• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: CC ]" (103)
  1. 61. A Study on the Analysis and Solutions of the Blockchain Security Issues
    Siwan Noh, Kyung-Hyune Rhee, Vol. 20, No. 4, pp. 1-11, Aug. 2019
    10.7472/jksii.2019.20.4.01
    Keywords: Blockchain, access control, Security, Privacy
  2. 62. Exploring factors affecting continuous intention to use online shopping festival
    Jin HaiYan, Sun HaiRong, HaSung Hwang, Vol. 20, No. 3, pp. 101-109, Jun. 2019
    10.7472/jksii.2019.20.3.101
    Keywords: online shopping festival, Theory of Reasoned Action, Technology Acceptance Model.
  3. 63. Understanding the Omni-Channel Acceptance: Focused on TTF and UTAUT Models
  4. 64. Implementation of Dynamic Situation Authentication System for Accessing Medical Information
  5. 65. Analysis of News Articles Regarding Safety Issue of HPV Vaccine
    Mina Lee, Juhyun Hong, Vol. 19, No. 2, pp. 77-88, Apr. 2018
    10.7472/jksii.2018.19.2.77
    Keywords: HPV Vaccine, HPV Vaccine Safety, HPV Vaccine Side Effects, Policy PR, Risk Communication, Network analysis
  6. 66. A Role-Based Access Control System API Supporting External Authority Interface
    Jin Ma, Hyunah Kim, Minjae Park, Vol. 19, No. 2, pp. 27-32, Apr. 2018
    10.7472/jksii.2018.19.2.27
    Keywords: role-based access control, External Interface, Web API, Restful API
  7. 67. An ICT Framework for Tourism Industry of Nepal: Prospect and Challenges
    Deepanjal Shrestha, Seung Ryul Jeong, Vol. 17, No. 6, pp. 113-122, Dec. 2016
    10.7472/jksii.2016.17.6.113
    Keywords: ICT, information access, Internet, data center, tourism industry
  8. 68. Access Control as a Service for Information Protection in Semantic Web based Smart Environment
    Yousra Abdul Alsahib S.Aldeen, Shaligram Prajapat, Mojtaba Raeisi Nejad Dobuneh, Noor Azeera Abdul Aziz, Jung-Gyu Lee, Muhammad Younas, Do Yeon Kim, Minjae Park, NurLiyanaSulaiman NurLiyanaSulaiman, Taghi Javdani Gandomani, Noorrezam Yusop, Isma Farah Siddiqui, Yoosin Kim, Mina Ziaei Nafchi, Seung-Ryul Jeong, MohdNaz'ri Mahrin, MohdAizainiMaarof MohdAizainiMaarof, Ashok Sharma, Dayang N.A. Jawawi, Imran Ghani, Mazleena Salleh, Hyun Ahn, Massila Kamalrudin, Scott Uk-Jin Lee, Ramjeevan Singh Thakur, Dayang Norhayati Abang Jawawi, Anazida Zainal, Kwanghoon Pio Kim, Sang Hyun Choi, Mokhtar Mohd Yusof, RasimahCheMohd Yusoff, Muhammad Murad Khan, Mohammed HazimAlkawaz, Safiah Sidek, Vol. 17, No. 5, pp. 9-16, Oct. 2016
    10.7472/jksii.2016.17.5.09
    Keywords: access control, Smart Environment, Semantic web, XACML, Security requirement, security attribute, mobile application development, Data-Intensive Workflow Validation, Workflow, BPM, K-anonymity, Privacy, L-diversity, data relocation, generalization, Global Agile Development, Cloud computing, Challenges, benefits, Framework, cloud-based agile tools, Regression Testing, Prioritization, Evolutionary Algorithm, Web Application, User Session, Automatic Variable Key (AVK), cryptanalysis, Hacker, AI, genetic algorithm, swarm intelligence, cipher, Neural Network, cryptography, Artificial neural Networks (ANN), Genetic Algorithm (GA), Swarm Intelligence (SI), Features Combinations, Opinion Target Extraction, Text sentiment analysis, Conditional Random Field and Sequence Labeling Algorithm, Process Diagram, Project Monitoring, Project Management, Context Diagram, Awareness, agile practices, agile software development methodology, Agile Software Development, Agile Methods, Agile Transformation, Agile Adoption, Transition Prerequisites, Agile Transition, Grounded Theory (GT)
  9. 69. On Frequency Separation among Radio Access Technologies in Heterogeneous Networks
  10. 70. A Study on the Development Strategy of Smart Learning for Public Education