Digital Library
Search: "[ keyword: CC ]" (95)
-
Eun-Bok Choi, Ju-Gi Park, Jae-Hoon Kim, Vol. 7, No. 5, pp. 109-122, Oct. 2006
Keywords: MAC, Lattice, RBAC, Role Graph, access control -
Lee Jae-Moon, Vol. 7, No. 3, pp. 169-0, Jun. 2006
Keywords: Accuracy, Machine Learning, NaiveBayes, Document Classification, Large Item Sets -
Kang Min-Goo, Vol. 7, No. 1, pp. 173-0, Feb. 2006
Keywords: Broadband wireless access network, OFDM-CDMA, Multi-channel separation -
Ku Jay-Il, Chinn Yong-Ok, Vol. 7, No. 1, pp. 165-172, Feb. 2006
Keywords: UPAN, UPTN, eNUM, NAN System, @CC, 1882 -
Hwang Yu-Dong, Park Dong-Gue, Vol. 7, No. 1, pp. 17-30, Feb. 2006
Keywords: access control, RBAC, temporal constraint, sub-role, GTRBAC -
Choi Hyang-Chang, Noh Bong-Nam, Lee Hyung-Hyo, Vol. 7, No. 1, pp. 1-16, Feb. 2006
Keywords: privacy protection model, ID management system, access control model -
88. An Efficient Role Based Access Control Technique by Structuring of Role Specification CertificateSoo-Mi Yang, Vol. 6, No. 5, pp. 1-10, Oct. 2005
Keywords: role based access control, attribute certificate, privilege management infrastructure(PMI) -
Kim Beob Kyun, Jang Haeng Jin, An Dong Un, Chung Seung Jong, Vol. 6, No. 4, pp. 75-84, Aug. 2005
Keywords: Grid, accounting, access control -
90. A MDIT(Mobile Digital Investment Trust) Agent design and security enhancement using 3BC and E2mECCJeong Eun-Hee, Lee Byung-Kwan, Vol. 6, No. 3, pp. 1-16, Jun. 2005
Keywords: SSL, DES, ECC, MDIT, EC-Sign, 3BC