1 |
Sang-jin Lee, Jin Kim and Kwang-jo Kim, "An efficient privacy protection scheme for low-cost RFID," Proceeding of KIISC Summer Information Security Conference, pp. 569-573, Jun, 2005.
|
2 |
Dae-ha Park and Tae-seok Baek, "Trend and assignment of cloud computing privacy protection research," Review of KIISC, 21(5), pp. 37-44, Aug, 2011.
|
3 |
Ae-ri Lee, Do-eun Cho and Jae-young Lee, "A study on the protection of user data in the cloud system," Journal of digital convergence, 10(11), pp. 389-394, Dec, 2012.
DOI
|
4 |
Jong-hwei Shin, "Cloud security authentication and assignments," Review of KIISC, 22(6), pp. 28-33, Oct, 2012.
|
5 |
Jang-young Chung and Young-sik Hong method, "Distributed image encryption schemes for privacy-preserving of ultra high resolution images in cloud environments," Journal of Korean Institute of Information Scientists and Engineers: Reality and Letter of Computing, 20(4), pp. 262-266, Apr, 2014.
|
6 |
Byung-rae Cha, Dae-kyu Kim, Nam-ho Kim, Se-ill Choi and Jong-won Kim, "Design of searchable image encryption system of streaming media based on cloud computing," Journal of Korea Institute of Electronic Communication Sciences, 7(4), pp. 811-819, 2012.
DOI
|
7 |
Mok-ryeon Baek, Dong-min Kim and Ik-rae Jeong, "Privacy-preserving self-certified public auditing for secure cloud storage," Journal of KIISE, 43(4), pp. 497-508, Apr, 2016.
DOI
|
8 |
Hyun-sung Kim and Sung-woon Lee, "Homomorphic encryption scheme and applications for cloud computing security," Journal of Security Engineering, 10(2), pp. 213-224, Apr, 2013.
|
9 |
National Law Information Center, "Personal information protection act," http://www.law.go.kr/eng/engLsSc.do?menuId=2&query=PERSONAL%20INFORMATION%20PROTECTION%20ACT#liBgcolor15, (accessed 19 JUNE 2017)
|
10 |
Hyun-mi Jung, Jae-in Sin and Gang-soo Lee, "Design of user authentication method in mobile cloud computing," Proceeding of Korea Institute of Multimedia, 2010(2), pp. 516-519, 2010.
|
11 |
National Law Information Center, "Act on promotion of information and communicat ions network urilization and information protection, etc," http://www.law.go.kr/eng/engLsSc.do?menuId=2&query=ACT%20ON%20PROMOTION%20OF%20INFORMATION%20AND%20COMMUNIC ATIONS%20NETWORK%20UTILIZATION%20AND%20INFORMATION%20PROTECTION%2C%20ETC.#liBgcolor0, (accessed 19 JUNE 2017)
|
12 |
Tae-sik Son and Jong-bin Ko, "Trend of IoT (Internet of Things) security on cloud computing," Review of KIISC 22(1), pp. 20-30, Feb, 2012.
|
13 |
Tae-hyung Kim, "'Attention!' db access control solution for protecting personal infor mation leakage", Boannews, 2016.05.17., http://www.boannews.com/media/view.asp?idx=50623, (accessed 19 JUNE 2017)
|
14 |
IBM, "IBM Bluemix security," https://console.ng.bluemix.net/docs/security/index.html#security (accessed MAY 13 2017)
|
15 |
Jae-gyu Choi and Bong-nam Noh, "Security technology research in cloud computing environment," Journal of Security Engineering 8(3), pp. 371-384, Jun, 2011.
|
16 |
IBM, "IBM Bluemix Hardward Security Module(HSM)," https://www.ibm.com/cloud-computing/bluemix/ko/node/2361 (accessed MAY 13 2017)
|
17 |
Sung-kyung Eun, "Trend of cloud computing security Technologies," Review of KIISC, 20(2), pp. 27-31, Apr, 2010.
|
18 |
Geun-mo Park, "Google Open the Key Management System(KMS) on Cloud," Korea IT & Industry News, (2017.01.12.), http://www.kinews.net/ news/article-View.html?idxno=102595 (accessed 13 MAY 2017)
|
19 |
Microsoft Azure (2017.04.27.), "Azure Security Document," https://docs.mic rosoft.com/ko-kr/azure/security/azure-security (accessed MAY 13 2017)
|
20 |
Sung-jae Jeong and Yu-mi Bae, "Trend analysis of Threats and Technologies for Cloud Security," Journal of Security Engineering, 10(2), pp. 199-212, Apr, 2013.
|
21 |
Yeun-Dek Chung, "The legal study of protection of personal infomation in cloud computing service," Review of Korea Association For Informedia Law, 15(3), pp. 31-54, Feb, 2012.
|
22 |
Cheol-soo Lim, "Cloud computing security technologies," Review of KIISC, 19(3), pp. 14-17, Jun, 2009.
|
23 |
Kee-chang Kim, "Cloud service and protection of personal data," Policy research report for improvement of personal information protection law(Privacy Policy Research Forum), pp. 72-83, Feb, 2013.
|
24 |
Heung-yeol Yeom and Mi-yeon Yoon, "Trend of international standard on cloud computing security," Review of KIISC, 23(3), pp. 14-18, Jun, 2013.
|
25 |
Hak-bum Kim, Eun-jung Jeon and Sung-jun Kim, "Study on security management in cloud computing environment," Management Consulting Review, 2(1), pp. 127-144, Feb, 2011.
|
26 |
Woo-yong Yu and Jong-in Lim, "A study on the privacy security management under the cloud computing service provide," Journal of the Korea Institute of Information Security and Cryptology, 22(2), pp. 337-346, Apr, 2012.
|
27 |
Jeong-hoon Jeon, "A study on the privacy threats factors of cloud services," Convergence Security Journal, 15(5), pp. 87-95, Sep, 2015.
|
28 |
Il-jung Kim, Eun-young Choi and Dong-hoon Lee, "A RFID privacy protect scheme based on mobile," Journal of the Korea Institute of Information Security and Cryptology, 17(1), pp. 89-96, Feb, 2007.
|
29 |
Min-kyong Seong and Yeon-don Jung, "A model for privacy preserving publication of social network data," Journal of KIISE : Database, 37(4), pp. 209-219, Aug, 2010.
|
30 |
Doo-hyun Jeon, Ji-young Chun and Ik-rae Jeong, "An efficient privacy-preserving data sharing scheme in social network," Journal of the Korea Institute of Information Security and Cryptology, 22(3), pp. 447-461, Jun, 2012.
|
31 |
Seung-koo Lee, Sang-soo Yeo, Jung-sik Cho and Sung-kwon Kim, "Secure and efficient privacy protection scheme in RFID system," Proceeding of KIISE: Korea Computer Congress, A, pp. 196-198, Jul, 2005.
|