The Concept of Delegation of Authorization and Its Expansion for Multi Domain Smart Grid System (English)
- New search for: Kim, Mijin
- New search for: Park, Namje
- New search for: Kim, Mijin
- New search for: Park, Namje
In:
GPC, International Conference on Grid and Pervasive Computing, 8
;
781-787
;
2013
-
ISSN:
- Conference paper / Print
-
Title:The Concept of Delegation of Authorization and Its Expansion for Multi Domain Smart Grid System
-
Contributors:Kim, Mijin ( author ) / Park, Namje ( author )
-
Published in:Lecture Notes in Computer Science ; 7861 ; 781-787
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2013
-
Size:7 Seiten
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Transparency in Cloud Business: Cluster Analysis of Software as a Service CharacteristicsRepschlaeger, J. et al. | 2013
- 11
-
Distributed Accounting in Scope of Privacy PreservingHilbrich, M. / Jakel, R. et al. | 2013
- 23
-
Distributed Virtual Machine Monitor for Distributed Cloud Computing Nodes IntegrationRuan, L. / Peng, J. / Xiao, L. / Zhu, M. et al. | 2013
- 32
-
Differentiated Policy Based Job Scheduling with Queue Model and Advanced Reservation Technique in a Private Cloud EnvironmentLoganathan, S. / Mukherjee, S. et al. | 2013
- 40
-
Scaling Out Recommender System for Digital Libraries with MapReduceChen, L.-C. / Kuo, P.-J. / Liao, I.-E. / Huang, J.-Y. et al. | 2013
- 48
-
Layering of the Provenance Data for Cloud ComputingImran, M. / Hlavacs, H. et al. | 2013
- 59
-
JCL: An OpenCL Programming Toolkit for Heterogeneous ComputingLiang, T.-Y. / Lin, Y.-J. et al. | 2013
- 73
-
Network-Aware Multiway Join for MapReduceSlagter, K. / Hsu, C.-H. / Chung, Y.-C. / Park, J.H. et al. | 2013
- 81
-
Automatic Resource Scaling for Web Applications in the CloudLin, C.-C. / Wu, J.-J. / Liu, P. / Lin, J.-A. / Song, L.-C. et al. | 2013
- 91
-
Implementation of Cloud-RAID: A Secure and Reliable Storage above the CloudsSchnjakin, M. / Meinel, C. et al. | 2013
- 103
-
An Improved Min-Min Task Scheduling Algorithm in Grid ComputingAnousha, S. / Ahmadi, M. et al. | 2013
- 114
-
Heterogeneous Diskless Remote Booting System on Cloud Operating SystemWu, J.-N. / Ko, Y.-H. / Huang, K.-M. / Huang, M.-K. et al. | 2013
- 124
-
RTRM: A Response Time-Based Replica Management Strategy for Cloud Storage SystemBai, X. / Jin, H. / Liao, X. / Shi, X. / Shao, Z. et al. | 2013
- 134
-
Secure Hadoop with Encrypted HDFSPark, S. / Lee, Y. et al. | 2013
- 142
-
VM Migration for Fault Tolerance in Spot Instance Based Cloud ComputingJung, D. / Chin, S. / Chung, K.S. / Yu, H. et al. | 2013
- 152
-
A Cloud Based Natural Disaster Management SystemHabiba, M. / Akhter, S. et al. | 2013
- 162
-
A Hybrid Grid/Cloud Distributed Platform: A Case StudyBelgacem, M.B. / Hafsi, H. / Abdennadher, N. et al. | 2013
- 170
-
Comparison of Two Yield Management Strategies for Cloud Service ProvidersKashef, M.M. / Uzbekov, A. / Altmann, J. / Hovestadt, M. et al. | 2013
- 181
-
Comparing Java Virtual Machines for Sensor Nodes - First Glance: Takatuka and DarjeelingMaye, O. / Maaser, M. et al. | 2013
- 189
-
Research on Opinion Formation of Microblog in the View of Multi-agent SimulationZhang, J. / Mi, Q. / Hu, L. / Tang, Y. et al. | 2013
