, Jung-Gyu Lee, Muhammad Younas, Do Yeon Kim, Minjae Park, NurLiyanaSulaiman NurLiyanaSulaiman, Taghi Javdani Gandomani, Noorrezam Yusop, Isma Farah Siddiqui, Yoosin Kim, Mina Ziaei Nafchi, Seung-Ryul Jeong, MohdNaz'ri Mahrin, MohdAizainiMaarof MohdAizainiMaarof, Ashok Sharma, Dayang N.A. Jawawi, Imran Ghani, Mazleena Salleh, Hyun Ahn, Massila Kamalrudin, Scott Uk-Jin Lee, Ramjeevan Singh Thakur, Dayang Norhayati Abang Jawawi, Anazida Zainal, Kwanghoon Pio Kim, Sang Hyun Choi, Mokhtar Mohd Yusof, RasimahCheMohd Yusoff, Muhammad Murad Khan, Mohammed HazimAlkawaz, Safiah Sidek, Vol. 17, No. 5, pp. 9-16, Oct. 2016
10.7472/jksii.2016.17.5.09
Keywords: access control, Smart Environment, Semantic web, XACML, Security requirement, security attribute, mobile application development, Data-Intensive Workflow Validation, Workflow, BPM, K-anonymity, Privacy, L-diversity, data relocation, generalization, Global Agile Development, Cloud computing, Challenges, benefits, Framework, cloud-based agile tools, Regression Testing, Prioritization, Evolutionary Algorithm, Web Application, User Session, Automatic Variable Key (AVK), cryptanalysis, Hacker, AI, genetic algorithm, swarm intelligence, cipher, Neural Network, cryptography, Artificial neural Networks (ANN), Genetic Algorithm (GA), Swarm Intelligence (SI), Features Combinations, Opinion Target Extraction, Text sentiment analysis, Conditional Random Field and Sequence Labeling Algorithm, Process Diagram, Project Monitoring, Project Management, Context Diagram, Awareness, agile practices, agile software development methodology, Agile Software Development, Agile Methods, Agile Transformation, Agile Adoption, Transition Prerequisites, Agile Transition, Grounded Theory (GT) -
Yong Kim, Min Gyo Chung, Vol. 14, No. 4, pp. 43-52, Aug. 2013
10.7472/jksii.2013.14.4.43
Keywords: User Authentication, access control, smart card, SVA(stolen verifier attack) -
7. Proxy Server Providing Multi-level Privileges for Network Cameras on the Video Surveillance SystemKwang-Jin Bae, Kyung-Roul Lee, Kang-Bin Yim, Vol. 12, No. 2, pp. 123-134, Apr. 2011
Keywords: CCTV, proxy server, network camera, video surveillance, access control, key sharing -
Dae-Hee Seo, Jang-Mi Baek, Min-Kyung Lee, Mi-Yeon Yoon, Dong-Sub Cho, Vol. 11, No. 2, pp. 73-84, Apr. 2010
Keywords: Ubiquitous Computing, Knowledge Management System, Prevent illegal data leakage, access control, authentication -
Seong-Hune Kim, Hong-Chang Lee, Myung-Joon Lee, Yang-Su Park, Vol. 11, No. 1, pp. 167-182, Feb. 2010
Keywords: WebDAV, WebDAV Access Control Protocol, CoSlide Server, Open workspaces, Group workspaces, CoSpace, Access Control Manager -
Sung-Hyuck Hong, Vol. 9, No. 4, pp. 69-78, Aug. 2008
Keywords: Access Controls, authentication, internet security