Detailed Information

Cited 0 time in webofscience Cited 1 time in scopus
Metadata Downloads

Design of the architecture for agent of the personality security in the ubiquitous environment

Full metadata record
DC Field Value Language
dc.contributor.authorLee, E.-S.-
dc.contributor.authorLee, S.H.-
dc.date.available2019-04-10T11:15:54Z-
dc.date.created2018-04-17-
dc.date.issued2008-
dc.identifier.isbn3540785817-
dc.identifier.issn0302-9743-
dc.identifier.urihttp://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/33535-
dc.description.abstractMany programs are exposed a threat in the ubiquitous system. In the result, we are attacked and discharge personal information from the many factors. When executing the various application programs of a computer generally or connecting with a specific site through the Internet A place with many examples into which carry out a user and the user-identification child (ID) and the password are made to enter in order to check a user's identity, If in agreement as compared with the identifier which a user inputs, ID which had the password registered, and a password, the authority to perform an applicable program, and the authority to use the various contents of an applicable site will be granted to the user. In this paper is provided the design of the user identification method in the ubiquitous environment. Also, We are make use of grid computing between host and targets. Therefore, This system is provide for the flexibility in the heterogeneous system. © 2008 Springer-Verlag Berlin Heidelberg.-
dc.relation.isPartOfLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)-
dc.titleDesign of the architecture for agent of the personality security in the ubiquitous environment-
dc.typeConference-
dc.identifier.doi10.1007/978-3-540-78582-8_45-
dc.type.rimsCONF-
dc.identifier.bibliographicCitation2nd KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications, KES-AMSTA 2008, v.4953 LNAI, pp.444 - 453-
dc.description.journalClass2-
dc.identifier.scopusid2-s2.0-47249150092-
dc.citation.conferenceDate2008-03-26-
dc.citation.conferencePlaceIncheon-
dc.citation.endPage453-
dc.citation.startPage444-
dc.citation.title2nd KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications, KES-AMSTA 2008-
dc.citation.volume4953 LNAI-
dc.contributor.affiliatedAuthorLee, S.H.-
dc.type.docTypeConference Paper-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Information Technology > School of Software > 2. Conference Papers

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Sang Ho photo

Lee, Sang Ho
College of Information Technology (School of Software)
Read more

Altmetrics

Total Views & Downloads

BROWSE