Digital Library
Search: "[ keyword: access control ]" (18)
-
Seng-Phil Hong, Hyun-Me Jang, Vol. 9, No. 2, pp. 51-60, Apr. 2008
Keywords: Privacy, Security, Policy, access control, Security Architecture -
Chang-Won Jeong, Dong-Ho Kim, Myung-Hee Kim, Su-Chong Joo, Vol. 8, No. 6, pp. 29-42, Dec. 2007
Keywords: dynamic security service, access control model, Distributed Object Group Framework -
Seng-Phil Hong, Jae-Hyoun Kim, Vol. 8, No. 1, pp. 99-114, Feb. 2007
Keywords: Authorization, authentication, access control, Security Policy, PKI, PMI, e-Business -
Eun-Bok Choi, Ju-Gi Park, Jae-Hoon Kim, Vol. 7, No. 5, pp. 109-122, Oct. 2006
Keywords: MAC, Lattice, RBAC, Role Graph, access control -
Hwang Yu-Dong, Park Dong-Gue, Vol. 7, No. 1, pp. 17-30, Feb. 2006
Keywords: access control, RBAC, temporal constraint, sub-role, GTRBAC -
Choi Hyang-Chang, Noh Bong-Nam, Lee Hyung-Hyo, Vol. 7, No. 1, pp. 1-16, Feb. 2006
Keywords: privacy protection model, ID management system, access control model -
17. An Efficient Role Based Access Control Technique by Structuring of Role Specification CertificateSoo-Mi Yang, Vol. 6, No. 5, pp. 1-10, Oct. 2005
Keywords: role based access control, attribute certificate, privilege management infrastructure(PMI) -
Kim Beob Kyun, Jang Haeng Jin, An Dong Un, Chung Seung Jong, Vol. 6, No. 4, pp. 75-84, Aug. 2005
Keywords: Grid, accounting, access control
Category Search
Publications
-
Vol. 26, 2025
-
Vol. 25, 2024
-
Vol. 24, 2023
-
Vol. 23, 2022
-
Vol. 22, 2021
-
Vol. 21, 2020
-
Vol. 20, 2019
-
Vol. 19, 2018
-
Vol. 18, 2017
-
Vol. 17, 2016
-
Vol. 16, 2015
-
Vol. 15, 2014
-
Vol. 14, 2013
-
Vol. 13, 2012
-
Vol. 12, 2011
-
Vol. 11, 2010
-
Vol. 10, 2009
-
Vol. 9, 2008
-
Vol. 8, 2007
-
Vol. 7, 2006
-
Vol. 6, 2005
-
Vol. 5, 2004
-
Vol. 4, 2003
-
Vol. 3, 2002
-
Vol. 2, 2001
-
Vol. 1, 2000