Showing results 1 to 9 of 9
A novel privacy preserving authentication and access control scheme for pervasive computing environments Ren, K; Lou, WJ; Kim, Kwangjo; Deng, R, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, v.55, pp.1373 - 1384, 2006-07 |
An Enhanced Rule-Based Web Scanner Based on Similarity Score Lee, Minsoo; Lee, Younho; Yoon, Hyunsoo, ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, v.16, no.3, pp.9 - 14, 2016 |
Filtering XPath expressions for XML access control Jeon, JM; Chung, YD; Kim, Myoung Ho; Lee, Yoon Joon, COMPUTERS & SECURITY, v.23, no.7, pp.591 - 605, 2004 |
Reactive key management scheme for access control in group communications Kim, H; Lee, Y; Park, Y; Yoon, Hyunsoo, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E90B, pp.982 - 986, 2007-04 |
RoleCast: Finding Missing Security Checks When You Do Not Know What Checks Are Son, Sooel; McKinley, Kathryn S.; Shmatikov, Vitaly, ACM SIGPLAN NOTICES, v.46, no.10, pp.1069 - 1083, 2011-10 |
The dynamic predicate: integrating access control with query processing in XML databases Lee, Jae-Gil; Whang, Kyu-Young; Han, Wook-Shin; Song, Il-Yeol, VLDB JOURNAL, v.16, pp.371 - 387, 2007-07 |
술어를 이용한 내용 의존적 권한부여 기법 홍성림; 박창원; 정진완, 정보과학회논문지 : 데이타베이스, v.30, no.1, pp.1 - 13, 2003-02 |
신뢰성 있는 브로드캐스트 암호화를 위한 자가 키 복구 기법 허준범; 윤현수, 정보과학회논문지 : 정보통신, v.36, no.6, pp.471 - 480, 2009-12 |
접근 제어를 위한 반응적 방식의 그룹키 관리 기법 김희열; 이윤호; 박용수; 윤현수, 정보과학회논문지 : 시스템 및 이론, v.34, no.11, pp.589 - 598, 2007-12 |
Discover