Digital Library
Search: "[ keyword: ACC ]" (78)
-
Seng-Phil Hong, Jae-Hyoun Kim, Vol. 8, No. 1, pp. 99-114, Feb. 2007
Keywords: Authorization, authentication, access control, Security Policy, PKI, PMI, e-Business -
Eun-Bok Choi, Ju-Gi Park, Jae-Hoon Kim, Vol. 7, No. 5, pp. 109-122, Oct. 2006
Keywords: MAC, Lattice, RBAC, Role Graph, access control -
Lee Jae-Moon, Vol. 7, No. 3, pp. 169-0, Jun. 2006
Keywords: Accuracy, Machine Learning, NaiveBayes, Document Classification, Large Item Sets -
Choi Hyang-Chang, Noh Bong-Nam, Lee Hyung-Hyo, Vol. 7, No. 1, pp. 1-16, Feb. 2006
Keywords: privacy protection model, ID management system, access control model -
Hwang Yu-Dong, Park Dong-Gue, Vol. 7, No. 1, pp. 17-30, Feb. 2006
Keywords: access control, RBAC, temporal constraint, sub-role, GTRBAC -
Kang Min-Goo, Vol. 7, No. 1, pp. 173-0, Feb. 2006
Keywords: Broadband wireless access network, OFDM-CDMA, Multi-channel separation -
17. An Efficient Role Based Access Control Technique by Structuring of Role Specification CertificateSoo-Mi Yang, Vol. 6, No. 5, pp. 1-10, Oct. 2005
Keywords: role based access control, attribute certificate, privilege management infrastructure(PMI) -
Kim Beob Kyun, Jang Haeng Jin, An Dong Un, Chung Seung Jong, Vol. 6, No. 4, pp. 75-84, Aug. 2005
Keywords: Grid, accounting, access control -
Kim Mi-Young, Mun Young-Song, Vol. 4, No. 1, pp. 19-26, Feb. 2003
Keywords: Mobile IPv6, AAA(Authentication, Authorization, Accounting)