• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: CC ]" (95)
  1. 31. A Role-Based Access Control System API Supporting External Authority Interface
    Jin Ma, Hyunah Kim, Minjae Park, Vol. 19, No. 2, pp. 27-32, Apr. 2018
    10.7472/jksii.2018.19.2.27
    Keywords: role-based access control, External Interface, Web API, Restful API
  2. 32. A Trusted Sharing Model for Patient Records based on Permissioned Blockchain
    Kyoung-jin Kim, Seng-phil Hong, Vol. 18, No. 6, pp. 75-84, Dec. 2017
    10.7472/jksii.2017.18.6.75
    Keywords: Permissioned blockchain, role-based access control, Medical data
  3. 33. A Robust Object Detection and Tracking Method using RGB-D Model
    Park, Seohee;Chun, Junchul;, Vol. 18, No. 4, pp. 61-68, Aug. 2017
    10.7472/jksii.2017.18.4.61
    Keywords: 3D CCTV, video surveillance, Object Detection, object tracking, Depth Map, Image Segmentation
  4. 34. 5G Radio Access Network Architecture for Mobile Augmented Reality Service
    Hyoungjun Cho, Jong-Moon Chung, Vol. 18, No. 4, pp. 27-34, Aug. 2017
    10.7472/jksii.2017.18.4.27
    Keywords: Augmented Reality, 5G network, Radio Access Network
  5. 35. Collaborative Filtering using Co-Occurrence and Similarity information
    Kwang Tek Na, Ju Hong Lee, Vol. 18, No. 3, pp. 19-28, Jun. 2017
    10.7472/jksii.2017.18.3.19
    Keywords: Collaborative Filtering, Recommender System, co occurrence, similarity, SVD, latent factor model
  6. 36. Enhancement of Fall-Detection Rate using Frequency Spectrum Pattern Matching
  7. 37. An Automatic AP Connections Scheme using iBeacon
    ChoonSung Nam, DongRyeol Shin, Vol. 18, No. 2, pp. 1-12, Apr. 2017
    10.7472/jksii.2017.18.2.01
    Keywords: Autonomous access, Access point, Public wireless LAN, SSID, iBeacon, Android
  8. 38. A Study on the Influence of Information Security on Consumer's Preference of Android and iOS based Smartphone
    Jong-jin Park, Min-kyong Choi, Jong-chang Ahn, Vol. 18, No. 1, pp. 105-120, Feb. 2017
    10.7472/jksii.2017.18.1.105
    Keywords: Smartphones, information security, Degree of personal risk accepting, Buying intention, Android, iOS
  9. 39. An ICT Framework for Tourism Industry of Nepal: Prospect and Challenges
    Deepanjal Shrestha, Seung Ryul Jeong, Vol. 17, No. 6, pp. 113-122, Dec. 2016
    10.7472/jksii.2016.17.6.113
    Keywords: ICT, information access, Internet, data center, tourism industry
  10. 40. Access Control as a Service for Information Protection in Semantic Web based Smart Environment
    Yousra Abdul Alsahib S.Aldeen, Shaligram Prajapat, Mojtaba Raeisi Nejad Dobuneh, Noor Azeera Abdul Aziz, Jung-Gyu Lee, Muhammad Younas, Do Yeon Kim, Minjae Park, NurLiyanaSulaiman NurLiyanaSulaiman, Taghi Javdani Gandomani, Noorrezam Yusop, Isma Farah Siddiqui, Yoosin Kim, Mina Ziaei Nafchi, Seung-Ryul Jeong, MohdNaz'ri Mahrin, MohdAizainiMaarof MohdAizainiMaarof, Ashok Sharma, Dayang N.A. Jawawi, Imran Ghani, Mazleena Salleh, Hyun Ahn, Massila Kamalrudin, Scott Uk-Jin Lee, Ramjeevan Singh Thakur, Dayang Norhayati Abang Jawawi, Anazida Zainal, Kwanghoon Pio Kim, Sang Hyun Choi, Mokhtar Mohd Yusof, RasimahCheMohd Yusoff, Muhammad Murad Khan, Mohammed HazimAlkawaz, Safiah Sidek, Vol. 17, No. 5, pp. 9-16, Oct. 2016
    10.7472/jksii.2016.17.5.09
    Keywords: access control, Smart Environment, Semantic web, XACML, Security requirement, security attribute, mobile application development, Data-Intensive Workflow Validation, Workflow, BPM, K-anonymity, Privacy, L-diversity, data relocation, generalization, Global Agile Development, Cloud computing, Challenges, benefits, Framework, cloud-based agile tools, Regression Testing, Prioritization, Evolutionary Algorithm, Web Application, User Session, Automatic Variable Key (AVK), cryptanalysis, Hacker, AI, genetic algorithm, swarm intelligence, cipher, Neural Network, cryptography, Artificial neural Networks (ANN), Genetic Algorithm (GA), Swarm Intelligence (SI), Features Combinations, Opinion Target Extraction, Text sentiment analysis, Conditional Random Field and Sequence Labeling Algorithm, Process Diagram, Project Monitoring, Project Management, Context Diagram, Awareness, agile practices, agile software development methodology, Agile Software Development, Agile Methods, Agile Transformation, Agile Adoption, Transition Prerequisites, Agile Transition, Grounded Theory (GT)