1 |
Heung-Ryong Oh, Jeong Sik Park, Byoung-Moon Chin, Heung-Youl Youm, "Security International Standardization Status and Driven Systems Analysis", Review of KIISC, Korea Institute of Infomation Security and Cryptology, Vol.21 No.2, pp. 7-18, 2011
|
2 |
Yong-Nyuo Shin, HakIl Kim, Myung-Geun Chun, "Personal Information Protection Reference Architecture and International Standardization Trend", Review of KIISC, Korea Institute of Infomation Security and Cryptology, Vol.21 No.5, pp. 12-20, 2011
|
3 |
Kyeong Hee Oh, Jungduk Kim, Heung-Youl Youm, "A Trend on Security International Standardization", Review of KIISC, Korea Institute of Infomation Security and Cryptology, Vol.23 No.3, pp. 5-13, 2013
|
4 |
Heung-Youl Youm, "An Analysis on Personal Information Protection International Standards", Review of KIISC, Korea Institute of Infomation Security and Cryptology, Vol.25 No.4, pp. 6-10, 2015
|
5 |
Younghun Jeong, Jeonghwan Song, "A Trend on lightweight cryptography International Standardization in ISO/IEC JTC 1/SC 27 WG2", Review of KIISC, Korea Institute of Infomation Security and Cryptology, Vol.25 No.4, pp. 11-17, 2015
|
6 |
Hyun-Sun Kang, "An Analysis of Information Security Management System and Certification Standard for Information Security", Journal of Security Engineering, JSE, Vol.11 No.6, pp. 455-468, 2014
DOI
|
7 |
HeungYoul Youm, Heung-Ryong Oh, "A Trend on Security Technology and International Standardization(ITU-T SG17)", Review of KIISC, Korea Institute of Infomation Security and Cryptology, Vol.24 No.4, pp. 7-14, 2014
|
8 |
Heung-Ryong Oh, Young-Hwa Kim, Heung-Youl Youm, "A Trend on ITU-T SG17(Security) International Standardization", OSIA Standards & Technology Review, Vol.27 No.2, pp. 8-20, 2014
|
9 |
Jungduk Kim, "A Trend on Security Management International Standardization", Review of KIISC, Korea Institute of Infomation Security and Cryptology, Vol.21 No.2, pp. 19-22, 2011
|
10 |
Heung Ryong Oh, Sungpil Yu, Youngwha Kim, "A trend on information security standardization in ITU-T SG17", Proceedings of the Winter Conference, KICS, Vol.2015 No.1, 2015
|
11 |
ISO/IEC JTC1 SC27, http://www.iso.org/iso/iso_technical_committee?commid=45306
|
12 |
ITU-T, http://www.itu.int/en/ITU-T/studygroups/2013-2016/17/Pages/default.aspx
|
13 |
IETF, http://www.ietf.org/
|
14 |
IETF Security Area, http://datatracker.ietf.org/wg/#sec
|
15 |
abfab, http://datatracker.ietf.org/wg/abfab/documents.
|
16 |
dane, http://datatracker.ietf.org/wg/dane/documents
|
17 |
httpauth, http://datatracker.ietf.org/wg/httpauth/documents
|
18 |
ipsecme, http://datatracker.ietf.org/wg/ipsecme/documents
|
19 |
jose, http://datatracker.ietf.org/wg/jose/documents
|
20 |
kitten, http://datatracker.ietf.org/wg/kitten/documents
|
21 |
mile, http://datatracker.ietf.org/wg/mile/documents
|
22 |
oauth, http://datatracker.ietf.org/wg/oauth/documents
|
23 |
sacm, http://datatracker.ietf.org/wg/sacm/documents
|
24 |
tls, http://datatracker.ietf.org/wg/tls/documents/
|