• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: ACC ]" (78)
  1. 51. An ICT Framework for Tourism Industry of Nepal: Prospect and Challenges
    Deepanjal Shrestha, Seung Ryul Jeong, Vol. 17, No. 6, pp. 113-122, Dec. 2016
    10.7472/jksii.2016.17.6.113
    Keywords: ICT, information access, Internet, data center, tourism industry
  2. 52. Access Control as a Service for Information Protection in Semantic Web based Smart Environment
    Yousra Abdul Alsahib S.Aldeen, Shaligram Prajapat, Mojtaba Raeisi Nejad Dobuneh, Noor Azeera Abdul Aziz, Jung-Gyu Lee, Muhammad Younas, Do Yeon Kim, Minjae Park, NurLiyanaSulaiman NurLiyanaSulaiman, Taghi Javdani Gandomani, Noorrezam Yusop, Isma Farah Siddiqui, Yoosin Kim, Mina Ziaei Nafchi, Seung-Ryul Jeong, MohdNaz'ri Mahrin, MohdAizainiMaarof MohdAizainiMaarof, Ashok Sharma, Dayang N.A. Jawawi, Imran Ghani, Mazleena Salleh, Hyun Ahn, Massila Kamalrudin, Scott Uk-Jin Lee, Ramjeevan Singh Thakur, Dayang Norhayati Abang Jawawi, Anazida Zainal, Kwanghoon Pio Kim, Sang Hyun Choi, Mokhtar Mohd Yusof, RasimahCheMohd Yusoff, Muhammad Murad Khan, Mohammed HazimAlkawaz, Safiah Sidek, Vol. 17, No. 5, pp. 9-16, Oct. 2016
    10.7472/jksii.2016.17.5.09
    Keywords: access control, Smart Environment, Semantic web, XACML, Security requirement, security attribute, mobile application development, Data-Intensive Workflow Validation, Workflow, BPM, K-anonymity, Privacy, L-diversity, data relocation, generalization, Global Agile Development, Cloud computing, Challenges, benefits, Framework, cloud-based agile tools, Regression Testing, Prioritization, Evolutionary Algorithm, Web Application, User Session, Automatic Variable Key (AVK), cryptanalysis, Hacker, AI, genetic algorithm, swarm intelligence, cipher, Neural Network, cryptography, Artificial neural Networks (ANN), Genetic Algorithm (GA), Swarm Intelligence (SI), Features Combinations, Opinion Target Extraction, Text sentiment analysis, Conditional Random Field and Sequence Labeling Algorithm, Process Diagram, Project Monitoring, Project Management, Context Diagram, Awareness, agile practices, agile software development methodology, Agile Software Development, Agile Methods, Agile Transformation, Agile Adoption, Transition Prerequisites, Agile Transition, Grounded Theory (GT)
  3. 53. On Frequency Separation among Radio Access Technologies in Heterogeneous Networks
  4. 54. Medical Information Dynamic Access System in Smart Mobile Environments
  5. 55. Factors of Leading the Adoption of Diet/Exercise Apps on Smartphones: Application of Channel Expansion Theory
  6. 56. The Extended Authentication Protocol using E-mail Authentication in OAuth 2.0 Protocol for Secure Granting of User Access
    Cheol-Joo Chae, Kwang-Nam Choi, Kiseok Choi, Yong-Hee Yae, YounJu Shin, Vol. 16, No. 1, pp. 21-28, Feb. 2015
    10.7472/jksii.2015.16.1.21
    Keywords: OAuth Protocol, Authorization, authentication, Access Token, E-mail Authentication
  7. 57. A Study on Improvement Plan of Web Accessibility for the Disabled
    Woochun Jun, Suk-Ki Hong, Vol. 15, No. 4, pp. 81-90, Aug. 2014
    10.7472/jksii.2014.15.4.81
    Keywords: Web Accessibility, the Disabled, Digital Divide
  8. 58. Channel Searching Method of IEEE 802.15.4 Nodes for Avoiding WiFi Traffic Interference
    Myong Lyol Song, Vol. 15, No. 2, pp. 19-32, Apr. 2014
    10.7472/jksii.2014.15.2.19
    Keywords: Interference, IEEE 802.15.4, WiFi, CSMA-CA, medium access delay, channel search
  9. 59. A study on Factors that Influence the Usage of Mobile Apps - Based on Flow Theory and Unified Theory of Acceptance and Use of Technology -
    Young-Chae Kim, Seung Ryul Jeong, Vol. 14, No. 4, pp. 73-84, Aug. 2013
    10.7472/jksii.2013.14.4.73
    Keywords: Mobile App, Flow Experience, Flow Theory, Technology Acceptance, Usage
  10. 60. The 64-Bit Scrambler Design of the OFDM Modulation for Vehicles Communications Technology