References
- EMI group, EMI Music launches DRM-free superior sound quality downloads across its entire digital repertoire, http://www.emigroup.com/Press/2007/press18.htm, April 2007.
- Erin. J., Amazon To Sell DRM-Free Music, http://www.internetnews.com/ec-news/article.php/3678181, May 2007.
- Rosenblatt. B. & Dykstra. G., "Integrating content management with digital rights management: Imperatives and opportunities for digital content lifecycles", Technical report, Giantsteps Media Technology and Dykstra Research. May 14 2003.
- Zadok, E., Badulescu, I., & Shender, A., "Cryptfs: A stackable vnode level encryption file system", Technical Report CUCS-021-98, Computer Science Department, Columbia University, 1998.
- Halcrow, M., "eCryptfs: a stacked cryptographic filesystem", Linux Journal. Vol. 2007, Issue 156, April 2007.
- Spencer. R., Smalley, S., Loscocco, P., Hibler. M., Andersen, D., & Lepreau, J., "The Flask Security Architecture: System support for diverse security policies", Proc. of the 8th USENIX Security Symposium, pp. 123-139, Washington, DC, August 1999.
- Arnab. A., & Hutchison. A., "Digital rights management-a current review", Departmental Technical Report No. cs04-04-00, University of Cape Town, 2004.
- Felten, E. W., "A skeptical view of DRM and fair use", Communications of the ACM. Vol. 46, No. 4, pp. 56-59, 2003.
- Schneier. B., "Applied Cryptography", 2nd Ed., John Wiley & Sons, 1995.
- Daemen, J., & Rijmen, V., "The Design of Rijndael: AES - The Advanced Encryption Standard", Springer-Verlag, 2002.
- Adams, C., "The CAST-128 encryption algorithm", RFC 2144, Network Working Group, May 1997.
- Schneier, B., Kelsey, J., Whiting. D., Wagner, D., Hall, C., & Ferguson, N., "The Twofish Encryption Algorithm: A 128-Bit Block Cipher", John Wiley & Sons, 1999.
- Wright, C. P., Dave, J., & Zadok, E., "Cryptographic file system performance: What you don't know can hurt you", Proc. of 2003 IEEE Security In Storage Workshop, pp. 47-61, October 2003.
- 고영웅, "보안 운영체제를 위한 강제적 접근 제어 보호 프로파일", 한국컴퓨터정보학회 논문지, 제 10권, 제 1호, 141-148쪽, 2005년 3월.
- Ferraiolo, D. F., Sandhu, R., Gavrila, S., Kuhn, D. R., & Chandramouli, R., "Proposed NIST standard for role-based access control", ACM Transactions on Information System Security, Vol. 4, No. 3, pp. 224-274, 2001. https://doi.org/10.1145/501978.501980
- Niemi, D. C., Unixbench 4.1.0, http://www.tux.org/pub/tux/niemi/unixbench
- McVoy, L., & Staelin, C., lmbench 2, http://sourceforge.net/projects/lmbench
- textuality-Bonnie, http://www.coker.com.au/bonnie++/
- Darwin Streaming Server, http://dss.macosforge.org/post/previous-releases/
- WinDump: tcpdump for Windows, http://www.mirrorservice.org/sites/ftp.wiretapped.net/pub/security/packet-capture/winpcap/windump/
- 고영웅, "보안 운영체제의 오버헤드 분석", 한국 컴퓨터정보학회 논문지, 제 10권, 제 2호, 11-19쪽, 2005년 5월.