1 |
J. Jung & J. Kim, (2015). A study on Development of Certification Schemes for Cloud Security, Journal of Digital Convergence, 13(6). 81-89.
DOI
|
2 |
S. Farrell. & T. C. Dublin. (2010). An Internet Attribute Certificate Profile for Authorization. IETF.:RFC 5755.
|
3 |
Y. J. Cho. (2017). National Smart Factory Strategy for The 4th Industrial Revolution. Joutnal of Korea Information Science society, 41.
|
4 |
O. Novo. (2018). Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT. IEEE IoT Journal, 5(2).
|
5 |
J. Park. & K. Lee. (2017). Realization of user-centered smart factory system using motion recognition. Joutnal of Convegence. &(6). pp.153-158.
|
6 |
S. H. Lee. & D. W. Lee. (2016). A study on u-Health Fusion Field based on Internet of Thing. Journal of the Korea Convergence Society, l7(4), 19-24.
|
7 |
I. S. Jeon. (2016). Curriculum Development for Smart Factory Informaton Security Awareness Training. Journal of KIISC, 26(5).
|
8 |
S. H. Hong & S. H. Park. (2017). The Research on Blockchain-based secure IoT authentication. Journal of the Korea Convergence Society, l8(11), 57-62.
|
9 |
S. K. Hong & C. R. Seo. (2018). Developing a Blockchain based Accounting and Tax Information in the 4th Industrial Revolution. Joutnal of the Korea Convegence Society, 9(3), 45-51.
|
10 |
K. Blockchains. (2016). Blockchains and Smart Contracts for the Internet of Things. IEEE Access, 4, 2292-2303.
DOI
|
11 |
D. F. Ferraiolo. (2001). Proposed NIST Standard for Role-Based Access Control. ACM Tranon InfoSystemSecurity, 14(3), 224-274.
|
12 |
S. H. Hong. & H. J. Shin. (2017). Analysis of the Vulnerability of the IoT by the Scenario. Journal of the Korea Convergence Society, l8(9), 1-7.
|
13 |
Y. S. Jeong. (2018). User Privacy Security Scheme using Double Replication Key in the Cloud Environment. Journal of the Korea Convergence Society, 9(4), 9-14.
DOI
|
14 |
R. Sandhu. & C. Youman. (1996). Role-Based Access Control Models. IEEE Computer, 29(2).
|
15 |
H. Kim. & S. Pan. (2016). Technology Trends, Research and Design of AIM Framework for Authentication Information Management. Journal of Digital Convergence, 14(7), 373-383.
DOI
|
16 |
J. P. Cruz. & Y. Kaji. (2018). Role-based Access Control using Smart Contract. IEEE Access, 6, 12240-12251.
DOI
|
17 |
N. H. Kim. (2018). Secure MQTT protocol based on Attribute-based Encryption Scheme. Journal of KIISE, 45(3), 195-199.
DOI
|
18 |
Y. S. Jeong. & K. H. Han. (2017). A hierarchical property based multi-level approach method for improves user access control in a cloud environment. Journal of the Korea Convergence Society, l8(11), 67-73.
|