|
|
|
|
|
|
|
|
|
|
|
Authorization Conflict Problems in Combining RIF Rules with RDF Data Jaehoon KIM | Publication: IEICE TRANSACTIONS on Information and Systems
Publication Date: 2015/04/01
Vol. E98-D
No. 4 ;
pp. 863-871
Type of Manuscript:
PAPER
Category: Data Engineering, Web Information Systems Keyword: access control, RDF, RIF, authorization conflict, inference, | | Summary | Full Text:PDF(1.6MB) | |
|
Access Control to Prevent Malicious JavaScript Code Exploiting Vulnerabilities of WebView in Android OS Jing YU Toshihiro YAMAUCHI | Publication: IEICE TRANSACTIONS on Information and Systems
Publication Date: 2015/04/01
Vol. E98-D
No. 4 ;
pp. 807-811
Type of Manuscript:
Special Section LETTER (Special Section on Information and Communication System Security―Against Cyberattacks―)
Category: Access Control Keyword: Android, WebView, static analysis, access control, | | Summary | Full Text:PDF(331.3KB) | |
|
|
|
|
|
|
|
|
|
|
|
|
|
Secure Authentication Scheme with Improved Anonymity for Wireless Environments JongHyup LEE Taekyoung KWON | Publication: IEICE TRANSACTIONS on Communications
Publication Date: 2011/02/01
Vol. E94-B
No. 2 ;
pp. 554-557
Type of Manuscript:
LETTER
Category: Fundamental Theories for Communications Keyword: access control, identification, authentication, | | Summary | Full Text:PDF(213.8KB) | |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
uT-RBAC: Ubiquitous Role-Based Access Control Model Song-hwa CHAE Wonil KIM Dong-Kyoo KIM | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A
No. 1 ;
pp. 238-239
Type of Manuscript:
Special Section LETTER (Special Section on Cryptography and Information Security)
Category: Access Control Keyword: access control, RBAC, ubiquitous computing, | | Summary | Full Text:PDF(86.9KB) | |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Cryptanalysis and Improvement of Two Access Control Schemes with User Authentication in a Distributed Computer Network Narn-Yih LEE | Publication: IEICE TRANSACTIONS on Information and Systems
Publication Date: 2002/02/01
Vol. E85-D
No. 2 ;
pp. 386-391
Type of Manuscript:
PAPER
Category: Applications of Information Security Techniques Keyword: cryptography, cryptanalysis, access control, user authentication, | | Summary | Full Text:PDF(204.5KB) | |
|
|
|
|
|
An Improvement of Novel Cryptographic Key Assignment Scheme for Dynamic Access Control in a Hierarchy Min-Shiang HWANG | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/03/25
Vol. E82-A
No. 3 ;
pp. 548-550
Type of Manuscript:
LETTER
Category: Information Security Keyword: cryptography, access control, user hierarchy, | | Summary | Full Text:PDF(76.7KB) | |
|
|
|
|
|
|
|
|
|
|
|
|
|
A Hierarchical and Dynamic Group-Oriented Cryptographic Scheme Shiuh-Jeng WANG Jin-Fu CHANG | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/01/25
Vol. E79-A
No. 1 ;
pp. 76-85
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Keyword: access control, security class, group-oriented, secret sharing, | | Summary | Full Text:PDF(794.8KB) | |
|
|
|
|
|
|
|