• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: access control ]" (18)
  1. 11. Applied Method of Privacy Information Protection Mechanism in e-business environments
    Seng-Phil Hong, Hyun-Me Jang, Vol. 9, No. 2, pp. 51-60, Apr. 2008
    Keywords: Privacy, Security, Policy, access control, Security Architecture
  2. 12. A Dynamic Security Service using Access Control Model in Distributed Framework Support for u-Healthcare
  3. 13. Trusted Information Sharing Model in Collaborative Systems
  4. 14. Role Graph Security Management Model based on Lattice
    Eun-Bok Choi, Ju-Gi Park, Jae-Hoon Kim, Vol. 7, No. 5, pp. 109-122, Oct. 2006
    Keywords: MAC, Lattice, RBAC, Role Graph, access control
  5. 15. Extended GTRBAC Delegation Model for Access Control Enforcement in Enterprise Environments
    Hwang Yu-Dong, Park Dong-Gue, Vol. 7, No. 1, pp. 17-30, Feb. 2006
    Keywords: access control, RBAC, temporal constraint, sub-role, GTRBAC
  6. 16. An Access Control Based Privacy Protection Model in ID Management System
  7. 17. An Efficient Role Based Access Control Technique by Structuring of Role Specification Certificate
  8. 18. Grid Accounting Information System with Access Control
    Kim Beob Kyun, Jang Haeng Jin, An Dong Un, Chung Seung Jong, Vol. 6, No. 4, pp. 75-84, Aug. 2005
    Keywords: Grid, accounting, access control