참고문헌
- Abadi, M. et al., "Certified E-mail with a light on Line Trusted Third Party: Design and Implementation," Proceedings of the Eleventh International World Wide Web Conference, Vol.2, pp.387-395, May, 2002.
- Pollock, S. "A Rule-Based Message Filtering System," ACM Transactions on Office Information Systems, vol. 6, no. 3, pp.232-254, July 1988. https://doi.org/10.1145/45945.214327
- Cynthia, D. and N, Moni "Pricing via processing or combatting junk mail," In Proceedings of Advances in Cryptology - CRYPTO' 92, pp 139-147, 1992.
- Wendy E. Mackay, "Diversity in the Use of Electronic Mail:A preliminary Inquiry," ACM Transactions on Office Information Systems, vol. 6, no. 4, pp.380-397, Oct. 1988. https://doi.org/10.1145/58566.58567
- Lawrence E. Hughes, "Internet E-mail; Protocols, Standards, and Implementation," Artech House, 1998.
- Young soo, kim, "Design and Implementation of Authentication Protocol in the Message Security System," Ph.D. of MIS Paper, Kookmin University, 2003.
- David A. Turner, Daniel M. Havey, Controlling spam through lightweight currency," In Proceedings of the Hawaii International Conference on Computer Sciences, pp.1-9, 2003.
- Jajodia, S., et al., "Flexible Support for Multiple Access control Policies," ACM Trans. on Database Systems, vol. 26, no. 2, pp. 214-260, June 2001. https://doi.org/10.1145/383891.383894
- Sandhu, R., et al., "Role Based Access Control Models," IEEE Computer, vol. 29, no. 2, pp. 38-47, Feb. 1996.
- Yao. C., "Theory and applications of trapdoor functions," in Proceedings of the Twenty-Third Annual IEEE Symposium on Foundations of Computer Science, pp. 80-91, 1982.
- Telang, R. "Information Overload and Pricing of Communication Services," Carnegie Mellon University Working Paper, 2002.
- Fahlman, S., "A way to control unwanted E-mail and telephone calls," IBM Systems Journal, vol. 41, no. 4, pp.759-766, June, 2002. https://doi.org/10.1147/sj.414.0759
- Hoffman, P. "SMTP service extension for secure SMTP over Transport Layer Security," IETF, RFC3207, Feb. 2002.
- Jonscher, D., R, Dittrich, "A Configurable Access Control System Interoperable Environment," In Proceedings of the ninth annual IFIP TC11 WG11.3 working conference on Database security IX, pp43-60, 1996.
- Joshi, J.B.D. et al., "Security Models for Web-based Applications," Communications of the ACM, vol. 44, no. 2, pp. 38-44, Feb. 2001.
피인용 문헌
- 분석단계에서 접근 통제의 보안 요건 정의 vol.19, pp.11, 2013, https://doi.org/10.9708/jksci.2014.19.11.097