References
- J. H. Jung. (2017). An Exploratory Study for Activating Cloud Computing: Focusing on Legislative Alternatives. Journal of Korean Association for Regional Society, 20(4), 73-96.
- S. W. Ahn. (2019). Policy and Directions for Revitalizing Domestic Cloud Computing. Research Report of Software Policy & Research Institute, 2018-009, 1-103.
- E. B. Choi. (2018). A Virtualization Management Convergence Access Control Model for Cloud Computing Environments. Journal of Convergence for Information Technology, 8(5), 69-75. https://doi.org/10.14801/JAITC.2018.8.2.69
- S. H. Lee. (2015). Cloud Computing Issues and Security Measure. Journal of Convergence for Information Technology, 5(1), 31-35. https://doi.org/10.22156/CS4SMB.2015.5.1.031
- S. Y. Choi & K. M. Jeong. (2018). The Security Architecture for Secure Computing Environment. Journal of the Korea of Computer and Information, 23(12), 81-87.
- I. S. Lee & D. M. Jang. (2017). A Study on Methods for Providing Security Service in Cloud Computing. Proceedings of Symposium of the Korean Institute of Communications and Information Sciences, 1052-1053.
- Y. S. Kim. (2014). Technical Trends on Hypervisor-based Virtualization Security in Cloud Computing, KISA Internet & Security Focus.
- CCMB. (2017). Common Criteria for Information Technology Security Evaluation. Version 3.1, Revision 5.
- J. H. Park, S. Y. Kang & S. J. Kim. (2018). Study of Security Requirements of Smart Home Hub through Threat Modelling Analysis and Common Criteria, Journal of the Korea Institute of Information Security & Cryptology, 28(2), 513-528. https://doi.org/10.13089/JKIISC.2018.28.2.513
- W. R. Jeon, J. Y. Kim, Y. S. Lee & D. H. Won. (2006). Development of Protection Profile for Smartphone Operating System based on Common Criteria 3.1. Journal of the Korea Institute of Information Security & Cryptology, 22(1), 117-130.
- D. B. Lee. (2015). A Study on Protection Profile for Multi-Function Devices. Journal of The Korea Institute of Information Security and Cryptology, 25(5), 1257-1258. https://doi.org/10.13089/JKIISC.2015.25.5.1257
- J. H. Kim. H. M. Jung & H. J. Cho. (2017). Design Plan of Secure IoT System based on Common Criteria. Journal of the Korea Convergence Society, 8(10), 61-66. https://doi.org/10.15207/JKCS.2017.8.1.061
- CPA(Commercial Product Assurance). https://www.ncsc.gov.uk/scheme/commercial-product-assurance-cpa.
- NCSC. (2018). CPA Security Characteristic, CPA-SC Server Virtualisation 1.22.
- NCSC. (2018). CPA Security Characteristic, CPA-SC Client Virtualisation 1.22.
- NIAP(National Information Assurance Partnership). https://www.niap-ccevs.org.
- NIAP. (2016). Protection Profile for Virtualization Version 1.0. https://www..niap-ccevs.org/Profile/PP.cfm.
- NIAP. (2016). Extended Package for Server Virtualization Version 1.0. https://www..niap-ccevs.org/Profile/PP.cfm.
- NIAP. (2016). Extended Package for Client Virtualization Version 1.0. https://www..niap-ccevs.org/Profile/PP.cfm.
- S. Y. Ma, J. H. Ju & J. S. Moon. (2015). The Security Requirements Suggestion based on Cloud Computing Security Threats for Server Virtualization System. Journal of the Korea Institute of Information Security & Cryptology, 25(1), 95-105. https://doi.org/10.13089/JKIISC.2015.25.1.95
- F. Swiderski & W. Snyder. (2004). Threat Modeling. Microsoft Press.
- J. H. Lee, H. Lee & I. H. Kang. (2015). Technical Trends on Threat Modelling for Secure Software Development. Review of Korea Institute of Information Security and Cryptology,25(1), 32-38.