참고문헌
- J. G. Choi & B. N. Noh. (2011). Security Technology Research in Cloud Computing Environment. Journal of Security Engineering, 8(3), 371-384.
- Y. S. Jeong. (2015). An Efficiency Management Scheme using Big Data of Healthcare Patients using Puzzy AHP. Journal of Digital Convergence, 13(4), 227-233. https://doi.org/10.14400/JDC.2015.13.4.227
- Y. S. Jeong. (2016). An Efficient IoT Healthcare Service Management Model of Location Tracking Sensor. Journal of Digital Convergence, 14(3), 261-267. https://doi.org/10.14400/JDC.2016.14.3.261
- Y. S. Jeong. (2016). Measuring and Analyzing WiMAX Security adopt to Wireless Environment of U-Healthcare. Journal of Digital Convergence, 11(3), pp. 279-284. https://doi.org/10.14400/JDPM.2013.11.3.279
- A. Singh & K. Chatterjee. (2017). Cloud security issues and challenges: A survey. Journal of Network and Computer Applications, 79, 88-115. https://doi.org/10.1016/j.jnca.2016.11.027
- S. Singh, Y.-S. Jeong & J. H. Park. (2016). A survey on cloud computing security: Issues, threats, and solutions. Journal of Network and Computer Applications, 75, 200-222. https://doi.org/10.1016/j.jnca.2016.09.002
- J. Zhang, H. Huang & X. Wang. (2016). Resource provision algorithms in cloud computing: A survey. Journal of Network and Computer Applications, 64, 23-42. https://doi.org/10.1016/j.jnca.2015.12.018
- V. Varadharajan & U. Tupakula. (2014). Security as a service model for cloud environment. IEEE Transactions on Network and Service Management, 11(1), 60-75. https://doi.org/10.1109/TNSM.2014.041614.120394
- A. Iera, G. Morabito & L. Atzori. (2016). The internet of things moves into the cloud. Proceedings of the 2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW), 191-191.
- H. N. Saha, A. Mandal & A. Sinha. (2017). Recent trends in the internet of things. Proceedings of the 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), 1-4.
- A. Celesti, D. Mulfari, M. Fazio, M. Villari & A. Puliafito. (2016). Exploring container virtualization in iot clouds. Proceedings of the 2016 IEEE International Conference on Smart Computing (SMARTCOMP), 1-6.
- K. S. Dar, A. Taherkordi & F. Eliassen. (2016). Enhancing dependability of cloud-based iot services through virtualization. Proceedings of the 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI), 106-116.
- Y. S. Jeong & S. H. Lee. (2015). Personal Information Leakage Prevention Scheme of Smartphone Users in the Mobile Office Environment. Journal of Digital Convergence, 13(5), 205-211. https://doi.org/10.14400/JDC.2015.13.5.205
- B. Anggorojati, N. R. Prasad & R. Prasad. (2014). Secure capability-based access control in the m2m local cloud platform. Proceedings of the 2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace Electronic Systems (VITAE), 1-5.
- A. Ouaddah, H. Mousannif, A. A. Elkalam & A. A. Ouahman. (2017). Access control in the internet of things: Big challenges and new opportunities. Computer Networks, 112, 237-262. https://doi.org/10.1016/j.comnet.2016.11.007
- R. S. Sandhu & P. Samarati. (1994). Access control: Principle and practice. Comm. Mag., 32(9), 40-48.
- A. Ouaddah, A. A. Elkalam & A. A. Ouahman. (2017). Towards a Novel Privacy-Preserving Access Control Model Based on Blockchain Technology in IoT. Cham: Springer International Publishing, 523-533.