|
1 |
Design and Implementation of Permission Delegation in Role-Based Access Control Model
나상엽;
/
Korea convergence Security Association
, v.3, no.2, pp.1-10,
|
|
2 |
Verification Method of Insuring Web Application Security
노시춘;전익수;김귀남;
/
Korea convergence Security Association
, v.3, no.2, pp.11-20,
|
|
3 |
An Analysis of Security Protocol in Internet
김상춘;권기현;
/
Korea convergence Security Association
, v.3, no.2, pp.21-32,
|
|
4 |
A Design of Fair Blind Signatures Protocol using PVNIOT
김상춘;권기현;
/
Korea convergence Security Association
, v.3, no.2, pp.33-40,
|
|
5 |
A System for National Intelligence Activity Based on All Kinds of OSINT(Open Source INTelligence) on the Internet
조병철;
/
Korea convergence Security Association
, v.3, no.2, pp.41-55,
|
|
6 |
Comparison & Analysis of Intrusion Detection System System Protection Profile of NSA and MIC
김남기;박종오;김지영;
/
Korea convergence Security Association
, v.3, no.2, pp.57-65,
|
|
7 |
The Concept and Threat Analysis of Intrusion Detection System Protection Profile
서은아;김윤숙;심민수;
/
Korea convergence Security Association
, v.3, no.2, pp.67-70,
|
|
8 |
Securing Information Related Lawful Problems and it's Rationalities of Remedy
이영수;
/
Korea convergence Security Association
, v.3, no.2, pp.71-83,
|
|
9 |
SnSA Design and Embodiment for ESM of Small Scale Network
이동휘;신영준;김귀남;
/
Korea convergence Security Association
, v.3, no.2, pp.85-97,
|
|