1 |
KISA, "Database security audit log Specification for Personal Information protection", Korea Information Security Agency, 2008.
|
2 |
Seung-Ju Jang, Sung-Jin Kim "A Study of the Specific IP Vulnerability for the Oracle System", The Comprehensive Winter Conference of Korea Information and Communications Society, pp.392-394, 2014.
|
3 |
Yu-Kyung Kim, Seung-Cheol Sin, Jun-Seon Ahn, Wook-Sae Lee, Eun-Young Lee, Hwan-Su Han "Case study of software security vulnerabilities database", Journal of Information Science, Vol.28, No.2, pp.20-31, 2010. 02.
|
4 |
Joon-Seon Ahn, Ji-Ho Bang, Eun-Young Lee "Quantitative Scoring Criteria on the Importance of Software Weaknesses", Institute of Information Security, Vol.22, No.6, pp.1407-1417, 2012. 12.
과학기술학회마을
|
5 |
DB Vulnerability Analysis Summary, DBGuide Establish a comprehensive information database operations (www.DBGuide.net)
|
6 |
Web server deployment guide security checks, The Korea Communications Commission, National Internet Development Agency of Korea.
|
7 |
Hyun-A Park, Dong-Hoon Lee, Taik-Yeong Chung "Comperhensive Study on Security and Privacy Requirements for Retrieval System over Encrypted Database", Institute of Information Security, Vol.22, No.3, pp.621-635, 2012.
|
8 |
Dong-Jin Kin, Sung-Je Cho "An Analysis of Domestic and Foreign Security Vulnerability Management Systems based on a National Vulnerability Database", Internet and lnformation Security, Vol.1, No.2, pp.130-147, 2010.
|
9 |
Ji-Hong Kim, Huy-Kang Kim "Automated Attack Path Enumeration Method based on System Vulnerabilities Analysis", Institute of Information Security Vol.22, No.5, pp.1079-1090, 2010. 10.
과학기술학회마을
|
10 |
Ji-Ho Bang, Rhan Ha "Research on Major Weakness Rules for Secure Software Development", J-KICS Vol.38 No.10, pp.831-840, 2013. 10.
과학기술학회마을
DOI
|
11 |
Jin-Seok Park, Hee-Soo Kang, Seung-Joo Kim "How to Combine Secure Software Development Lifecycle into Common Criteria", Institute of Information Security, Vol.24, No.1, pp.171-182, 2014. 02.
과학기술학회마을
DOI
|