1 |
Jajodia, S., et al., 'Flexible Support for Multiple Access Policies,' ACM Trans. on Database Systems pp. 214-260, Jun.. 2001
|
2 |
Sandhu, R., et al., 'Role Based Access Control Models,' IEEE Computer, 29(2), 1996
|
3 |
Abadi, M. et al., 'Certified E-mail with a light on Line Trusted Third Party: Design and Implementation,' Proceedings of the Eleventh International World Wide Web Conference pp.387-395,May, 2002
|
4 |
Telang, R. 'Information Overload and Pricing of Communication Services,' Carnegie Mellon University Working Paper, 2002
|
5 |
Hoffman, P. 'SMTP service extension for secure SMTP over Transport Layer Security,' RFC3207 Feb., 2002
|
6 |
Mackay, E. 'Diversity inthe Use of Electronic Mail,' ACM Transactions on Office Information Systems, pp.380-397, 1998
|
7 |
Fahlman, S., 'A way to control unwant ed E-mail and telephone calls,' IBM Systems Journal 41, pp.759-766, June, 2002
DOI
ScienceOn
|
8 |
Jonscher, D., R, Dittrich, 'A Configurable Access Control System Interoperable Environment,' Database Security IX, Chapman and Hall. 1996
|
9 |
Joshi, J.B.D. et al., 'Security Models for Web-based Applications,' Communications of the ACM, 2. pp. 44-52, 2001
|
10 |
Pollock, S. 'A Rule-Based Message Filtering System,' ACM Transactions on Office Information Systems, pp.232-254, 1998
|
11 |
Cynthia, D. and N, Moni 'Pricing via processing or combatting junk mail,' In Processings of Crypto, pp 139-147, 1992
|
12 |
Hughes, L. 'Internet E-mail; Protocols, Standards, and Implementation,' Artech house, Norwood, MA, 1998
|
13 |
Abadi, M. et al., 'Certified E-mail with a light on Line Trusted Third Party: Design and Implementation,' n Proceedings of the Eleventh International World Wide Web Conference pp.387-3 95, May, 2002
|
14 |
김영수, 메시지보안시스템의 인증 프로토콜 설계 및 검증', 박사학위논문, 국민대학교 대학원, 2003
|
15 |
David, A. M. Daniel 'Controlling spam through lightweight currency,' In Proceedings of the Haeaii Internatio nal Conference on Computer Science, Jan. 2004
|
16 |
Yao. C., 'Theory and applications of trapdoor functions,' In Proceedings of the Twenty-Third Annual IEEE Symposium on Foundations of Computer Science, pp. 80-91, 1982
|