- 199
-
Implementation of Cloud IaaS for Virtualization with Live MigrationYang, C.-T. / Huang, K.-L. / Chu, W.C.-C. / Leu, F.-Y. / Wang, S.-F. et al. | 2013
- 208
-
Security Considerations in Cloud Computing Virtualization EnvironmentYeo, S.-S. / Park, J.H. et al. | 2013
- 216
-
Medicine Rating Prediction and Recommendation in Mobile Social NetworksLi, S. / Hao, F. / Li, M. / Kim, H.-C. et al. | 2013
- 224
-
Cloud Browser: Enhancing the Web Browser with Cloud Sessions and Downloadable User InterfaceTaivalsaari, A. / Mikkonen, T. / Systa, K. et al. | 2013
- 234
-
Visual Novels: An Methodology Guideline for Pervasive Educational Games that Favors DiscernmentSalazar, F.L. / Nakajima, T. / Alexandrova, T. et al. | 2013
- 244
-
An Optimal Radio Access Network Selection Method for Heterogeneous Wireless NetworksCarvalho, G.H.S. / Woungang, I. / Rahman, M.M. / Anpalagan, A. et al. | 2013
- 253
-
Desktop Grid Computing at the Age of the WebAbidi, L. / Cerin, C. / Jemni, M. et al. | 2013
- 262
-
A Novel Model for Greenhouse Control ArchitectureBaek, M. / Lee, M. / Kim, H. / Kim, T. / Bae, N. / Cho, Y. / Park, J. / Shin, C. et al. | 2013
- 270
-
Enhanced Search in Unstructured Peer-to-Peer Overlay NetworksHota, C. / Nunia, V. / Di Francesco, M. / Nurminen, J.K. / Yla-Jaaski, A. et al. | 2013
- 280
-
CE-SeMMS: Cost-Effective and Secure Mobility Management Scheme Based on SIP in NEMO EnvironmentsCho, C. / Choi, J.Y. / Cho, Y. / Jeong, J.P. et al. | 2013
- 288
-
A System-Level Approach for Designing Context-Aware Distributed Pervasive ApplicationsWang, K.I.-K. / Park, H. / Salcic, Z. / Ratnayaka, P. et al. | 2013
- 299
-
Architecture of a Context Aware Framework for Automated Mobile Device ConfigurationOpu, M.F.R. / Biswas, E. / Habiba, M. / Kim, C. et al. | 2013
- 309
-
AMM-PF: Additional Mobility Management Scheme Based on Pointer Forwarding in PMIPv6 NetworksPark, S.Y. / Choi, J.Y. / Jeong, J.P. et al. | 2013
- 317
-
The Evaluation and Optimization of 3-D Jacobi Iteration on a Stream ProcessorZhang, Y. / Li, G. / Li, Y. / Sun, C. / Lu, P. et al. | 2013
- 326
-
DDASTM: Ensuring Conflict Serializability Efficiently in Distributed STMZhang, Y. / Jin, H. / Liao, X. et al. | 2013
- 336
-
Research on Log Pre-processing for Exascale System Using Sparse RepresentationZhu, L. / Gu, J. / Zhao, T. / Wang, Y. et al. | 2013
- 348
-
Using Event-Based Style for Developing M2M ApplicationsLe, T.-G. / Hermant, O. / Manceny, M. / Pawlak, R. / Rioboo, R. et al. | 2013
- 358
-
Scheduling Optimization of the RFID Tagged Explosive Storage Based on Genetic AlgorithmWu, X. / Fu, H. / He, X. / Liu, G. / Li, J. / Chen, H. / Wang, Q. / He, Q. et al. | 2013
- 367
-
Weighted Mining Association Rules Based Quantity Item with RFM Score for Personalized u-Commerce Recommendation SystemCho, Y.S. / Noh, S.C. / Moon, S.C. et al. | 2013
- 376
-
Priority-Based Live Migration of Virtual MachineJiang, B. / Wu, J. / Zhu, X. / Hu, D. et al. | 2013
- 386
-
Improvement of the MCMA Blind Equalization Performance Using the Coordinate Change Method in 16-APSKKim, Y. / Ryu, H.-G. et al. | 2013
- 393
-
