Digital Library
Search: "[ author: 엄정호 ]" (3)
An Architecture of a Dynamic Cyber Attack Tree: Attributes Approach
Jung-Ho Eom,
Vol. 21, No. 3, pp. 67-74,
Jun.
2011
10.13089/JKIISC.2011.21.3.67
Keywords: IM-ACM, Insider threat, access control
10.13089/JKIISC.2011.21.3.67
Keywords: IM-ACM, Insider threat, access control
An Architecture of Access Control Model for Preventing Illegal Information Leakage by Insider
Jung-Ho Eom,
Seon-Ho Park,
Tai-M. Chung,
Vol. 20, No. 5, pp. 59-68,
Oct.
2010
10.13089/JKIISC.2010.20.5.59
Keywords: IM-ACM, Insider threat, access control
10.13089/JKIISC.2010.20.5.59
Keywords: IM-ACM, Insider threat, access control
A Study on Architecture of Access Control System with Enforced Security Control for Ubiquitous Computing Environment
Jung-Ho Eom,
Seon-Ho Park,
Tai-Myoung Chung,
Vol. 18, No. 5, pp. 71-82,
Oct.
2008
10.13089/JKIISC.2008.18.5.71
Keywords: ubiquitous computing security, access control, context aware task-role based access control system
10.13089/JKIISC.2008.18.5.71
Keywords: ubiquitous computing security, access control, context aware task-role based access control system
Category Search
Publications
-
Vol. 34, 2024
-
Vol. 33, 2023
-
Vol. 32, 2022
-
Vol. 31, 2021
-
Vol. 30, 2020
-
Vol. 29, 2019
-
Vol. 28, 2018
-
Vol. 27, 2017
-
Vol. 26, 2016
-
Vol. 25, 2015
-
Vol. 24, 2014
-
Vol. 23, 2013
-
Vol. 22, 2012
-
Vol. 21, 2011
-
Vol. 20, 2010
-
Vol. 19, 2009
-
Vol. 18, 2008
-
Vol. 17, 2007
-
Vol. 16, 2006
-
Vol. 15, 2005
-
Vol. 14, 2004
-
Vol. 13, 2003
-
Vol. 12, 2002
-
Vol. 11, 2001
-
Vol. 10, 2000
-
Vol. 9, 1999
-
Vol. 8, 1998
-
Vol. 7, 1997
-
Vol. 6, 1996
-
Vol. 5, 1995
-
Vol. 4, 1994
-
Vol. 2, 1992
-
Vol. 1, 1991