1 |
http://www.dbguide.net/db.db?cmd=view&boardUid=152806&boardConfigUid=9&categoryUid=216&boardIdx=146&boardStep=1
|
2 |
Eong-Jun Kang, "Sucessful DB Security System Implmentation Method", Technical paper, Softforum,, 2012
|
3 |
Joo Kyung-Soo, Woo Jung-Woong, "An Object-Oriented Analysis and Design Methodology for Secure Database Design-focused on Role Based Access Control", Journal of the Korea Society of Computer and Information, vol.18, no. 6, pp.63-70, June. 2013.
과학기술학회마을
DOI
ScienceOn
|
4 |
DatabaseSecurity(Common-sensePrinciples), http://www.governmentsecurity. org/articles/DatabaseSecurityCommon-sensePrinciples.php
|
5 |
http://www.kdb.or.kr/info/info_05_.php
|
6 |
http://cafe.naver.com/volthee/120
|
7 |
http://redkite777.tistory.com/315
|
8 |
Jong-Il, Pak, Dae-Woo Park, "A Study on DB Security Problem Improvement of DB Masking by Security Grade", Journal of the Korea Society of Computer and Information, vol.14, no. 4, pp.101-109, April. 2009.
과학기술학회마을
|
9 |
Analysis Report of New Trend of DB Encryption and Security Technology, Financial Security Agency, September, 2012.
|
10 |
Tae-Hee Park, "Database Encryption Police-Introduction of DataSecure", KSCI Review, vol.16, no 1, pp.61-72, Jan. 2008.
|
11 |
Young-Dae Ko, Sang-Jin Lee, "Proposal of Personal Information DB Encryption Assurance Framework", Journal of the Korea Institute of Information Security and Cryptology, vol.24, no. 2, pp.397-409, April, 2014
과학기술학회마을
DOI
ScienceOn
|
12 |
Seong-Yoon Shin, "A Study on Definitions of Security Requirements for Identification and Authentication on the Step of Analysis ", Journal of the Korea Society of Computer and Information, vol.19, no. 7, pp.87-93, July. 2014.
과학기술학회마을
DOI
ScienceOn
|
13 |
Joo Kyung-Soo, Woo Jung-Woong, "An Object-Oriented Analysis and Design Methodology for Secure Database Design -focused on Role Based Access Control", Journal of the Korea Society of Computer and Information, vol.18, no. 6, pp.63-70, June. 2013.
과학기술학회마을
DOI
ScienceOn
|
14 |
Woo Seok Seo, Jung Oh Park, Moon Seog Jun, "A Design of Policy Treatment Techniques of Access Control Inference based Convergence Security System", Korea Information Science Society Journal:Information Communication, vol.38, no. 6, pp.422-430, June. 2011.
|
15 |
Eui-Kil Lee, "Encrption Solution for Personal Information Security, Vometric Data Security Introduction", Technical Paper, COMAS, 2013
|
16 |
Hyun-A Park, Dong-Hoon Lee, Taek-Young Jeong, Young-Taek, Jeong, "Comprehensive Study on Security and Privacy Requirements for Retrieval System over Encrypted Database", Journal of the Korea Institute of Information Security and Cryptology, vol.22, no. 3, pp.621-635, June, 2012
과학기술학회마을
|