1 |
A. Balalaie, A. Heydarnoori & P. Jamshidi. (2016). Microservices architecture enables devops: Migration to a cloud-native architecture. IEEE Software, 33(3), 42-52.
DOI
|
2 |
S. J. Shin & I.K. Park.(2000). A New Approach to the Verification of a Message Protocol:Fuzzy Integral. Journal of Korea Information Processing Society. 7(6), pp. 1903-1910. DOI:10.3745/KIPSTE.2000.7.6.1903.
DOI
|
3 |
J. Clark & P.C. Van Oorschot. (2013). SoK: SSL and HTTPS: revisiting past challenges and evaluating certificate trust model enhancements. In Proc. IEEE Symposium on Security and Privacy 2013, Berkeley, CA, USA, May 19-22, pp.511-525. IEEE Computer Society.
|
4 |
S.C. Park.(2017). A Comparative Analysis of PKI Authentication and FIDO Authentication. Journal of the Korea Institute of Information and Communication Engineering. 21(7), 1411-1419.
DOI
|
5 |
R. Xu, W. Jin & D. Kim. (2019). Microservice security agent based on API gateway in edge computing. Sensors, 19(22), 4905.
DOI
|
6 |
M. Risius & K. Spohrer. (2017). A blockchain research framework, Business & Information Systems Engineering. 59(6). 385-409.
DOI
|
7 |
J. A. Berkowsky & T. Hayajneh.(2017). Security issues with certificate authorities. Proc. IEEE 8th Annu. Ubiquitous Comput. Electron. Mobile Commun. Conf. (UEMCON). 449-455.
|
8 |
S.H. Lee.(2007). Implementation of Call Service Application Modeling and Performance Measurement in Open API based Gateway System. KWANGWOON UNIVERSITY. Master's Thesis. http://www.riss.kr/link?id=T11101637.
|
9 |
E.S.Jeong.(2014). A Design of the Encrypted File System with PKI Authentication : User Authentication using PKI. Soongsil University, Master's Thesis.
|
10 |
Liu Y, Tome W, Zhang L, Choffnes D, Levin D, Maggs B, Mislove A, Schulman A & Wilson C. (2015). An end-to-end measurement of certificate revocation in the web's PKI. In Proceedings of the 2015 internet measurement conference. ACM, 183-196.
|
11 |
S. Santesson, M. Myers, R. Ankney, A. Malpani, S. Galperin, & C. Adams. (2013). X.509 Internet public key infrastructure online certificate status protocol-OCSP, RFC 6960. 1-41. https://www.hjp.at/(en,st_b)/doc/rfc/rfc6960.html
|
12 |
C. J. Chae, H. J. Cho & H.M. Jung. (2018). Authentication Method using Multiple Biometric Information in FIDO Environment. Journal of Digital Convergence, 16(1), 159-164. DOI : 10.14400/JDC.2018.16.1.159
DOI
|
13 |
A. Ouaddah, A. Abou Elkalam, A. Ait Ouahman. (2016). FairAccess: a new Blockchain-based access control framework for the Internet of Things. Security and communication networks, 9(18), 5943-5964.
DOI
|
14 |
S. T. Lee. (1994). A Study on the Development of Hierarchical Fuzzy Evaluation Algorithm and Its Application. Korea Maritime & Ocean University. Master's Thesis.
|
15 |
J. W. Lee & H. S. Seo (2021). A Study on the API Gateway for human resources management modules extensions in ERP. Journal of the Korea society of computer and information, 26(2), 79-88. DOI : 10.9708/JKSCI.2021.26.02.079
DOI
|
16 |
Y. M. Park, Y. I. Choi, B. S. Lee.(2004). Technology Trend on Open API for Converged Telecommunication Services. Electronics and Telecommunications Trends, 19(6), 105-117. DOI:10.22648/ETRI.2004.J.190611
DOI
|
17 |
D. Macrinici, C. Cartofeanu & S. Gao. (2018). Smart contract applications within blockchain technology: A systematic mapping study. Telematics and Informatics, 35(8), 2337-2354.
DOI
|
18 |
C. Ebert, P. Louridas, T. M. Fernandez-Carames & P. Fraga-Lamas. (2020). Blockchain Technologies in Practice. IEEE Software, 37(4), 17-25.
DOI
|