1 |
Ki-wan Ko, "www.hankyung.com/news/app/newsview.php?aid=2014012750251"
|
2 |
Jong-in Lim, "Law and Technology in the Cyber Space," 2002
|
3 |
In-hwan Cha, "An Empirical Research on Developing Personnel Security Management Indicators in Information Security," Kwangwoon University, 2009
|
4 |
Chang-Lai Choi, "Study on IT Outsourcing Policy Based on Operational Risks of Financial Industries," Korea Institute of Information Security & Cryptology, Aug. 2014
|
5 |
Myoung-sup Sim, "An Empirical Study on the Improvement of Security Levels in IT Outsourcing Service," Konkuk University, 2013
|
6 |
Mikko et al. "A Critical Assessment of IS Security between 1990-2004," 2005
|
7 |
Jinho Yoo at el, "Estimating Economic Damages from Internet Incidents," 2008, Information Society, vol.15, no.1
|
8 |
ANSI/INCITS 359-2004, "Information Technology-Role Based Access Control, International committee for Information Technoloty Standards," 2004
|
9 |
Seong-min Jung, "Application Method of Efficient Role Extraction and Safe Role-based Access Control for Developing Financial Application," Journal of Information Security, Vol. 18, No. 5, Oct. 2008
|
10 |
John Barkley, "Computing simple role based access control models and access control lists," Proceeding of 2nd workshop on Role-based access control, august, 1997, pp127-132
|
11 |
Ravi S. Sandhu, Edward J. Coyne, "Role-based access control models," IEEE Computer, February 1996, pp3-47
|
12 |
Ferraiolo D. F.,"Proposed NIST Standard for Role-Based Access Control," ACM Transactions on Information and System Security, Vol.4, No.3, August 2001
|
13 |
NIST, "American National Standard for Information Technoloty-Role Based Access Control (Draft 4/4/2003)," American National Standards Institute Inc. 2003
|
14 |
Sylvia O., "Database Applications of Role-Based Access Control," The University of Western Ontario, Nov. 2001
|
15 |
Difinition of RACF, "http://en.wikipedia.org/wiki/Resource_Access_Control_Facility"
|
16 |
The average salary of bank employees in 2013, http://www.hankyung.com/news/app/newsview.php?aid=2014033147361
|
17 |
Definition of REXX, http://ko.wikipedia.org/wiki/REXX
|
18 |
Jeong-hwan Kim, "A Study on SQL Performance-Based IT Application Change Management Process to Prevent Failures of Online Transactions," Korea Institute of Information Security & Cryptology, Oct. 2014
|
19 |
Definition of JCL, http://en.wikipedia.org/wiki/Job_Control_Language
|
20 |
Definition of Metadata, http://en.wikipe dia.org/wiki/Metadata
|