References
- 대한상공회의소, 'http://scm.korcham.net/download/SCM_guide.pdf, 2005
- 안규희, 이기열, 정목동, 'RFID 애플리케이션을 위한 엔터프라이즈 애플리케이션 프레임워크와 비즈니스 프로세스 모델,' 한국정보과학회 가을 학술 논문집, 제 33권 제2호, 2006.10
- 최길영, 성낙선, 모희숙, 박찬원, 권성호, 'RFID 기술 및 표준화동향,' 전자통신동향분석 제22권 제3호, 2007. 6
- 산은경제연구소. 'RFID산업의 동향과 전망,' 2007.09
- EPCglobal. 'The EPCglobal architecture framework final version,' July 1,2005
- EPCglobal. 'EPC Information Services(EPCIS) Version 1.0 Specification,' April 12, 2007
- EPCglobal. 'Object Naming Service(ONS) Version 1.0,' October 4,2005
- EPCglobal, 'EPCglobal Tag Data Standard Version 1.3 Ratified Specification,' http://www.epcglobalinc.org, March 8, 2006
- EPCglobal, 'Reader Protocol Standard, Version 1.1 Ratified Standard,' http://www.epcglobalinc.org, June 21, 2006
- NIST(National Institute of Standards and Technology). 'Guidelines for Securing Radio Frequency Identification System,' April, 2007
- EPCglobal, 'EPCglobal Data Exchange Joint Discussion Group,' September 19, 2006
- A Basic Introduction to RFID Technology and Its use in the Supplychain, http://www.printronix.com/uploadedFiles/Laran_WhitePaper_RFID.pdf, January 2004
- N.Mayer, A. Rifaut and E.Dubois, 'Towards Risk-Based Security Requirements Engineering Framework,' In Proceedings of the 11the International Workshop on Requirements Engineering: Foundation for Software Quality, 2005
- L.Liu, E.S.K.Yu and J.Mylopoulus, 'Security and Privacy Requirements Analysis within a Social Setting,' In Proceedings of the 11the IEEE International Workshop on Requirements Engineering Conference, 2003
- S.Lee, R.Gandhi and G.Ahn 'Security Requirements Driven Risk Assessment for Critical Infrastructure Information Systems,' In Proceedings of the 3rd Symposium on Requirements Engineering for Information Security, 2005
- A. Poniszewska-Maranda, 'Role Engineering of information system using extended RBAC,' In Proceedings of the 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise, WETICE 2005 https://doi.org/10.1109/WETICE.2005.50
- P. Epstein, R. Sandhu, 'Toward A Uml Based Approach to Role Engineering,' In Proceedings of the fourth ACM workshop on Role-based access control table of contents, 1999 https://doi.org/10.1145/319171.319184
- I. Ray, N. Li, R. France, 'Using UML To Visualize Role-Based Access Contol Constraints,' In Proceedings of the ninth ACM symposium on Access control models and technologies table of contents, 2004 https://doi.org/10.1145/990036.990054