1 |
Ye Jin, Jang, "Overview of NH Bank Cyber Attack ", AP. "http://news.donga.com/3/all/20110503/36898474/1#," 3. Mar. 2011.
|
2 |
Sang Jin, Jang, "NH Bank Computer Network Password Was '1' and '0000'. ", The Cho-sun Ilbo, "http://news.cho-sun.com/site/data/html_dir/2011/04/20/2011042002347.html," 20 .April. 2011.
|
3 |
Financial Services Commission, "Enforcement Bylaws of Regulation On Supervision of Electronic Financial Activities," Sep. 2009.
|
4 |
Financial Services Commission, "Regulation On Supervision of Electronic Financial Activities," June. 2010.
|
5 |
Sang-hyun Lee, "Identity and Access management of information systems research on how to strengthen," Dongguk University , Aug. 2012
|
6 |
Byung-eon Park, "An integrated approach for identity and access management for efficient administrative work," Jonornal of The Korea Institute of information Security & Cryptology, v.25, no.1, pp.165-172, Feb. 2015
DOI
|
7 |
Young-seok Cho, "A Study on Decision Making Process of System Access Management," Jonornal of The Korea Institute of information Security & Cryptology, v.25, no.1, pp.225-235, Feb. 2015.
DOI
|
8 |
Yang-hyun, Kwon, "Study on access control model for the environment of smart grid system," Pusan National University, Feb. 2013.
|
9 |
Sang-Pil Shin, "An analytic hierarchy process (AHP) approach to selection of implementation mode of mobile office system," Seoul National Univetsity of Science and Technology, July. 2013.
|
10 |
Seokung Yoon, "Factor analysis of VoIP Security Checklists using AHP," Jonornal of The Korea Institute of information Security & Cry-ptology, v.22, no.5, pp.1115-1122, OCT. 2010.
|
11 |
Dong-wook Kim, "A Study on Information Security Policy in the era of Smart Society," Jonornal of The Korea Institute of information Security & Cryptology, v.22, no.4, pp.883-899, Aug. 2012.
|
12 |
Kihoon Sung, "A Study on Threat factors of Information Security in Social Network Service by Analytic Hierarchy Process," Jonornal of The Korea Institute of information Security & Cryptology, v.20, no.6, pp.261-270, Dec. 2010.
|
13 |
Yong-Wook Chung, "The weight analysis research in developing a similarity classification problem of malicious code based on attributes," Jonornal of The Korea Institute of information Security & Cryptology, v.23, no.3, pp.501-514, June. 2013.
DOI
|
14 |
Young-Jin Shin, "A Study of Priority or Policy Implement of Personal Infomation Security in Public Sector: Focsed on Personal Information Security Index," Jonornal of The Korea Institut of information Security & Cryptology, v.22, no.2, pp.379-390, Apr. 2012.
|
15 |
Saaty T. L., "The Analytic Hierarchy rocess," McGraw-Hill, New York, 1980.
|
16 |
Hodong Kim , "A Study on Password Management for Improving Efficiency about Information Security Check Serice," Konkuk University, Jan. 2009.
|
17 |
Gwansik Yoon, "Design and implemenation of an access control system in martwork environment," Ajou University, Jan, 2013.
|
18 |
Sunho Jo, "A Study on the Selection Method of Water Supply System in Apartment House in using AHP", Dong-Eui University, Feb, 2014
|
19 |
Yonghan Lee, "A flexible access control model for complex business applications," Korea University, Jun. 2012.
|