Browse "School of Computing(전산학부)" by Subject access control

Showing results 1 to 9 of 9

1
A novel privacy preserving authentication and access control scheme for pervasive computing environments

Ren, K; Lou, WJ; Kim, Kwangjo; Deng, R, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, v.55, pp.1373 - 1384, 2006-07

2
An Enhanced Rule-Based Web Scanner Based on Similarity Score

Lee, Minsoo; Lee, Younho; Yoon, Hyunsoo, ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, v.16, no.3, pp.9 - 14, 2016

3
Filtering XPath expressions for XML access control

Jeon, JM; Chung, YD; Kim, Myoung Ho; Lee, Yoon Joon, COMPUTERS & SECURITY, v.23, no.7, pp.591 - 605, 2004

4
Reactive key management scheme for access control in group communications

Kim, H; Lee, Y; Park, Y; Yoon, Hyunsoo, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E90B, pp.982 - 986, 2007-04

5
RoleCast: Finding Missing Security Checks When You Do Not Know What Checks Are

Son, Sooel; McKinley, Kathryn S.; Shmatikov, Vitaly, ACM SIGPLAN NOTICES, v.46, no.10, pp.1069 - 1083, 2011-10

6
The dynamic predicate: integrating access control with query processing in XML databases

Lee, Jae-Gil; Whang, Kyu-Young; Han, Wook-Shin; Song, Il-Yeol, VLDB JOURNAL, v.16, pp.371 - 387, 2007-07

7
술어를 이용한 내용 의존적 권한부여 기법

홍성림; 박창원; 정진완, 정보과학회논문지 : 데이타베이스, v.30, no.1, pp.1 - 13, 2003-02

8
신뢰성 있는 브로드캐스트 암호화를 위한 자가 키 복구 기법

허준범; 윤현수, 정보과학회논문지 : 정보통신, v.36, no.6, pp.471 - 480, 2009-12

9
접근 제어를 위한 반응적 방식의 그룹키 관리 기법

김희열; 이윤호; 박용수; 윤현수, 정보과학회논문지 : 시스템 및 이론, v.34, no.11, pp.589 - 598, 2007-12

Discover

Type

. next

Open Access

Date issued

. next

Subject

. next

rss_1.0 rss_2.0 atom_1.0