참고문헌
- Ministry of Government Legistation, http:/www.law.go.kr/lsInfoP.do?lsiSeq=202280&efYd=20180522#0000.
- KISA, "Information Protection System Implementation Practical Guide", 2018.
- International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC).(2016). Information security management (ISO/IEC Standard No. 27001).
- KISA, "Information Protection Service Cost Estimating Guidelines", 2015.
- You-Jin Park, "A Study on an Estimation of Adjusted Coefficient for the Maintenance of Information Security Software in Korea Industry", 2011.
- Bohme, R., "Security Metrics and Security Investment Models", In IWSEC, pp. 10-24, 2010.
- Yeon-Ho Jo, "A Study on Policy for cost estimate of Security Sustainable Service in Information Security Solutions", 2015.
- Korea Software Industry Association, "Software Business Cost Reference Guide", 2018
- Seogwipo city, "2016-2018 Information Security System Maintenance Inspection Report", 2016-2018.
- NIST, https://www.researchgate.net/profile/Nicole_Radziwill/publication/318311904_Cybersecurity_Cost_of_Quality_Managing_the_Costs_of_Cybersecurity_Risk_Management/links/5962b402458515a35751ac26/Cybersecurity-Cost-of-Quality-Managing-the-Costs-of-Cybersecurity-Risk-Management.pdf?origin=publication_detail pp. 189-197, Sep. 2010.
- N. Park, H. Hu, and Q. Jin, "Security and Privacy Mechanisms for Sensor Middleware and Application in Internet of Things (IoT)", International Journal of Distributed Sensor Networks, Vol. 2016, No. 1, Jan. 2016. https://doi.org/10.1155/2016/2965438.
- D. Lee and N. Park, "Electronic identity information hiding methods using a secret sharing scheme in multimedia-centric internet of things environment", International Journal of Personal And Ubiquitous Computing, Vol. 22, No. 1, pp. 3-10, Feb. 2018. https://doi.org/10.1007/s00779-017-1017-1
- N. Park and M. Kim, "Implementation of load management application system using smart grid privacy policy in energy management service environment", International Journal of Cluster Computing, Vol. 17, No. 3, pp. 653-664, Sep. 2014. https://doi.org/10.1007/s10586-014-0367-y
- D. Lee and N. Park, "Geocasting- based synchronization of Almanac on the maritime cloud for distributed smart surveillance", International Journal of Supercomputing, Vol. 73, No. 3, pp. 1103-1118, Mar. 2016.
- N. Park, "Privacy-Enhanced Deduplication Technique in Closed Circuit Television Video Cloud Service Environment", International Journal of Engineering & Technology, Vol. 7, No. 24, pp. 65-66, May 2018.
- J. Kim, N. Park, G. Kim, and S. Jin, "CCTV Video Processing Metadata Security Scheme Using Character Order Preserving-Transformation in the Emerging Multimedia", International Journal of ELECTRONICS, Vol. 8, No. 4, pp. 412-426, Apr. 2019.
- N. Park and N. Kang, "Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle", International Journal of Sensors(Basel), Vol. 16, No. 1, pp. 1-16, Dec. 2015.
- N. Park, J. Kwak, S. Kim, D. Won, and H. Kim, "WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment", Conference of Advanced Web and Network Technologies, and Applications, Harbin, China, pp. 741-748, Jan. 2006.
- N. Park and H. Bang, "Mobile middleware platform for secure vessel traffic system in IoT service environment", International Journal of Security And Communication Networks, Vol. 9, No. 6, pp. 500-512, Apr. 2016. https://doi.org/10.1002/sec.1108
- D. Lee, N. Park, Geonwoo Kim, and Seunghun Jin, "De-identification of metering data for smart grid personal security in intelligent CCTV-based P2P cloud computing environment", International Journal of Peer-to-Peer Networking and Applications, Vol. 11, No. 6, pp. 1299-1308, Nov. 2018.
- D. Lee and N. Park, "A Proposal of SH-Tree Based Data Synchronization Method for Secure Maritime Cloud", Journal of KIISC, Vol. 26, No. 4, pp. 929-940, Aug. 2016.