1 |
김동호, 정창원, 주수종, "분산 객체그룹 프레임워크의 보안 서비스를 지원하는 보안 정책 관리", 한국인터넷정보학회 학술지, 제8권 2호, 2007. 10.02-03, pp.149-152
|
2 |
Su Chong Joo, Chang Won Jeng, Seong Jin Park, "Context Based Dynamic Security Service for Healthcare Adaptive Application in Home Environments", 2009 Software Technologies for Future Dependable Distributed Systems(STFSSD. 2009.14) Tokyo, Japan 2009. 3. 17 pp 220-224
|
3 |
Reto Meier Professional Android Application Development Chapter 2 : Developing for Android, 2009. pp.20-29.
|
4 |
윤영민, 류한철, 정창원, 주수종, "상황정보 서비스를 위한 이기종 센서정보 관리" 한국인터넷정보학회 학술지, 제9권 1호, 2008.05.30-31, pp. 357-361.
|
5 |
Wullems, C., Looi, M., Clark, A., "Towards context-aware security: an authorization architecture for intranet environments", Pervasive Computing and Communications,. pp.132-137, 14-17 March, Orlando, Florida, USA. 2004.
|
6 |
Jalal Al-Muhtadi, Anand Ranganathan, Roy Campbel, and Dennis Mickunas, "Cerberus: A Context-Aware Security Scheme for Smart Space", In Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, pp.489-496, IEEE Computer Society, March 2003.
|
7 |
정목동, "상황 인식 보안에 관한 고찰", 情報保護學會誌 第16卷 第2號, 2006.4, pp.37-45.
|
8 |
이지연, 오민경, 창병모, 안준선, 도경구 "유비쿼터스 컴퓨팅을 위한 접근제어와 상황적응 시스템", 한국정보과학회 2006 가을 학술발표논문집, 제33권 제2호(B), 2006.10, pp.590-603
|
9 |
임신영, 허재두, "상황인식 컴퓨팅 응용 기술 동향" 전자통신동향분석 제19권 제5호 2004.10, pp.31-40.
|
10 |
J. Al-Muhtadi, M. Anand, M. D. Mickunas, and R.H. Campbel, "Secure smart homes using jini and uiuc sesame", Uiucdcs-r-99-2142, University of Illinois at Urbana Champaign, December 1999.
|
11 |
Antonio Lopes, Paulo Costa, Federico Bergenti, Matthias Klusch, Bastian Blankenburg, Thorsten Moller, Heiko Schuldt, "Context-aware Secure Service Composition Planning and Execution on E-Health Environments", European Conference on eHealth 2006, Proceedings of the ECEH'06, Fribourg, Switzerland, October 12-13, 2006, pp. 179-190.
|
12 |
Kiyeal Lee, Seokwan Yang, Sungik Jun and Mokdong Chung, "Context-Aware Security Service in RFID/USN Environments using MAUT and Extended GRBAC", Journal of Information Assurance and Security 2, 2007, pp.250-256.
|