1 |
Deyan Chen and Hong Zhao, "Data security and privacy protection issues in clouding computing," Proceedings of 2012 International Conference on Computer Science and Electronics Engineering, pp. 647-651, Mar. 2012.
|
2 |
Youngmin Yeo, Chanwoo lee, and Jongsub Moon, "Proposal of security requirements for the cloud storage virtualization system," Journal of The Korea Institute of information Security & Cryptology, 23(6), pp. 1247-1257, Dec. 2013
DOI
|
3 |
Jong-chang Ahn, Seung-won Lee, Ook Lee, and Sung phil Cho, "A study on influence of information security in selecting smart phone," Journal of The Korea Institute of information Security & Cryptology, 24(1), pp. 207-214, Feb. 2014
DOI
|
4 |
DaeYeong Hong, WonSeok Ko, and Seongsoo Im, "Virtualization techniques for secure and reliable computing," Journal of The Korea Institute of information Scientists and Engineers, 26(10), pp. 50-57, Oct. 2014
|
5 |
Jungho Ju, Seungyoung Ma, and Jongsub Moon, "Proposal of security requirements for storage virtualization system against clouding computing security threats," Journal of Security Engineering, 11(6), pp. 469-478, Dec. 2014
DOI
|
6 |
Jong-shik Lee and Kyung ho Lee, "A study on security container to provent data leaks," Journal of The Korea Institute of Information Security & Cryptology, 24(6), pp. 1225-1241, Dec. 2014
DOI
|
7 |
Khelender Sasan, "Docker Containers," NEC Technologies India, Oct. 2014.
|
8 |
Kong Jae Hee, "Secure full-virtualization method," M.S. Thesis, SungKyunKwan University, Apr. 2013.
|
9 |
Hyewon Lee, Changwook Park, GuenGi Lee, KwonYoup Lee, and Sangjin Lee, "Analysis of present situation of secure USB from forensic view point," Proc. of The Korean Society of Broadcast Engineers, pp. 63-65, Feb. 2008
|
10 |
Ji-Hoon Jung, Suk-Hyun Kim, Min-Su Kim, and Bong-Nam Noh, "Analyze vulnerability of secure storage," Proc. of The Korean Institute of Information Scientists and Engineers, pp. 58-61, Nov. 2009
|
11 |
Byong Kuk Lee, "Memory system having secure storage device and method of managing secure area thereof," Patent (KR1020090067649), Jun. 2009
|
12 |
Suk-Jo Shin, Seon-Joo Kim, and In-June Jo, "Privacy data protection methods on smart phone using a virtual disk," Journal of The Korea Contents Association, 13(12), pp. 560-567, Dec. 2013
DOI
|
13 |
TaeSup Zang, "Understanding virtualized disk storage technology," Journal of The Korean Information Technology, 7(1), pp. 67-74, Dec. 2009
|
14 |
Manel Medina, "VIPDISK security report," esCERT at inLAB-UPC, Barcelona, Apr. 2015.
|