Postural Transition Detection Using a Wireless Sensor Activity Monitoring SystemLeMay, R. / Choi, S. / Youn, J.-H. / Newstorm, J. et al. | 2013
- 403
-
A Dedicated Serialization Scheme in Homogeneous Cluster RPC CommunicationWan, Y. / Feng, D. / Wang, F. / Zhu, T. et al. | 2013
- 413
-
Friends Based Keyword Search over Online Social NetworksHuang, J. / Jin, H. et al. | 2013
- 423
-
GPU Virtualization Support in Cloud SystemYeh, C.-Y. / Kao, C.-Y. / Hung, W.-S. / Lin, C.-C. / Liu, P. / Wu, J.-J. / Liu, K.-C. et al. | 2013
- 433
-
MGMR: Multi-GPU Based MapReduceChen, Y. / Qiao, Z. / Jiang, H. / Li, K.-C. / Ro, W.W. et al. | 2013
- 443
-
DDoS Analysis Using Correlation Coefficient Based on Kolmogorov ComplexityKim, S.-j. / Kim, B.C. / Lee, J.Y. et al. | 2013
- 453
-
An Efficient Attribute-Based Encryption and Access Control Scheme for Cloud Storage EnvironmentHuang, J.-Y. / Chiang, C.-K. / Liao, I.-E. et al. | 2013
- 464
-
Active One-Time Password Mechanism for User AuthenticationFan, C.-I. / Wu, C.-N. / Weng, C.-Y. / Lin, C.-Y. et al. | 2013
- 472
-
Hardware Acceleration for Cryptography Algorithms by Hotspot DetectionChang, J.K.-T. / Liu, C. / Gaudiot, J.-L. et al. | 2013
- 482
-
Chaotic Wireless Communication System Using Retrodirective Array Antenna for Advanced High SecurityBok, J. / Ryu, H.-G. et al. | 2013
- 491
-
Policy-Based Customized Privacy Preserving Mechanism for SaaS ApplicationsShi, Y. / Jiang, Z. / Zhang, K. et al. | 2013
- 501
-
QoC-Aware Access Control Based on Fuzzy Inference for Pervasive Computing EnvironmentsMa, Y. / Lu, H. / Gan, Z. et al. | 2013
- 509
-
Per-File Secure Deletion Combining with Enhanced Reliability for SSDsQin, Y. / Feng, D. / Tong, W. / Liu, J. / Hu, Y. / Zhu, Z. et al. | 2013
- 517
-
An Energy-Aware Secured Routing Protocol for Mobile Ad Hoc Networks Using Trust-Based MultipathWoungang, I. / Dhurandher, S.K. / Sahai, M. et al. | 2013
- 526
-
A Grid-Based Approximate K-NN Query Processing Algorithm for Privacy Protection in Location-Based ServicesJang, M. / Chang, J.-W. et al. | 2013
- 536
-
Density-Based K-Anonymization Scheme for Preserving Users' Privacy in Location-Based ServicesLee, H. / Chang, J.-W. et al. | 2013
- 546
-
A Routing Mechanism Using Virtual Coordination Anchor Node Apply to Wireless Sensor NetworksTsai, C.-H. / Chang, K.-T. / Wang, Y.-H. et al. | 2013
- 556
-
Effect of Genetic Parameters in Tour Scheduling and Recommender Services for Electric VehiclesLee, J. / Park, G.-L. / Kim, H.-J. / Lee, B.-J. / Lee, S. / Im, D.-Y. et al. | 2013
- 563
-
Enabling Massive Machine-to-Machine Communications in LTE-AdvancedJun, K. et al. | 2013
- 570
-
Enhancements for Local Repair in AODV-Based Ad-Hoc NetworksShin, H.-H. / Lee, S. / Kim, B.-S. et al. | 2013
- 577
-
Smart Watch and Monitoring System for Dementia PatientsShin, D.-M. / Shin, D. et al. | 2013
- 585
-
A Lesson from the Development of Surveillance and Reconnaissance Sensor Networks SystemsKim, D. / Lee, S. / Ahn, M. et al. | 2013
- 594
-
A Classifier Algorithm Exploiting User's Environmental Context and Bio-signal for U-Home ServicesLee, H. / Shin, D. / Kim, S. et al. | 2013
- 602
-
DNA-S: Dynamic Cellular Network Architecture for Smart CommunicationsLee, T. / Chung, G.-S. et al. | 2013
