Digital Library


Search: "[ keyword: 보안 ]" (196)
    Process of Collection for a Removable Storage Device Image Using a Software
    Baek Hyun Woo, Jeon Sang Jun, Sang Jin Lee KIPS Transactions on Computer and Communication Systems, Vol. 6, No. 1, pp. 17-24, Jan. 2017
    10.3745/KTCCS.2017.6.1.17
    Keywords: Removable Storage Device, Imaging, Secure USB, Write Blocker, Imaging Device

    1 Person Media Based on Person Wide Web for Preventing Privacy Risk
    Jisup Yoon, Jung-Mi Ma, Sun-sup So, Seongbae Eun KIPS Transactions on Computer and Communication Systems, Vol. 5, No. 10, pp. 339-346, Oct. 2016
    10.3745/KTCCS.2016.5.10.339
    Keywords: 1 Person Media, Cloud Storage, Security

    A Quality Evaluation Model for IoT Services
    Mi Kim, Nam Yong Lee, Jin Ho Park KIPS Transactions on Computer and Communication Systems, Vol. 5, No. 9, pp. 269-274, Sep. 2016
    10.3745/KTCCS.2016.5.9.269
    Keywords: Quality model, IoT Services, Internet of Things, Functionality, Reliability, Security

    Cost-Effective and Active Security Verification Framework for Web Application Vulnerabilities
    KyungHyun Han, Trong-Kha Nguyen, Hun Joe, Seong Oun Hwang, Chaeho Lim KIPS Transactions on Computer and Communication Systems, Vol. 5, No. 8, pp. 189-196, Aug. 2016
    10.3745/KTCCS.2016.5.8.189
    Keywords: Cost-Effective, Web security, Vulnerabilities, Inspection

    A Study on Development of Evaluation Indicators for the HumanCompetency and Management In Managed Security Service (MSS)
    Yang Sung Ho, Lee Sang Jin KIPS Transactions on Computer and Communication Systems, Vol. 5, No. 6, pp. 143-152, Jun. 2016
    10.3745/KTCCS.2016.5.6.143
    Keywords: Managed Security Service, Human Cometency, Human Cometency Evaluation

    Framework for Secure Biometric System Design on Smartphones
    Jong Hyuk Im , Hee Yong Kwon , Mun Kyu Lee KIPS Transactions on Computer and Communication Systems, Vol. 5, No. 2, pp. 41-46, Feb. 2016
    10.3745/KTCCS.2016.5.2.41

    Design and Implementation of HDFS Data Encryption Scheme Using ARIA Algorithms on Hadoop
    Youngho Song , Youngsung Shin , Jae Woo Chang KIPS Transactions on Computer and Communication Systems, Vol. 5, No. 2, pp. 33-40, Feb. 2016
    10.3745/KTCCS.2016.5.2.33

    A Study on Interface Security Enhancement
    Joon Jeong Park , So Ra Kim , Soo Hyun Ahn , Chae Ho Lim , Kwang Jo Kim KIPS Transactions on Computer and Communication Systems, Vol. 4, No. 5, pp. 171-176, May. 2015
    10.3745/KTCCS.2015.4.5.171

    Design of the MS-SQL Password Vulnerability Checking Function Using OLE Remote Connection
    Seung Ju Jang KIPS Transactions on Computer and Communication Systems, Vol. 4, No. 3, pp. 97-104, Mar. 2015
    10.3745/KTCCS.2015.4.3.97

    A Defense Mechanism Based on Session Status against Cookie Replay Attack in Web Applications
    Jong Sun Won , Ji Su Park , Jin Gon Shon KIPS Transactions on Computer and Communication Systems, Vol. 4, No. 1, pp. 31-36, Jan. 2015
    10.3745/KTCCS.2015.4.1.31