1 |
Seong-Yoon Shin, " The Definitions of Security Requirements for Control Access on the Step of Analysis," J. of KSCI, Vol. 19, No. 11, pp. 97-103, 2014.
|
2 |
Korea Information Sedurity Agency, “Security Guide V 1.0 for secure software development and introduction”, 2008.
|
3 |
Data Expert Knowledge Potal(DBGuide.net), “DB Security Procedures and Technical Elements”, 2015.
|
4 |
Myoung-Gyu Jung and Man-Gon Park, "Consideration Factors in the Design Phase for Small Software Development Projects that are Difficult to Build Information Security Systems," Proceeding of KMMS, Vol. 13, No. 2, pp. 716-719, 2010.
|
5 |
Seong-Yoon Shin, Kil-Hyun Jeong, "Case Analysis of Legal System and Regulations according to the Needs of S/W Development Security," J. of KSCI, Vol. 19, No. 10, pp. 117-124, 2014.
|
6 |
Seong-Yoon Shin, " A Study on Definitions of Security Requirements for Identification and Authentication on the Step of Analysis," J. of KSCI, Vol. 19, No. 7, pp. 87-93, 2014.
|
7 |
Seong-Yoon Shin, Kang-Ho Lee, "A Study of Definition of Security Requirements on Encryption and Audit Logging," J. of KSCI, Vol. 19, No. 9, pp. 85-91, 2014.
|