References
- H. Kim, E. Jun, and S. Kim, "Study on security management in cloud computing environment," Korean Review of Management Consulting, vol. 2, no. 1, 2011, pp. 127-144.
- C. Kim, "A Study for Transaction Processing Supporting Scalability in the Cloud," J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no. 4, 2012, pp. 873-879. https://doi.org/10.13067/JKIECS.2012.7.4.873
- C. Kim, "An Adaptation of Consistency Criteria for Applications in the Cloud," J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no. 2, 2012, pp. 341-347. https://doi.org/10.13067/JKIECS.2012.7.2.341
- C. Kim, "A Range Query Method using Index in Large-scale Database Systems," J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no. 5, 2012, pp. 1095-1101. https://doi.org/10.13067/JKIECS.2012.7.5.1095
- C. Ryu, "Context Inference and Sensor Data Classification of Big Data Stream Environment," J. of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 10, 2014, pp. 1079-1085. https://doi.org/10.13067/JKIECS.2014.9.10.1079
- S. Lee and H. Yoon, "The Study on Development of Technology for Electronic Government of S. Korea with Cloud Computing analysed by the Application of Scenario Planning," J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no. 6, 2012, pp. 1245-1258. https://doi.org/10.13067/JKIECS.2012.7.6.1245
- K. Park, K. Kim, K. Ban, and W. Kim, "Design and Implementation of Cloud-based Sensor Data Management System," J. of the Korea Institute of Electronic Communication Sciences, vol. 5, no. 6, 2010, pp. 672-677.
- B. Cha, D. Kim, J. Kim, N. Kim, and S. Choi, "Design of Searchable Image Encryption System of Streaming Media based on Cloud Computing," J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no. 4, 2012, pp. 811-819. https://doi.org/10.13067/JKIECS.2012.7.4.811
- Y. Kim, S. Him, M. Jo, and W. Kim, "The Bigdata Processing Environment Building for the Learning System," J. of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 6, Aug. 2014, pp. 791-797. https://doi.org/10.13067/JKIECS.2014.9.7.791
- M. Kim, H. Hwang, K. Kim, T. Chang, M. Kim, and B. Noh, "Vulnerability Analysis Method of Software-based Secure USB," J. of the Korea Institute of Information Security and Cryptologys, vol. 22, no. 6, 2012, pp. 1345-1354.