- 612
-
Predicting of Abnormal Behavior Using Hierarchical Markov Model Based on User Profile in Ubiquitous EnvironmentShin, J. / Shin, D. et al. | 2013
- 623
-
Advanced Facial Skin Rendering with Actual Fresnel Refractive Index Reflecting Facial Tissue FeaturesLee, S. / Chin, S. et al. | 2013
- 631
-
Emotion Recognition Technique Using Complex Biomedical Signal AnalysisHwang, G. / Cho, H. / Shin, D. et al. | 2013
- 641
-
RWA: Reduced Whole Ack Mechanism for Underwater Acoustic Sensor NetworkShin, S.Y. / Park, S.H. et al. | 2013
- 649
-
Data Hiding Based on Palette Images Using Weak Bases of Z~2-ModulesHuy, P.T. / Kim, C. / Anh, N.T. / Hoa, L.Q. / Yang, C.-N. et al. | 2013
- 659
-
Adaptive Smart Vehicle Middleware Platform for Aspect Oriented Software EngineeringKim, J.-H. / Kim, S.-C. et al. | 2013
- 665
-
Parallel Generation of Optimal Mortgage Refinancing Threshold RatesZhang, N. / Xie, D. / Lim, E.G. / Wan, K. / Man, K.L. et al. | 2013
- 676
-
Pricing American Options on Dividend-Paying Stocks and Estimating the Greek Letters Using Leisen-Reimer Binomial TreesZhang, N. / Wan, K. / Lim, E.G. / Man, K.L. et al. | 2013
- 686
-
A Resource-Centric Architecture for Service-Oriented Cyber Physical SystemWan, K. / Alagar, V. et al. | 2013
- 694
-
Implied Volatilities of S&P 100 Index with Applications to Financial MarketZheng, J. / Zhang, N. / Xie, D. et al. | 2013
- 700
-
RF Characteristics of Wireless Capsule Endoscopy in Human BodyZhang, M. / Lim, E.G. / Wang, Z. / Tillo, T. / Man, K.L. / Wang, J.C. et al. | 2013
- 707
-
Building a Laboratory Surveillance System via a Wireless Sensor NetworkLei, C.-U. / Seon, J.K. / Shen, Z. / Man, K.L. / Hughes, D. / Kim, Y. et al. | 2013
- 715
-
S-Theory: A Unified Theory of Multi-paradigm Software DevelopmentHughes, D. / Bencomo, N. / Morin, B. / Huygens, C. / Shen, Z. / Man, K.L. et al. | 2013
- 723
-
Design of J-VTS Middleware Based on IVEF ProtocolKang, T. / Park, N. et al. | 2013
- 730
-
On the Use of a Hash Function in a 3-Party Password-Based Authenticated Key Exchange ProtocolLee, Y. / Won, D. et al. | 2013
- 737
-
A Sequence Classification Model Based on Pattern Coverage RateLi, I.-H. / Huang, J.-Y. / Liao, I.-E. / Lin, J.-H. et al. | 2013
- 746
-
Development of STEAM Program and Teaching Method for Using LEGO Line Tracer Robot in Elementary SchoolKo, Y. / Park, N. et al. | 2013
- 752
-
Improved Authentication Scheme with Anonymity for Roaming Service in Global Mobility NetworksChung, Y. / Lee, Y. / Won, D. et al. | 2013
- 761
-
Cryptanalysis of an Authenticated Group Key Transfer Protocol Based on Secret SharingKim, M. / Park, N. / Won, D. et al. | 2013
- 767
-
Development of the STEAM-Based Media Education Materials for Prevention of Media Dysfunction in Elementary SchoolAn, J. / Park, N. et al. | 2013
- 773
-
Access Control Technique of Illegal Harmful Contents for Elementary Schoolchild Online ProtectionPark, N. / Ko, Y. et al. | 2013
- 781
-
The Concept of Delegation of Authorization and Its Expansion for Multi Domain Smart Grid SystemKim, M. / Park, N. et al. | 2013
- 788
-
Security Requirement of End Point Security SoftwareLee, H.-J. / Lee, Y. / Won, D. et al. | 2013
- 796
-
