Digital Library


Search: "[ keyword: Security requirement ]" (4)
    Identifying Security Requirement using Reusable State Transition Diagram at Security Threat Location
    Seongchae Seo, Jinho You, Youngdae Kim, Byungki Kim The KIPS Transactions:PartD, Vol. 13, No. 1, pp. 67-74, Feb. 2006
    http://dx.doi.org/10.3745/KIPSTD.2006.13D.1.067
    Keywords: Security, Security requirement, Analysis

    Analysis of IoT Open-Platform Cryptographic Technology and Security Requirements
    Choi Jung in, Oh Yoon seok, Kim Do won, Choi Eun Young, Seo Seung Hyun KIPS Transactions on Computer and Communication Systems, Vol. 7, No. 7, pp. 183-194, Jul. 2018
    10.3745/KTCCS.2018.7.7.183
    Keywords: IoT Device Class, IoT Security Requirements, IoT Platform, cryptography

    Security Requirements Analysis on IP Camera via Threat Modeling and Common Criteria
    Jisoo Park, Seungjoo Kim KIPS Transactions on Computer and Communication Systems, Vol. 6, No. 3, pp. 121-134, Mar. 2017
    10.3745/KTCCS.2017.6.3.121
    Keywords: SDLC, Threat Modeling, Security Requirements, Traceability

    Security Analysis on Password Authentication System of Web Sites
    Hee Kyeong Noh , Chang Kuk Choi , Min Su Park , Seung Joo Kim KIPS Transactions on Computer and Communication Systems, Vol. 3, No. 12, pp. 463-478, Dec. 2014
    10.3745/KTCCS.2014.3.12.463