Browse > Article List

논문
1 Design and Implementation of Permission Delegation in Role-Based Access Control Model
나상엽; / Korea convergence Security Association , v.3, no.2, pp.1-10,
2 Verification Method of Insuring Web Application Security
노시춘;전익수;김귀남; / Korea convergence Security Association , v.3, no.2, pp.11-20,
3 An Analysis of Security Protocol in Internet
김상춘;권기현; / Korea convergence Security Association , v.3, no.2, pp.21-32,
4 A Design of Fair Blind Signatures Protocol using PVNIOT
김상춘;권기현; / Korea convergence Security Association , v.3, no.2, pp.33-40,
5 A System for National Intelligence Activity Based on All Kinds of OSINT(Open Source INTelligence) on the Internet
조병철; / Korea convergence Security Association , v.3, no.2, pp.41-55,
6 Comparison & Analysis of Intrusion Detection System System Protection Profile of NSA and MIC
김남기;박종오;김지영; / Korea convergence Security Association , v.3, no.2, pp.57-65,
7 The Concept and Threat Analysis of Intrusion Detection System Protection Profile
서은아;김윤숙;심민수; / Korea convergence Security Association , v.3, no.2, pp.67-70,
8 Securing Information Related Lawful Problems and it's Rationalities of Remedy
이영수; / Korea convergence Security Association , v.3, no.2, pp.71-83,
9 SnSA Design and Embodiment for ESM of Small Scale Network
이동휘;신영준;김귀남; / Korea convergence Security Association , v.3, no.2, pp.85-97,