References
- M. J. Convington, et al., "Generalized Role-Based Access Control for Securing Future Applications," Proc of the 23th National Information Systems Security Conference, Baltimore, 2000, pp.115-125.
- M. J. Moyer and M. Ahamad, "Generalized Role- Based Access Control," Proc of IEEE International Conference on Distributed Computing Systems, 2001, pp.391-398.
- David F. Ferraiolo and D. Richard Kuhn, "Role- Based Access Controls," Proc of the 15th National Computer Security Conf, Baltimore MD, 1992, pp.554-563.
- Seung-Jwa Nam and Seog Park, "Context Conflicts of Role-Based Access Control in Ubiquitous Computing Environment," Journal of the Korea Institute of Information Security and Cryptology, 15(2), 2005, pp.37-52.
- R. S. Sandhu, et al., "Role-based Access Control Models," IEEE Computer, 29(2), February 1996, pp. 38-47. https://doi.org/10.1109/2.485845
- http://csrc.nist.gov/rbac/NIST.
- M. J. Convington, et al., "A Context-Aware Security Architecture for Emerging Applications," Proc of the 18th Annual Computer Security Applications Conferences, 2002, pp.249-258.
- Hyun-Soo Im et al., "The Model of Conflict Detection between Permission Assignment Constraints inRole-Based Access Control," Proc. of 2005 fall The Korea Society for Simulation Conference, 2005, pp.51-55.
- J. Bezdek, "A convergence theorem for the fuzzy ISODATA clustering algorithm," IEEE Trans. Pattern Anal. Machine Intelligence, PAMI2(1), 1980, pp.1-8.
- Moonjin Jeon et al., "Hand Gesture Recognition using Multivariate Fuzzy Decision Tree and User Adaptation," J. of Korea Robotics Society, 3(2), 2008, pp.81-90.
- Sung-Kwun Oh, Computational Intelligence by Programming focused on Fuzzy, Neural Networks, and Genetic Algorithms, Naeha Publishing Co., 2002.
- R.L.P Chang, T. Pavlidis, "Fuzzy Decision Tree Algorithms," Systems, Man and Cybernetics, IEEE Transactions, 7(1), 1977, pp.28-35. https://doi.org/10.1109/TSMC.1977.4309586
- Woo-Hang Lee, Keon-Myung Lee, "Fuzzy Decision Tree Induction to Obliquely Partitioning a Feature Space," Journal of KIISE : software and applications, Vol.29, No.3, 2002, pp.156-166.
- Teuvo Kohonen, Self-Organizing Maps (3rd), Springer, 2001.
- Rhee Hyunsook, "An Adaptive Classification Model Using Incremental Training Fuzzy Neural Networks," Journal of Fuzzy Logic and Intelligent Systems, Vol.16, No.6, 2006, pp.736-741. https://doi.org/10.5391/JKIIS.2006.16.6.736
- Keon-Myung Lee, "Classification Rule Mining from Fuzzy Data based on Fuzzy Decision Tree," J. of KIISE : software and applications, 28(1), 2001, pp.64-72.
- E. Brickell, et al., "Direct Anonymous Attestation," In Proc of 11th ACM Conference on Computer and Communications Security, ACM Press, 2004 Practical Solutions to Identification and Signature Problems, ACPC 86, LNCS, 1987.
- TCG, TCG Specification Architecture Overview Specification Revision 1.3, 2007.
- R.L. Keeney and H. Raiffa, Decisions with Multiple Objectives: Preferences and Value Tradeoffs, John Wiley & Sons, New York, NY, 1976.
- L. Martignon and U. Hoffrage, Why Does One-Reason Decision Making Work? In Simple Heuristics That Make Us Smart, Oxford University Press, New York, 1999, pp. 119-140.