A Design of Integrated Security Policies for Enabling Adaptive Security in Campus Environment |
Ko, Bong-Koo
(Department of Information Technology, Chonbuk University)
Park, Jong-Seon (Division of Computer Science and Engineering, Chonbuk University) Chung, Seung-Jong (Department of Information Technology, Chonbuk University) Cho, Gi-Hwan (Division of Computer Science and Engineering, Chonbuk University) |
1 | M. G. Kang and S. S. Kim, "Design and Implementation of Security Solution Structure to Enhance Inside Security in Enterprise Security Management System," Journal of the Korea Contents Association, vol. 5, no. 6, pp. 360-367, Dec. 2005. 과학기술학회마을 |
2 | K. Y. Kim, S. W. Lee, and J. H. Kim, "A Security Monitoring System for Security Information Sharing and Cooperative Countermeasure," Journal of the Institute of Electronics Engineers of Korea, vol. 50, no. 2, pp. 60-69, Feb. 2013. 과학기술학회마을 DOI ScienceOn |
3 | Y. J. Kim, S. Y. Lee, H. Y. Kwon, and J. I. Lim, "A Study on the Improvement of Effectiveness in National Cyber Security Monitoring and Control Services," Journal of the Korea Institute of Information Security and Cryptology, vol. 19, no. 1, pp. 103-111, Feb. 2009. 과학기술학회마을 |
4 | KISA, "A Manual of Establishing and Managing a CERT," KISA Guide, no. 2010-13, Jan. 2010. |
5 | Y. T. Kim, O. J. Kwon, J. M. Lee, and T. S. Kim, "Implementation and Design of Policy Based Security System for Integration Management," Journal of the Korea Multimedia Society, vol. 10, no. 8, pp. 1052-1059, Aug. 2007. 과학기술학회마을 |
6 | G. J. Mun, Y. M. Kim, and B. N. Noh "A Performance Comparison of Network Attacks based on Selecting Statistical Criterion," Review of KIISC, vol. 19, no. 2, pp. 16-25, Apr. 2009. |
7 | G. H. Lee and C. G. Lee, "A Risk Evaluation and Real-time Alert Alarm Generation for Responding Cyber Attacks in the Cyber Environment," Review of KIISC, vol. 18, no. 5, pp. 112-124, Oct. 2008. |
8 | J. C. Ahn, "A Government Agency Environment Protects Information System Design using Intrusion Prevention System and Role-base Security Policy," Journal of the Korea Institute of Information Security and Cryptology, vol. 14, no. 6 pp. 91-103, Dec. 2004. 과학기술학회마을 |
9 | J. H. Yoo, J. H. Kim, G. R. Kim, and J. C. Na, "A Standardization Status of the Integrated Security Management and Cyber Trace Technologies," TTA Journal, no. 118, Aug. 2008. |
10 | Cisco, "Integrated Security Architecture Framework," White paper. |
11 | H. H. Choi and T. M. Chung, "Study on Generalization of Security Policies for Enterprise Security Management System," The KIPS Transactions, vol. 9, no. 6, pp. 823-830, Aug. 2002. 과학기술학회마을 DOI ScienceOn |
12 | J. D. Kim, K. W. Kim, and Y. D. Lee, "The Concept and Approach of Convergence Security," Review of KIISC, vol. 19, no. 6, pp. 68-74, Dec. 2009. |
13 | W. S. Seo and M. S. Jun, "A Study on Building an Optimized Defense System According to the Application of Integrated Security Policy Algorithm," Journal of the Korea Institute of Information Security and Cryptology, vol. 21, no. 4, pp. 39-46, Aug. 2011. 과학기술학회마을 |
14 | W. S. Jang, J. Y. Choi, and J. I. Lim, "A study on method of setting up the defense integrated security system," Journal of the Korea Institute of Information Security and Cryptology, vol. 22, no. 3, pp. 575-584, Jun. 2012. 과학기술학회마을 |