References
- 한국인터넷진흥원 개인정보보호, http://privacy.kisa.or.kr
- SEED 공식 사이트, http://seed.kisa.or.kr/seed/jsp/seed.jsp
- L. Sweeney, "k-anonymity: a model for protection privacy", International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10(5), 2002. pp.557-570. https://doi.org/10.1142/S0218488502001648
- A. Machanavajjhala, J. Gehrke, and D. Kifer, "l-Diversity: Privacy beyond k-anonymity". In International Conference on Data Engineering (ICDE), 2006. pp.24-35.
- DES(Data Encryption Standard), http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf
- AES(Advanced Encryption Standard), http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
- Telecommunications Technology Association, 128-bit Block Cipher SEED (TTA.KO-12.0004/R1), 1999.
- Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Communications of ACM, Vol. 21, pp. 120-126, 1978. https://doi.org/10.1145/359340.359342
- A. Shamir, "How to share a secret", Communications of the ACM, vol.22, 1979. pp.612-613. https://doi.org/10.1145/359168.359176
- Blakley, G. R. "Safeguarding cryptographic keys", Proceedings of the National Computer Conference 48, pp.313-317, 1979.
- J. Benaloh, J. Leichter, "Generalized Secret Sharing and Monotone Functions", In Advances in Cryptology-CRYPTO '88, Lecture Notes in Computer Science, vol. 403, pp. 27-35, 1990.
- C. Blundo, A, De Santis, L. Gargano, and U. Vaccaro, "On the Information Rate of Secret Sharing Schemes", Theoretical Computer Science, vol. 154(2), pp. 283-306, 1996. https://doi.org/10.1016/0304-3975(95)00065-8
- E. F. Brickell and D. M. Davenport, "On the Classification of Ideal Secret Sharing Scheme", Journal of Cryptology, vol. 4, pp. 123-134, 1991.
- 박소영, 이상호, 권대성, "가중치를 갖는 비밀분산법", 정보과학회논문지: 시스템 및 이론 제29권 제4호, 2002.4.
- Oriol Farras, Jaume Marti-Farre, Carles Padro, "Ideal Multipartite Secret Sharing Schemes", Advances in Cryptology, Eurocrypt 2007, Lecture Notes in Computer Science, Vol.4515, pp. 448-465, 2007.
- Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima and Toshiaki Tanaka, "A New (k, n)-Threshold Secret Sharing Scheme and Its Extension", Lecture Notes in Computer Science, Vol. 5222, pp.455-470, 2008.
- 송유진, 이동혁, "New Secret Sharing Scheme for Privacy Data Management", 한국정보보호학회 2006년도 하계학술대회, Vol.16, No.1, pp.765-773, 2006.
- Telecommunications Technology Association, Modes of Operation for the Block Cipher SEED (TTAS. KO-12.0025), 2003.
- Hadoop Official Site, http://hadoop.apache.org
- HDFS Architecture, Hadoop 0.20 Documentation, http://hadoop.apache.org/common/docs/r0.20.2/hdfs_design.html
- Tom White, Hadoop, The Definitive Guide, 3. The Hadoop Distributed Filesystem, Data Flow, Ch.3, O'REILLY, 2009.
- 방세중, 조성환, 이승하, 김양우, "클라우드 컴퓨팅 환경에서 안전한 개인정보 분산저장 모델 및 평가", 한국인터넷정보학회 10주년 기념학회, Vol.11 No.1, pp.169-170, 2010.
- Eclipse 공식 사이트, http://www.eclipse.org
- Java 공식 사이트, http://www.java.com
- Java.math Class BigInteger 공식 사이트, http://download.oracle.com/javase/1.4.2/docs/api/java/math/BigInteger.html