Collecting and Filtering Out Phishing Suspicious URLs Using SpamTrap SystemJeun, I. / Lee, Y. / Won, D. et al. | 2013
- 803
-
Improvement of a Chaotic Map Based Key Agreement Protocol That Preserves AnonymityYang, H. / Qiuyan, J. / Lee, H. / Lee, K. / Won, D. et al. | 2013
- 811
-
Solving Router Nodes Placement Problem with Priority Service Constraint in WMNs Using Simulated AnnealingLin, C.-C. / Lin, Y.-L. / Liu, W.-Y. et al. | 2013
- 819
-
Topology Information Based Spare Capacity Provisioning in WDM NetworksHwang, H. / Kim, S.-C. et al. | 2013
- 826
-
A Contents Service Profit Model Based on the Quality of Experience and User Group CharacteristicsLee, G.Y. / Kim, H.J. / Jeong, C.K. / Lee, Y. et al. | 2013
- 832
-
Toward Hybrid Model for Architecture-Oriented Semantic Schema of Self-adaptive SystemKim, J.-H. / Kim, S.-C. et al. | 2013
- 838
-
Optimal Channel Sensing in Cognitive Radio Network with Multiple Secondary UsersYu, H. et al. | 2013
- 846
-
H.264 Video Delivery over Wireless Mesh Networks Based on Joint Adaptive Cross-Layer Mapping and MDCA MACOh, B.J. / Lee, K.Y. et al. | 2013
- 854
-
Automatic Tracking Angle of Arrival of Bandpass Sampling OFDM Signal by MUSIC AlgorithmWang, X. / Ryu, H.-G. et al. | 2013
- 860
-
A White-List Based Security Architecture (WLSA) for the Safe Mobile Office in the BYOD EraLee, J. / Lee, Y. / Kim, S.-C. et al. | 2013
- 866
-
A Study of Vessel Deviation Prevention Scheme Using a Triangulation in a SeawayChen, S. / Ahmad, R. / Lee, B.-G. / Kim, B.-D. / Kim, D.-H. et al. | 2013
- 873
-
Analysis of Energy Consumption in Edge Router with Sleep Mode for Green OBS NetworksYang, W. / Ahmed, M.A. / Lee, K.-B. / Kim, Y.-C. et al. | 2013
- 880
-
VLC Based Multi-hop Audio Data Transmission SystemDung, L.T. / Jo, S. / An, B. et al. | 2013
- 886
-
A Practical Adaptive Scheme for Enhancing Network Stability in Mobile Ad-Hoc Wireless NetworksDung, L.T. / Ha, S.H. / An, B. et al. | 2013
- 893
-
A Geomulticast Routing Protocol Based on Route Stability in Mobile Ad-Hoc Wireless NetworksHa, S.H. / Dung, L.T. / An, B. et al. | 2013
- 899
-
RFID-Based Indoor Location Recognition System for Emergency Rescue Evacuation SupportDo, D.-M. / Hyun, M.-H. / Choi, Y.-B. et al. | 2013
- 907
-
A Symmetric Hierarchical Clustering Related to the Sink Position and Power Threshold for Sensor NetworksKook, J. et al. | 2013
- 914
-
A Study of Fire Refuge Guide Simulator Based on Sensor NetworksBoo, J.-P. / Kim, S.-C. / Park, D.-H. / Bang, H.-C. / Kim, D.-H. et al. | 2013
- 920
-
Design of Parallel Pipelined Algorithm for Field Arithmetic Architecture Based on Cellular ArrayKim, K.-W. / Jeon, J.-C. et al. | 2013
- 926
-
Follower Classification Through Social Network Analysis in TwitterSeol, J.-W. / Jeong, K.-Y. / Lee, K.-S. et al. | 2013
- 932
-
An Initial Quantization Parameter Decision Method Based on Frame Complexity with Multiple Objectives of GOP for Rate Control of H.264Wu, Y. / Ko, S.-W. et al. | 2013
- 939
-
The Development of Privacy Telephone Sets in Encryption System against EavesdroppingLee, S.-P. / Nahm, E.-s. et al. | 2013
- 945
-
New ID-Based Proxy Signature Scheme with Message RecoveryYoon, E.-J. / Choi, Y. / Kim, C. et al. | 2013