Acknowledgement
This Research was supported by Tongmyong University Research Grant 2021A023.
References
- S. H. Han, "TTY Session Audit Techniques for Linux Platform," in IEEE/ACIS International Conference on Big Data, Cloud Computing, and Data Science Engineering, Cham: Springer International Publishing, pp. 95-105, Feb. 2023. DOI: https://doi.org/10.1007/978-3-031-19608-9_8.
- R. Wadolowski, "Protection of classified information in Bosnia and Herzegovina and Croatia," Selected criminal and administrative regulations. Przeglad Bezpieczenstwa Wewnetrznego, vol. 14, no. 27, pp. 276-299, Dec. 2022. DOI: https://doi.org/10.4467/20801335PBW.22.059.16950.
- V. S. Tchamyou, "The role of information sharing in modulating the effect of financial access on inequality," Journal of African Business, vol. 20, no. 3, pp. 317-338, Mar. 2019. DOI: https://doi.org/10.1080/15228916.2019.1584262.
- J. L. Peterson, "Confidentiality in medicine: how far should doctors prioritise the confidentiality of the individual they are treating?,"Postgraduate medical journal, vol. 94, no. 1116, pp. 596-600, Oct. 2018. DOI: https://doi.org/10.1136/postgradmedj-2018-136038.
- P. Yang, N. Xiong, and J. Ren, "Data security and privacy protection for cloud storage: A survey," IEEE Access, vol. 8, pp. 131723-131740, Jul. 2020. DOI: https://doi.org/10.1109/ACCESS.2020.3009876.
- G. R. Tsochev, R. D. Yoshinov, and O. P. Iliev, "Key problems of the critical information infrastructure through SCADA systems research," Информатика и автоматизация, vol. 18, no. 6, pp. 1333-1356, Dec. 2019. DOI: https://doi.org/10.15622/sp.2019.18.6.1333-1356.
- Z. N. Mohammad, F. Farha, A. O. Abuassba, S. Yang, and F. Zhou, "Access control and authorization in smart homes: A survey," Tsinghua Science and Technology, vol. 26, no. 6, pp. 906-917, Jun. 2021. DOI: https://doi.org/10.26599/TST.2021.9010001.
- M. P. K. Bachhav and M. M. A. Amritkar, "Secure Data Access Control and Efficient CP-ABE for Multi Authority Cloud Storage with Data Mirroring," in International Conference On Emanations in Modern Technology and Engineering, vol. 5, no. 3, pp. 19-22, 2017.
- H. E. R. Hassan, M. Tahoun, and G. S. ElTaweel, "A robust computational DRM framework for protecting multimedia contents using AES and ECC," Alexandria Engineering Journal, vol. 59, no. 3, pp. 1275-1286, Jun. 2020. DOI: https://doi.org/10.1016/j.aej.2020.02.020.
- C. C. Lee, C. T. Li, Z. W. Chen, Y. M. Lai, and J. C. Shieh, "An improved E-DRM scheme for mobile environments," Journal of information security and applications, vol. 39, pp. 19-30, Apr. 2018. DOI: https://doi.org/10.1016/j.jisa.2018.02.001.
- P. Kaushik, K. Joshi, J. Pandey, and T. Garg, "Statistical Deformity in Steganogrpahy and its Overcomings," Journal of Emerging Technologies and Innovative Research, vol 5, no. 6, pp. 697-710, Jun. 2018.
- E. Sultanow, M. Tobolla, A. Ullrich, and G. Vladova, "Visual Analytics Supporting Knowledge Management," in i-KNOW, Oct. 2017.
- K. Matsuzawa, M. Hayasaka, and T. Shinagawa, "The quick migration of file servers," in Proceedings of the 11th ACM International Systems and Storage Conference, pp. 65-75, 2018. DOI: https://doi.org/10.1145/3211890.3211894.
- H. K. Lee, S. H. Han, and D. Lee, "Kernel-Based Container File Access Control Architecture to Protect Important Application Information," Electronics, vol. 12, no. 1, pp. 52, Dec. 2022. DOI: https://doi.org/10.3390/electronics12010052.
- S. H. Han and D. Lee, "Kernel-based real-time file access monitoring structure for detecting malware activity," Electronics, vol. 11, no. 12, pp. 1871, Apr. 2022. DOI: https://doi.org/10.3390/electronics11121871.
- S. Cho, S. Hwang, W. Shin, N. Kim, and H. P. In, "Design of military service framework for enabling migration to military SaaS cloud environment," Electronics, vol. 10, no. 5, pp. 572, Mar. 2021. DOI: https://doi.org/10.3390/electronics10050572.
- L. Yang, Z. Han, Z. Huang, and J. Ma, "A remotely keyed file encryption scheme under mobile cloud computing," Journal of Network and Computer Applications, vol. 106, pp. 90-99, Mar. 2018. DOI: https://doi.org/10.1016/j.jnca.2017.12.017.
- H. Wang, "A Password-Based Access Control Framework for Time-Sequence Aware Media Cloudization," Cryptology ePrint Archive, Oct. 2022.
- D. Cho, S. Hwang, and G. Jeong, "DRM market system for media service platform supporting multi-DRM in cloud environment," Advanced Science Letters, vol. 23, no. 12, pp. 12721-12724, Dec. 2017. DOI: https://doi.org/10.1166/asl.2017.10886.
- A. E. Guvercin and B. Avenoglu, "Performance Analysis of Object- Relational Mapping (ORM) Tools in. Net 6 Environment," Bilisim Teknolojileri Dergisi, vol. 15, no. 4, pp. 453-465, Oct. 2022. DOI: https://doi.org/10.17671/gazibtd.1059516.