Digital Library
Search: "[ keyword: CC ]" (103)
-
Siwan Noh, Kyung-Hyune Rhee, Vol. 20, No. 4, pp. 1-11, Aug. 2019
10.7472/jksii.2019.20.4.01
Keywords: Blockchain, access control, Security, Privacy -
Jin HaiYan, Sun HaiRong, HaSung Hwang, Vol. 20, No. 3, pp. 101-109, Jun. 2019
10.7472/jksii.2019.20.3.101
Keywords: online shopping festival, Theory of Reasoned Action, Technology Acceptance Model. -
Dong Hyuk Jo, Sang Min Lee, Vol. 20, No. 1, pp. 113-124, Feb. 2019
10.7472/jksii.2019.20.1.113
Keywords: Omni-Channel, Unified Theory of Acceptance and Use of Technology (UTAUT), Technology Acceptance Model (TAM), Task-technology fit (TTF), Intention to Use -
Gyu-Sung Ham, Own-jeong Seo, Hoill Jung, Su-Chong Joo, Vol. 19, No. 6, pp. 31-40, Dec. 2018
10.7472/jksii.2018.19.6.31
Keywords: Dynamic Situation Authentication Mechanism and Authentication System, Emergency Status Condition, Medical Information and Access Service, u-Medical Information System Environment -
Mina Lee, Juhyun Hong, Vol. 19, No. 2, pp. 77-88, Apr. 2018
10.7472/jksii.2018.19.2.77
Keywords: HPV Vaccine, HPV Vaccine Safety, HPV Vaccine Side Effects, Policy PR, Risk Communication, Network analysis -
Jin Ma, Hyunah Kim, Minjae Park, Vol. 19, No. 2, pp. 27-32, Apr. 2018
10.7472/jksii.2018.19.2.27
Keywords: role-based access control, External Interface, Web API, Restful API -
Deepanjal Shrestha, Seung Ryul Jeong, Vol. 17, No. 6, pp. 113-122, Dec. 2016
10.7472/jksii.2016.17.6.113
Keywords: ICT, information access, Internet, data center, tourism industry -
Yousra Abdul Alsahib S.Aldeen, Shaligram Prajapat, Mojtaba Raeisi Nejad Dobuneh, Noor Azeera Abdul Aziz, Jung-Gyu Lee, Muhammad Younas, Do Yeon Kim, Minjae Park, NurLiyanaSulaiman NurLiyanaSulaiman, Taghi Javdani Gandomani, Noorrezam Yusop, Isma Farah Siddiqui, Yoosin Kim, Mina Ziaei Nafchi, Seung-Ryul Jeong, MohdNaz'ri Mahrin, MohdAizainiMaarof MohdAizainiMaarof, Ashok Sharma, Dayang N.A. Jawawi, Imran Ghani, Mazleena Salleh, Hyun Ahn, Massila Kamalrudin, Scott Uk-Jin Lee, Ramjeevan Singh Thakur, Dayang Norhayati Abang Jawawi, Anazida Zainal, Kwanghoon Pio Kim, Sang Hyun Choi, Mokhtar Mohd Yusof, RasimahCheMohd Yusoff, Muhammad Murad Khan, Mohammed HazimAlkawaz, Safiah Sidek, Vol. 17, No. 5, pp. 9-16, Oct. 2016
10.7472/jksii.2016.17.5.09
Keywords: access control, Smart Environment, Semantic web, XACML, Security requirement, security attribute, mobile application development, Data-Intensive Workflow Validation, Workflow, BPM, K-anonymity, Privacy, L-diversity, data relocation, generalization, Global Agile Development, Cloud computing, Challenges, benefits, Framework, cloud-based agile tools, Regression Testing, Prioritization, Evolutionary Algorithm, Web Application, User Session, Automatic Variable Key (AVK), cryptanalysis, Hacker, AI, genetic algorithm, swarm intelligence, cipher, Neural Network, cryptography, Artificial neural Networks (ANN), Genetic Algorithm (GA), Swarm Intelligence (SI), Features Combinations, Opinion Target Extraction, Text sentiment analysis, Conditional Random Field and Sequence Labeling Algorithm, Process Diagram, Project Monitoring, Project Management, Context Diagram, Awareness, agile practices, agile software development methodology, Agile Software Development, Agile Methods, Agile Transformation, Agile Adoption, Transition Prerequisites, Agile Transition, Grounded Theory (GT) -
Kyoung-Jae Lee, Han-Shin Jo, Vol. 16, No. 6, pp. 1-10, Dec. 2015
10.7472/jksii.2015.16.6.01
Keywords: Heterogeneous networks, Multiple radio access technology, Adjacent channel interference ratio, Guard band, deterministic calculations -
Taisiya Kim, Ji Yeon Cho, Bong Gyou Lee, Vol. 16, No. 6, pp. 123-132, Dec. 2015
10.7472/jksii.2015.16.6.123
Keywords: smart learning, Smart Education, Success Strategy, Policy and Systems, SWOT, Analytic Hierarchy Priority, Korean Public Education




