1 |
2011 Cyber Security Watch Survey, CERT, Jan. 2011.
|
2 |
Ji-hoon Song and Si-jin Lee, "The study of customized internal insider security model based on insider security accident," Korean Society For Internet Information, vol. 12, no. 1, pp. 71-82, Feb. 2011.
|
3 |
SECVIZ, http://www.secviz.org/content/the-davix-live-cd
|
4 |
Baek-ho Sung, Byung-chul Park, Dong-kyoo Shin, Dong-il Shin, Ki-young Moon and Jae-seoung Lee, "A Study of the EAM based on the xml for e-Commerce," Korea Institute of Infor mation Security and Cryptology, vol. 13, no. 2, Dec. 2003.
|
5 |
"E-business and extended ERP," Management and Information technology of MIT, Apr. 2000.
|
6 |
Tae-myeong Chung, "A study on gen eralization of security policies for ent erprise security management system," Korea Information Processing Society, vol. 9, no. 6, Jun. 2002.
|
7 |
"Priorities for ERP SECURITY," Electrical Wholesaling, Aug. 2013.
|
8 |
"JD Edwards, System Foundation," JD Edwards Enterprise software, pp. 743-753, Jun. 1999.
|
9 |
Jung-man Son and Sang-wan Lee, "PMI based User Authentication Management for ERP," Korea Industrial And Systems Engineering, no. 56, pp. 108- 111, Oct. 2003.
|
10 |
Chi-sung Won, Sang-hwan Leem and Wan-sub Um, "A study on the Inside Security of Enterprise Resource Plan ning," Korea Institute of Industrial Engineers, no. C11-5, pp. 1041-1043, Nov. 2005.
|
11 |
David A, Thomas K and Mark H, "ERP Critical Success Factors: An Exploration of the Contextual Factors in Public Sector Institutions," Proceed ings of the 35th Hawaii International Conference on System Sciences, Jan. 2002.
|
12 |
Mark Denning, Kate Hill, Bernard Dodd, Jonathan Lingard, Gray Elkingon, EricMatthews, Wendy Hewson and Jonathon R. Tate, "using SAP R/3," QUE, pp. 743-753, Dec. 2003.
|
13 |
Sang-hwan Leem, "UML with ERP Security Framework implementation," International Journal of Management Science & Financial Engineering, no. SA01-5, pp. 664-667, May. 2005.
|
14 |
Eun Kim, Yun-seok Lee and Min-soo Jung, "A scheme of Permission Tracking based on RBAC and DAC from Digital Forensics Point of view," The Korean Institute of Communications and Information Sciences, pp. 675-676, Jun. 2011.
|