Browse > Article

상황 인식 보안에 관한 고찰  

Jeong Mok-Dong (부경대학교 전자컴퓨터정보통신공학부)
Keywords
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 M.Weiser, Ubiquitous Computing, http://www.ubiq.com/hypertext/weiser/
2 M.Weiser, 'The Computer for the Twenty-First Century,' Scientific American, pp. 94-10, September 1991
3 B.Schildt and M.Theimer, 'Diseminating Active Map Information to Mobile Hosts,' IEEE Networks, 8(5), 1994, pp.22-32   DOI   ScienceOn
4 A.K.Dey, Providing Architectural Support for Building Context-Aware Applications, PhD Thesis, College of Computing, Georgia Institute of Technology, 2000
5 http://iceberg.cs.berkley.edu/
6 임신영, 허재두, '상황인식 컴퓨팅 응용 기술 동향,' 전자통신동향분석, 19권, 5호, 2004, pp.31-40
7 R.L.Keeney and H.Raiffa, Decisions with Multiple Objectives: Preferences and Value Tradeoffs, John Wiley & Sons, New York, NY, 1976
8 남승좌, 박석, '유비쿼터스 컴퓨팅 환경의 역할 기반 접근제어에서 발생하는 상황충돌,' 정보보호학회논문지, 15권 2호, 2005, pp.37-52   과학기술학회마을
9 M.J.Convington, et al., 'Generalized Role-Based Access Control for Securing Future Applications,' In Proc of 23rd National Information Systems Security Conference(NISSC), Baltimore, Oct.2000, pp.115-125
10 D.Saha and A. Mukherjce, 'Pervasive Computing: A Paradigm for the 21st Century,' IEEE Computer, March 2003, pp.25-31
11 김효남, 박용, '유비쿼터스 컴퓨팅환경에서 상황인식 미들웨어 설계,' 한국컴퓨터 정보학회논문지, 10권, 5호, 2005, pp.115-122
12 M.J.Covington, et al., 'A Context-Aware Security Architecture for Emerging Applications,' In Proc. of the 18th Annual Computer Security Applications Conferences (ACSAC'02), 2002., pp. 249-258
13 http://www.warentest.de/
14 J.A. Muhatadi, et al., 'Cerberus: A Context-Aware Security Scheme for Smart Spaces,' In Proc. of the First International Conference on Pervasive Computing and Communications (PerCom'03), 2002
15 심춘보, 신용원, '유비쿼터스 컴퓨팅환경에서 상황인식을 지원하는 컨텍스트 미들웨어 개발,' 한국지능정보시스템학회논문지, 11권, 1호, 2005, pp.53-63
16 G.K.Mostefaoui, et al., 'Context-Aware Computing: A Guide for the Pervasive Computing Community,' In Proc. of the IEEE/ACS International Conference on Pervasive Services (ICPS'04), 2004
17 M.J. Moyer and M.Ahamad, 'Generalized Role-Based Access Control,' In proc of IEEE Int'l Conf. on Distributed Computing Systems(ICDSC2001), Mesa, April 2001, pp.391-398
18 http://csrc.nist.gov/rbac/NIST
19 R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E.Youman., 'Role-based access control models,' IEEE Computer, Vol. 29, No. 2, February 1996, pp. 38- 47
20 M. Chung and V. Honavar, 'A Negotiation Model in Agent-mediated Electronic Commerce,' In Proc. of the IEEE International Symposium on Multimedia Software Engineering, Taipei, Dec. 2000, pp. 403-410