• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: ACC ]" (78)
  1. 11. Trusted Information Sharing Model in Collaborative Systems
  2. 12. Role Graph Security Management Model based on Lattice
    Eun-Bok Choi, Ju-Gi Park, Jae-Hoon Kim, Vol. 7, No. 5, pp. 109-122, Oct. 2006
    Keywords: MAC, Lattice, RBAC, Role Graph, access control
  3. 13. An Improvement of Accuracy for NaiveBayes by Using Large Word Sets
    Lee Jae-Moon, Vol. 7, No. 3, pp. 169-0, Jun. 2006
    Keywords: Accuracy, Machine Learning, NaiveBayes, Document Classification, Large Item Sets
  4. 14. An Access Control Based Privacy Protection Model in ID Management System
  5. 15. Extended GTRBAC Delegation Model for Access Control Enforcement in Enterprise Environments
    Hwang Yu-Dong, Park Dong-Gue, Vol. 7, No. 1, pp. 17-30, Feb. 2006
    Keywords: access control, RBAC, temporal constraint, sub-role, GTRBAC
  6. 16. Performance Analysis of Space-Time Codes on OFDM-CDMA based Broadband Wireless Access Networks
    Kang Min-Goo, Vol. 7, No. 1, pp. 173-0, Feb. 2006
    Keywords: Broadband wireless access network, OFDM-CDMA, Multi-channel separation
  7. 17. An Efficient Role Based Access Control Technique by Structuring of Role Specification Certificate
  8. 18. Grid Accounting Information System with Access Control
    Kim Beob Kyun, Jang Haeng Jin, An Dong Un, Chung Seung Jong, Vol. 6, No. 4, pp. 75-84, Aug. 2005
    Keywords: Grid, accounting, access control
  9. 19. Pushback based Advanced ICMP Traceback Mechanism Against DDoS Attack
    Lee Hyung-Woo, Vol. 5, No. 1, pp. 85-98, Feb. 2004
    Keywords: DDoS, Traceback, ICMP, ACC, Pushback
  10. 20. A Study on the Localized Key Management Using AAA in Mobile IPv6