유비쿼터스 RFID 개인정보 침해에 대한 방안 연구

RFID System of Ubiquitous which is one of problem that may occur in a process of replacing bar code in 21st century. Ubiquitous computer environment should be considered to be most important task to protect information. For introduction, this presentation going to discuss the background information,...

Full description

Saved in:
Bibliographic Details
Published in(사)디지털산업정보학회 논문지, 6(2) Vol. 6; no. 2; pp. 143 - 151
Main Authors 최희식, 박재표, 전문석, Choi, Hee Sik, Park, Jae Pyo, Jun, Mun Seog
Format Journal Article
LanguageKorean
Published (사)디지털산업정보학회 01.06.2010
Subjects
Online AccessGet full text
ISSN1738-6667
2713-9018

Cover

Abstract RFID System of Ubiquitous which is one of problem that may occur in a process of replacing bar code in 21st century. Ubiquitous computer environment should be considered to be most important task to protect information. For introduction, this presentation going to discuss the background information, the purpose of Ubiquitous and potential problems in individual privacy in computer environment. In main part, the content will handle the practices and weakness in security of computer environment in Ubiquitous. Last part of presentation going to examine, futuristic views in solving existing problems with alternative solutions to prohibit invasion in privacy.
AbstractList RFID System of Ubiquitous which is one of problem that may occur in a process of replacing bar code in 21st century. Ubiquitous computer environment should be considered to be most important task to protect information. For introduction, this presentation going to discuss the background information, the purpose of Ubiquitous and potential problems in individual privacy in computer environment. In main part, the content will handle the practices and weakness in security of computer environment in Ubiquitous. Last part of presentation going to examine, futuristic views in solving existing problems with alternative solutions to prohibit invasion in privacy.
RFID System of Ubiquitous which is one of problem that may occur in a process of replacing bar code in 21st century. Ubiquitous computer environment should be considered to be most important task to protect information. For introduction, this presentation going to discuss the background information, the purpose of Ubiquitous and potential problems in individual privacy in computer environment. In main part, the content will handle the practices and weakness in security of computer environment in Ubiquitous. Last part of presentation going to examine,futuristic views in solving existing problems with alternative solutions to prohibit invasion in privacy. KCI Citation Count: 1
Author 최희식
Park, Jae Pyo
Choi, Hee Sik
박재표
Jun, Mun Seog
전문석
Author_xml – sequence: 1
  fullname: 최희식
– sequence: 2
  fullname: 박재표
– sequence: 3
  fullname: 전문석
– sequence: 4
  fullname: Choi, Hee Sik
– sequence: 5
  fullname: Park, Jae Pyo
– sequence: 6
  fullname: Jun, Mun Seog
BackLink https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001456392$$DAccess content in National Research Foundation of Korea (NRF)
BookMark eNotjL1Kw0AAgA-pYK19hyyCS-B-cn-boVqtFgol-5E0dxJSEmh8AIcOIg4uoUuFDg4KDgErWBB8n-b6Dhbr9PHBx3cIGlme6T3QxBwRV0IkGqCJOBEuY4wfgHZRJBEkDHNBBW2CUztf1Kup_fneTCv78OIMu70zZ13N7fOXXZT1x9Kxq9dNubSzJ6d-vNuUc6eu3mx579hZtf58PwL7JhwXuv3PFgi650Hn0u0PLnodv--mjFA3CjmKURiRGEWR5kRzhqmRWG9dhiGMPINHRApEkGExFVJDbTCnEhsmOcakBU5222xiVDpKVB4mf7zJVTpR_jDoKS6wx-k2Pd6laVLcJiqLi7G68q8HGCIIOafCY8IjmPwC8mdmeA
ContentType Journal Article
DBID JDI
ACYCR
DEWEY 621.382
DatabaseName KoreaScience
Korean Citation Index
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Engineering
DocumentTitleAlternate A plan research about a Ubiquitous RFID infringe private information
EISSN 2713-9018
EndPage 151
ExternalDocumentID oai_kci_go_kr_ARTI_782475
