유비쿼터스 RFID 개인정보 침해에 대한 방안 연구
RFID System of Ubiquitous which is one of problem that may occur in a process of replacing bar code in 21st century. Ubiquitous computer environment should be considered to be most important task to protect information. For introduction, this presentation going to discuss the background information,...
Saved in:
Published in | (사)디지털산업정보학회 논문지, 6(2) Vol. 6; no. 2; pp. 143 - 151 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | Korean |
Published |
(사)디지털산업정보학회
01.06.2010
|
Subjects | |
Online Access | Get full text |
ISSN | 1738-6667 2713-9018 |
Cover
Abstract | RFID System of Ubiquitous which is one of problem that may occur in a process of replacing bar code in 21st century. Ubiquitous computer environment should be considered to be most important task to protect information. For introduction, this presentation going to discuss the background information, the purpose of Ubiquitous and potential problems in individual privacy in computer environment. In main part, the content will handle the practices and weakness in security of computer environment in Ubiquitous. Last part of presentation going to examine, futuristic views in solving existing problems with alternative solutions to prohibit invasion in privacy. |
---|---|
AbstractList | RFID System of Ubiquitous which is one of problem that may occur in a process of replacing bar code in 21st century. Ubiquitous computer environment should be considered to be most important task to protect information. For introduction, this presentation going to discuss the background information, the purpose of Ubiquitous and potential problems in individual privacy in computer environment. In main part, the content will handle the practices and weakness in security of computer environment in Ubiquitous. Last part of presentation going to examine, futuristic views in solving existing problems with alternative solutions to prohibit invasion in privacy. RFID System of Ubiquitous which is one of problem that may occur in a process of replacing bar code in 21st century. Ubiquitous computer environment should be considered to be most important task to protect information. For introduction, this presentation going to discuss the background information, the purpose of Ubiquitous and potential problems in individual privacy in computer environment. In main part, the content will handle the practices and weakness in security of computer environment in Ubiquitous. Last part of presentation going to examine,futuristic views in solving existing problems with alternative solutions to prohibit invasion in privacy. KCI Citation Count: 1 |
Author | 최희식 Park, Jae Pyo Choi, Hee Sik 박재표 Jun, Mun Seog 전문석 |
Author_xml | – sequence: 1 fullname: 최희식 – sequence: 2 fullname: 박재표 – sequence: 3 fullname: 전문석 – sequence: 4 fullname: Choi, Hee Sik – sequence: 5 fullname: Park, Jae Pyo – sequence: 6 fullname: Jun, Mun Seog |
BackLink | https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001456392$$DAccess content in National Research Foundation of Korea (NRF) |
BookMark | eNotjL1Kw0AAgA-pYK19hyyCS-B-cn-boVqtFgol-5E0dxJSEmh8AIcOIg4uoUuFDg4KDgErWBB8n-b6Dhbr9PHBx3cIGlme6T3QxBwRV0IkGqCJOBEuY4wfgHZRJBEkDHNBBW2CUztf1Kup_fneTCv78OIMu70zZ13N7fOXXZT1x9Kxq9dNubSzJ6d-vNuUc6eu3mx579hZtf58PwL7JhwXuv3PFgi650Hn0u0PLnodv--mjFA3CjmKURiRGEWR5kRzhqmRWG9dhiGMPINHRApEkGExFVJDbTCnEhsmOcakBU5222xiVDpKVB4mf7zJVTpR_jDoKS6wx-k2Pd6laVLcJiqLi7G68q8HGCIIOafCY8IjmPwC8mdmeA |
ContentType | Journal Article |
DBID | JDI ACYCR |
DEWEY | 621.382 |
DatabaseName | KoreaScience Korean Citation Index |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
DocumentTitleAlternate | A plan research about a Ubiquitous RFID infringe private information |
EISSN | 2713-9018 |
EndPage | 151 |
ExternalDocumentID | oai_kci_go_kr_ARTI_782475 JAKO201007758468432 |
GroupedDBID | .UV JDI ACYCR M~E |
