References
- 조은선, 민영목, "상황인식 시스템 모델링을 위한 정형화 프레임워크", 전자공학회논문지, 제 46권 CI편, 제2호, 2009년 3월.
- R. S. Sandu, E. J. Coyne, H.L. Feinstein, and C. E. Youman, "Role-based access control models", IEEE computer, 29(2): pp. 38-47, 1996. https://doi.org/10.1109/2.485845
- R. S. Sandhu, D.F. Ferraiolo and D.R. Kyhn, "The Nist Model for Role Based Access Control: Toward a Unified Standard", in Proc. of 5th ACM Workshop on Role Based Access Control, pp. 47-63, 2000.
- Roshan K. Thomas, "Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments". in Proc. of the second ACM workshop on Role-based access control, pp. 13-19, 1997.
- Fahad T. Alotaiby and J. X. Chen, "A Model for Team-based Access Control (TAMC 2004)", in Proc. of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004.
- R. Wishart, K. Henricksen, and J. Indulska, " Context Obfuscation for Privacy via Ontological Descriptions", in Proc. of the International Workshop on Location and Context-Awareness 2005, pp. 276-288, 2006.
- I.T. Emin, "Context Data Model for Privacy", Prime Standardization Workshop, 2006.
- P. Samarati, "Protecting Respondent's Identities in Microdata Release", IEEE Transactions on Knowledge and Data Engineering, vol. 13, pp. 1010-1027, 2001. https://doi.org/10.1109/69.971193
- Latanya Sweeney, "Achieving k-Anonymity Privacy Protection using Generalization and Suppression", International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10 (5), pp. 557-570, 2002. https://doi.org/10.1142/S0218488502001648
- A. Machanavajjhala, J. Gehrke, D. Kifer and M. Venkitasubramaniam, "l-diversity: Privacy beyond k-anonymity", in Proc. of 22nd International Conference of Data Engineering, page. 24, 2006
- N. Li, T. Ki and S. Venkitasubramaniam, "t-closeness: Privacy Beyound k-Anonymity and l-Diversity", in Proc. of IEEE International Conference on Data Engineering, 2007.
- M. Ctacey and C. McGregor, "Temporal abstraction in intelligent clinical data analysis: A survey", Artifical intelligence in Medicine, 39, pp. 1-24, 2007. https://doi.org/10.1016/j.artmed.2006.08.002
- E.S. Cho, Y.S. Kim, M.P. Hong and W.D. Cho, "Fine-Grained View-based Access Control for RDF Cloaking", in Proc. of IEEE Ninth International Conference on Computer and Information Technology, 2009/
- 김현우, 변성호, 박희정, 이승환, 정유석, 조위덕, "유비쿼터스 지능공간에서 멀티모달센서를 이용한 향상된 u-헬스케어 서비스 구현에 대한 연구", 전자공학회논문지, 제46권 CI편, 제 2호, 2009년 3월.
- Extensible Markup Language (XML), http://www.w3.org/XML/
- Resource Description Framework (RDF), http://www.w3.org/RDF/
- Y.S. Kim, E.S. Cho and W.D. Cho, "Context Data Abstraction Framework using RDF", in Proc. of the 4th International Conference on Ubiquitous Information Management and Communication (ICUMIC 2010), January, 2010.
- P3P: The Platform for Privacy Preferences. http://www.w3.org/P3P/
- 서경원, "웹기반을 이용한 비만 학생의 운동프로그램 가발에 관한 연구", 충북대학교 석사논문, 2005년 2월