Extraction Security Indexing Value to use Story-Telling and Attribute-Based Encryption Scheme considering on Big Data Environment
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Song, You-jin | - |
dc.contributor.author | Kang, Jang-mook | - |
dc.date.accessioned | 2021-09-04T13:55:36Z | - |
dc.date.available | 2021-09-04T13:55:36Z | - |
dc.date.created | 2021-06-18 | - |
dc.date.issued | 2015-08 | - |
dc.identifier.issn | 1738-9976 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/92901 | - |
dc.description.abstract | In the real world, especially for wearable context with the education information communicating, the diversified contexts need to be considered to apply the Attribute-Based Encryption. However, it is hard to design the optimized dynamic access structures because it is static access structures and properties of Attribute-Based Encryption. In this paper, we propose the attribute-based encryption using the algorithm of context-based service inference model to collect the attributes by data and to provide appropriate services by recognizing the situation. Especially it is analyzed that the students' answering process is sectionalized to several scenarios according to teachers' educational objective and plan in educational environment. And through the process it is described that the application of security policy and technology must be distinguished by tables. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | SCIENCE & ENGINEERING RESEARCH SUPPORT SOC | - |
dc.title | Extraction Security Indexing Value to use Story-Telling and Attribute-Based Encryption Scheme considering on Big Data Environment | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Kang, Jang-mook | - |
dc.identifier.scopusid | 2-s2.0-84950122488 | - |
dc.identifier.wosid | 000369378600025 | - |
dc.identifier.bibliographicCitation | INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, v.9, no.8, pp.283 - 292 | - |
dc.relation.isPartOf | INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | - |
dc.citation.title | INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | - |
dc.citation.volume | 9 | - |
dc.citation.number | 8 | - |
dc.citation.startPage | 283 | - |
dc.citation.endPage | 292 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.subject.keywordAuthor | Wearable Context | - |
dc.subject.keywordAuthor | Big Data | - |
dc.subject.keywordAuthor | Attribute-Based Encryption | - |
dc.subject.keywordAuthor | Bayesian Network | - |
dc.subject.keywordAuthor | Access Structure | - |
dc.subject.keywordAuthor | Education Information | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.