1 |
Jeong-hoo Jeon, "A Study on the vulnerability of the Cloud computing security", Journal of the Korea Institute of Information Security & Cryptology, Vol. 23, No. 6, pp 1239-1246, December 2013.
DOI
|
2 |
Min-Hee Cho, Eun-Gyeom Jang, Yong-Rak Choi, "User Authentication Technology using Multiple SSO in the Cloud Computing Environment", Journal of the Korea Society of Computer and Information, Vol. 21, No. 4, pp.31-38, April 2016.
DOI
|
3 |
Jeong-Su Park, Yu-Mi Bae, Sung-Jae Jung, "Journal of the Korea Institute of Information and Communication Engineering", Vol. 17, No. 5, pp. 1129-1137, May 2013.
DOI
|
4 |
Yoon-Su Jeong, Sang-Ho Lee, "User Authentication Protocol through Distributed Process for Cloud Environment", Journal of the KIISC, Vol. 22, No 4, pp. 841-849, August 2012.
|
5 |
DongHee Kim, JinTak Choi, "A Study on The Efficient Authentication Management Technique of SSO Foundation", Journal of Korea Institute of Information Technology, Vol. 4, No. 3, pp.55-63, June 2006.
|
6 |
Hyun-Jin Kim, Im-Yeong Lee, "A Study on Security and Improved Single Sign-On Authentication System against Replay Attack", Journal of the Korea Institute of Information Security & Cryptology, Vol. 24, No. 5, October 2014.
|
7 |
Eun-Gyeom Jang, "A Study on Access Control Through SSL VPN-Based Behavioral and Sequential Patterns", Journal of The Korea Society of Computer and Information, Vol. 18, No. 11, November 2013.
|
8 |
Dae-Hee Seo, Im-Teong Lee, "A Study on Single-On Authentication Model Using Multi Agent", The Journal of The Korea Institute of Communication Sciences", Vol. 29, No. 7C, July 2004.
|