References
- M. Kudo, S. Hada, "XML document security based on provisional authorization," in CCS '00 Proceedings of the 7th ACM conference on Computer and communications security, pp. 87-96, 2012.
- J. O. Park, S. M. Lee, S. K. Kim, and M. S. Chun, "Implementation of Electronic Document Management System with Validation Period of Electronic Documents," Journal of the Korean Institute of Communications and Information Sciences. vol. 35, no. 7, pp.1043-1049, July 2010.
- Hangul and Computer, Text Document File Structure 5.0 [Internet] Available: http://www.hancom.com/etc/hwpDownload.do.
- T. Villwock, Verifiable check and security document system, US Patents US 20120162701 A1 to Thomas Villwock, 2012.
- J. S. Park and J. C. Ha, "Analysis of Vulnerability in Secure Document Management in Digital Multifunctional Devices and Their Solutions," Journal of Korean Institute of Information Technology, vol. 10, no. 6, pp. 133-14, June 2012.
- E. K. Kim, S. J. Jeon, J. H. Han, M. W. Lee, and S. J. Lee, "An effective detection method for hiding data in compound-document files," Journal of the Korea Institute of Information Security and Cryptology vol. 25, no. 6, pp. 1485-1494, Dec. 2015. https://doi.org/10.13089/JKIISC.2015.25.6.1485
- K. S. Seong, J. J. Kim, and H. S. Oh, "System Design for the Safe store and Issue Service Assurance of the E-Document," Journal of the Korean Society of Computer and Information, vol. 13, no. 6, pp.173-180, Nov. 2008.
- K.. Gu, H. Li, G. Sun, "Document Security Identification Based on Multi-classifier," in ATCI 2017: International Conference on Applications and Techniques in Cyber Security and Intelligence, pp. 122-127, 21 2017.
- J. H. Shin, and I. S. Kim, "Study on Detection Technique of Privacy Distribution Route based on Interconnection of Security Documents and Transaction ID," Journal of the Korea Institute of Information Security and Cryptology, vol. 25, no. 6, pp.1435-1447, Dec. 2015. https://doi.org/10.13089/JKIISC.2015.25.6.1435
- S. P. Hong and C. S. Lee, "A Study on Verification of Validity Encrypted XML Documents," Journal of Korea Institute of Electronic Communication Sciences, vol. 9, no. 2, pp. 95-98. Nov. 2015.
- S. J. Jang, "Developing File Security for Windows Operating System", Journal of the Korea Institute of Information and Communication Engineering, vol. 14, no. 6, pp. 1423-1428, Jun. 2010. https://doi.org/10.6109/jkiice.2010.14.6.1423
- S. H. Kim, J. Yoo, "A Study on Prediction of Malicious Code Infectionin Websites Using Markov Chain", Journal of Security Engineering, vol. 14, no. 1, pp. 9-20, Feb. 2017. https://doi.org/10.14257/jse.2017.02.02