Digital Library
Search: "[ keyword: Security ]" (210)
A Method of Detecting Real-Time Elevation of Privilege Security Module Using User Credentials
Sim Chul Jun, Kim Won Il, Kim Hyun Jung, Lee Chang Hoon KIPS Transactions on Computer and Communication Systems,
Vol. 6, No. 5, pp. 247-254,
May.
2017
10.3745/KTCCS.2017.6.5.247
Keywords: System security, Elevation of Privilege Attack, Credentials
Keywords: System security, Elevation of Privilege Attack, Credentials
Security Requirements Analysis on IP Camera via Threat Modeling and Common Criteria
Jisoo Park, Seungjoo Kim KIPS Transactions on Computer and Communication Systems,
Vol. 6, No. 3, pp. 121-134,
Mar.
2017
10.3745/KTCCS.2017.6.3.121
Keywords: SDLC, Threat Modeling, Security Requirements, Traceability
Keywords: SDLC, Threat Modeling, Security Requirements, Traceability
A Study on the Remove Use-After-Free Security Weakness
Yong Koo Park, Jin Young Choi KIPS Transactions on Computer and Communication Systems,
Vol. 6, No. 1, pp. 43-50,
Jan.
2017
10.3745/KTCCS.2017.6.1.43
Keywords: Security Weakness, Vulnerability, Dangling Pointer, Nullification
Keywords: Security Weakness, Vulnerability, Dangling Pointer, Nullification
1 Person Media Based on Person Wide Web for Preventing Privacy Risk
Jisup Yoon, Jung-Mi Ma, Sun-sup So, Seongbae Eun KIPS Transactions on Computer and Communication Systems,
Vol. 5, No. 10, pp. 339-346,
Oct.
2016
10.3745/KTCCS.2016.5.10.339
Keywords: 1 Person Media, Cloud Storage, Security
Keywords: 1 Person Media, Cloud Storage, Security
A Quality Evaluation Model for IoT Services
Mi Kim, Nam Yong Lee, Jin Ho Park KIPS Transactions on Computer and Communication Systems,
Vol. 5, No. 9, pp. 269-274,
Sep.
2016
10.3745/KTCCS.2016.5.9.269
Keywords: Quality model, IoT Services, Internet of Things, Functionality, Reliability, Security
Keywords: Quality model, IoT Services, Internet of Things, Functionality, Reliability, Security
Cost-Effective and Active Security Verification Framework for Web Application Vulnerabilities
KyungHyun Han, Trong-Kha Nguyen, Hun Joe, Seong Oun Hwang, Chaeho Lim KIPS Transactions on Computer and Communication Systems,
Vol. 5, No. 8, pp. 189-196,
Aug.
2016
10.3745/KTCCS.2016.5.8.189
Keywords: Cost-Effective, Web security, Vulnerabilities, Inspection
Keywords: Cost-Effective, Web security, Vulnerabilities, Inspection
A Study on Development of Evaluation Indicators for the HumanCompetency and Management In Managed Security Service (MSS)
Yang Sung Ho, Lee Sang Jin KIPS Transactions on Computer and Communication Systems,
Vol. 5, No. 6, pp. 143-152,
Jun.
2016
10.3745/KTCCS.2016.5.6.143
Keywords: Managed Security Service, Human Cometency, Human Cometency Evaluation
Keywords: Managed Security Service, Human Cometency, Human Cometency Evaluation
Framework for Secure Biometric System Design on Smartphones
Jong Hyuk Im , Hee Yong Kwon , Mun Kyu Lee KIPS Transactions on Computer and Communication Systems,
Vol. 5, No. 2, pp. 41-46,
Feb.
2016
10.3745/KTCCS.2016.5.2.41
Design and Implementation of HDFS Data Encryption Scheme Using ARIA Algorithms on Hadoop
Youngho Song , Youngsung Shin , Jae Woo Chang KIPS Transactions on Computer and Communication Systems,
Vol. 5, No. 2, pp. 33-40,
Feb.
2016
10.3745/KTCCS.2016.5.2.33
A Study on Interface Security Enhancement
Joon Jeong Park , So Ra Kim , Soo Hyun Ahn , Chae Ho Lim , Kwang Jo Kim KIPS Transactions on Computer and Communication Systems,
Vol. 4, No. 5, pp. 171-176,
May.
2015
10.3745/KTCCS.2015.4.5.171