JAKO201007758468432
GroupedDBID .UV
JDI
ACYCR
M~E
ID FETCH-LOGICAL-k635-ba71d1ab3d1bbe73e7625f92ed1b9aa0b4f2c398131f6d589e0ef27592f697223
ISSN 1738-6667
IngestDate Tue Nov 21 21:41:23 EST 2023
Fri Dec 22 11:58:38 EST 2023
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
Issue 2
Keywords Private Infringement
Data Protection
RFID(Radio Frequency Identification)
Language Korean
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-k635-ba71d1ab3d1bbe73e7625f92ed1b9aa0b4f2c398131f6d589e0ef27592f697223
Notes KISTI1.1003/JNL.JAKO201007758468432
G704-SER000010259.2010.6.2.022
OpenAccessLink http://click.ndsl.kr/servlet/LinkingDetailView?cn=JAKO201007758468432&dbt=JAKO&org_code=O481&site_code=SS1481&service_code=01
PageCount 9
ParticipantIDs nrf_kci_oai_kci_go_kr_ARTI_782475
kisti_ndsl_JAKO201007758468432
PublicationCentury 2000
PublicationDate 2010-06
PublicationDateYYYYMMDD 2010-06-01
PublicationDate_xml – month: 06
  year: 2010
  text: 2010-06
PublicationDecade 2010
PublicationTitle (사)디지털산업정보학회 논문지, 6(2)
PublicationTitleAlternate Journal of the Korea Society of Digital Industry and Information Management
PublicationYear 2010
Publisher (사)디지털산업정보학회
Publisher_xml – name: (사)디지털산업정보학회
SSID ssib036278585
ssib044734564
ssib008451690
ssib053377100
ssib026777133
Score 1.436409
Snippet RFID System of Ubiquitous which is one of problem that may occur in a process of replacing bar code in 21st century. Ubiquitous computer environment should be...
SourceID nrf
kisti
SourceType Open Website
Open Access Repository
StartPage 143
SubjectTerms 컴퓨터학
Title 유비쿼터스 RFID 개인정보 침해에 대한 방안 연구
URI http://click.ndsl.kr/servlet/LinkingDetailView?cn=JAKO201007758468432&dbt=JAKO&org_code=O481&site_code=SS1481&service_code=01
https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001456392
Volume 6
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
ispartofPNX (사)디지털산업정보학회 논문지, 2010, 6(2), , pp.143-151
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3Ni9NAFB9296QH8RPXjyWCcyqVJplJZm4macruyipohb2FfK610kLtXjyIhz2IePBS9lJhDx4UPBRcwQXB_2eb_g--N03brC74ASXNvEzex7xJ5vfamTeE3DaZSGsRZvlMwgwCFGFVhbDiqkyyUISA2CML1w5v3bfWH7PNbb69tKyVZi3t9qM78YtT15X8j1eBBn7FVbL_4Nk5UyDAOfgXjuBhOP6Vj6nvUelRp0Z9l7qSCoYUt0Fdj_p1LLo1pAiHOqzysLFRr1DfQSLchffWqSvwBDhIrpiY1GUVxUVSRyAXuOAqvtKmslbBWsLDCRLTa9JTJODpSFWLUyEqRX0UD_I4LTI8Pp3p7VLJ8IOy7YIZqqu0EUahN3AQ_Hf9ZpKlOnFQHVSKK7NdkDWzCjnPepSyiSvD62i4o1pAgCL1RRVlh1Qipa-qQF0dbipzAWWwoUuCoLjg4j3pTncCT9PKo1a7_LMKzgiYTf8qRgIbRgKI7aZoIFU0AyJ6nM8iysOHVXpKjNJQoE_TTxWoQi_S6p5I-P3LQDyfHrnp3HuAOmF6QsCHgpkAMpZNHd_jWy_9-ftSsBP_cgIWscu7CTBmm6yUCwiQvY3JnNQa4cI6iMkwUGkBtOr0shK0ap4n54qYSHOmHfwCWWp3L5KzpUyZl8jdfHgwPtrLf3yf7I3yNx807Mza8WiYv_-WHwzGXw61_OjjZHCY77_Txm9fTQZDbTz6lA9ea_n-6Pjr58uk2fCb3nq12Pyj2gYMXI1CW0_0MDITPYpS20xh0OaZNFIoyzCsRSwzYlMK3dQzK-FCprU0M2wujcySNmDeK2Sl0-2kV4kmojCLzShJuIwA_FsQEBixNDOZWSGLOVsla6oJgk7y_FlwStuvklvQNkE7bgWYjB2_d7pBuxdAyLkRAMRmNr_2JybXyZlFN7tBVvq93fQm4Nl-tKac-hO96XvN
linkProvider ISSN International Centre
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=%EC%9C%A0%EB%B9%84%EC%BF%BC%ED%84%B0%EC%8A%A4+RFID+%EA%B0%9C%EC%9D%B8%EC%A0%95%EB%B3%B4+%EC%B9%A8%ED%95%B4%EC%97%90+%EB%8C%80%ED%95%9C+%EB%B0%A9%EC%95%88+%EC%97%B0%EA%B5%AC&rft.jtitle=%EB%94%94%EC%A7%80%ED%84%B8%EC%82%B0%EC%97%85%EC%A0%95%EB%B3%B4%ED%95%99%ED%9A%8C%EB%85%BC%EB%AC%B8%EC%A7%80&rft.au=%EC%B5%9C%ED%9D%AC%EC%8B%9D&rft.au=%EB%B0%95%EC%9E%AC%ED%91%9C&rft.au=%EC%A0%84%EB%AC%B8%EC%84%9D&rft.au=Choi%2C+Hee+Sik&rft.date=2010-06-01&rft.issn=1738-6667&rft.eissn=2713-9018&rft.volume=6&rft.issue=2&rft.spage=143&rft.epage=151&rft.externalDBID=n%2Fa&rft.externalDocID=JAKO201007758468432
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1738-6667&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1738-6667&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1738-6667&client=summon