1 |
B.P. Zeigler, H. Praehofer, and T.G. Kim, Theory of Modeling and Simulation, 2th Ed., Academic Press, Jan. 2000.
|
2 |
J. Niinimäki, A. Holopainen, J. Kerttula, and J. Reponen, "Security Development of a Pocket-Sized Teleradiology Consultation System," Studies in Health Technology and Informatics, pp. 1266-1270, Aug. 2001.
|
3 |
J. Burkhadrdt, T. Schaeck, S. Happer, K. Rindtorff, and T. Schaeck, "Pervasive computing: Technology and Architecture of mobile internet applications," Addison-Wesley Longman Publishing Co, Jan. 2001.
|
4 |
한영태, 민덕기, "이벤트 알림 서비스의 구조설계와 성능분석," 한국시뮬레이션학회 추계학술대회논문집, pp. 95-103, 2003년 11월.
|
5 |
B. Lee, "Users' Perspective on Regulation to Protect Privacy on the Web," The International Information & Library Review, pp. 379-402, Sep. 2000.
|
6 |
김은하, 조대호, "시스템 형식론에 의한 사용자 인터페이스 시스템 표현과 DEVS 모델링," 한국시뮬레이션학회논문지, 8(4), pp. 137-154, 1999년 12월.
|
7 |
I. Mavridis and G. Pangalos, "Security Issues in a Mobile Computing Paradigm," Informatics 97 security issues, pp. 61-76, Sep. 1997.
|
8 |
R. Sekar and P. Uppuluri, "Synthesizing Fast Intrusion Prevention / Detection Systems from High-Level Specifications," Proceedings of the 3rd USENIX Windows NT Symposium, pp. 12-15, July 1999.
|
9 |
S.P. Hong, S.M. Kang, K.G. Kim, and J.H. Jeoung, "Prototyping the Privacy-Based Policy Management System for Securely Using Privacy Information," WISA 2009, pp. 121-129, Aug. 2009.
|
10 |
N.M. Karnik and A.R. Tripathi, "Security in the Ajanta Mobile agent system," Software-Practice & Experience archive, pp. 301-329, May 1999.
|
11 |
장은영, 김형종, 황준, "개인정보 관리를 위한 메시지 트리 기반의 모바일 알람 시스템 구축," 정보보호학회논문지, 19(3), pp. 153-162, 2009년 6월.
|