ID | FETCH-LOGICAL-k635-ba71d1ab3d1bbe73e7625f92ed1b9aa0b4f2c398131f6d589e0ef27592f697223 |
ISSN | 1738-6667 |
IngestDate | Tue Nov 21 21:41:23 EST 2023 Fri Dec 22 11:58:38 EST 2023 |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | false |
Issue | 2 |
Keywords | Private Infringement Data Protection RFID(Radio Frequency Identification) |
Language | Korean |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-k635-ba71d1ab3d1bbe73e7625f92ed1b9aa0b4f2c398131f6d589e0ef27592f697223 |
Notes | KISTI1.1003/JNL.JAKO201007758468432 G704-SER000010259.2010.6.2.022 |
OpenAccessLink | http://click.ndsl.kr/servlet/LinkingDetailView?cn=JAKO201007758468432&dbt=JAKO&org_code=O481&site_code=SS1481&service_code=01 |
PageCount | 9 |
ParticipantIDs | nrf_kci_oai_kci_go_kr_ARTI_782475 kisti_ndsl_JAKO201007758468432 |
PublicationCentury | 2000 |
PublicationDate | 2010-06 |
PublicationDateYYYYMMDD | 2010-06-01 |
PublicationDate_xml | – month: 06 year: 2010 text: 2010-06 |
PublicationDecade | 2010 |
PublicationTitle | (사)디지털산업정보학회 논문지, 6(2) |
PublicationTitleAlternate | Journal of the Korea Society of Digital Industry and Information Management |
PublicationYear | 2010 |
Publisher | (사)디지털산업정보학회 |
Publisher_xml | – name: (사)디지털산업정보학회 |
SSID | ssib036278585 ssib044734564 ssib008451690 ssib053377100 ssib026777133 |
Score | 1.436409 |
Snippet | RFID System of Ubiquitous which is one of problem that may occur in a process of replacing bar code in 21st century. Ubiquitous computer environment should be... |
SourceID | nrf kisti |
SourceType | Open Website Open Access Repository |
StartPage | 143 |
SubjectTerms | 컴퓨터학 |
Title | 유비쿼터스 RFID 개인정보 침해에 대한 방안 연구 |
URI | http://click.ndsl.kr/servlet/LinkingDetailView?cn=JAKO201007758468432&dbt=JAKO&org_code=O481&site_code=SS1481&service_code=01 https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001456392 |
Volume | 6 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
ispartofPNX | (사)디지털산업정보학회 논문지, 2010, 6(2), , pp.143-151 |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3Ni9NAFB9296QH8RPXjyWCcyqVJplJZm4macruyipohb2FfK610kLtXjyIhz2IePBS9lJhDx4UPBRcwQXB_2eb_g--N03brC74ASXNvEzex7xJ5vfamTeE3DaZSGsRZvlMwgwCFGFVhbDiqkyyUISA2CML1w5v3bfWH7PNbb69tKyVZi3t9qM78YtT15X8j1eBBn7FVbL_4Nk5UyDAOfgXjuBhOP6Vj6nvUelRp0Z9l7qSCoYUt0Fdj_p1LLo1pAiHOqzysLFRr1DfQSLchffWqSvwBDhIrpiY1GUVxUVSRyAXuOAqvtKmslbBWsLDCRLTa9JTJODpSFWLUyEqRX0UD_I4LTI8Pp3p7VLJ8IOy7YIZqqu0EUahN3AQ_Hf9ZpKlOnFQHVSKK7NdkDWzCjnPepSyiSvD62i4o1pAgCL1RRVlh1Qipa-qQF0dbipzAWWwoUuCoLjg4j3pTncCT9PKo1a7_LMKzgiYTf8qRgIbRgKI7aZoIFU0AyJ6nM8iysOHVXpKjNJQoE_TTxWoQi_S6p5I-P3LQDyfHrnp3HuAOmF6QsCHgpkAMpZNHd_jWy_9-ftSsBP_cgIWscu7CTBmm6yUCwiQvY3JnNQa4cI6iMkwUGkBtOr0shK0ap4n54qYSHOmHfwCWWp3L5KzpUyZl8jdfHgwPtrLf3yf7I3yNx807Mza8WiYv_-WHwzGXw61_OjjZHCY77_Txm9fTQZDbTz6lA9ea_n-6Pjr58uk2fCb3nq12Pyj2gYMXI1CW0_0MDITPYpS20xh0OaZNFIoyzCsRSwzYlMK3dQzK-FCprU0M2wujcySNmDeK2Sl0-2kV4kmojCLzShJuIwA_FsQEBixNDOZWSGLOVsla6oJgk7y_FlwStuvklvQNkE7bgWYjB2_d7pBuxdAyLkRAMRmNr_2JybXyZlFN7tBVvq93fQm4Nl-tKac-hO96XvN |
linkProvider | ISSN International Centre |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=%EC%9C%A0%EB%B9%84%EC%BF%BC%ED%84%B0%EC%8A%A4+RFID+%EA%B0%9C%EC%9D%B8%EC%A0%95%EB%B3%B4+%EC%B9%A8%ED%95%B4%EC%97%90+%EB%8C%80%ED%95%9C+%EB%B0%A9%EC%95%88+%EC%97%B0%EA%B5%AC&rft.jtitle=%EB%94%94%EC%A7%80%ED%84%B8%EC%82%B0%EC%97%85%EC%A0%95%EB%B3%B4%ED%95%99%ED%9A%8C%EB%85%BC%EB%AC%B8%EC%A7%80&rft.au=%EC%B5%9C%ED%9D%AC%EC%8B%9D&rft.au=%EB%B0%95%EC%9E%AC%ED%91%9C&rft.au=%EC%A0%84%EB%AC%B8%EC%84%9D&rft.au=Choi%2C+Hee+Sik&rft.date=2010-06-01&rft.issn=1738-6667&rft.eissn=2713-9018&rft.volume=6&rft.issue=2&rft.spage=143&rft.epage=151&rft.externalDBID=n%2Fa&rft.externalDocID=JAKO201007758468432 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1738-6667&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1738-6667&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1738-6667&client=summon |