1 |
National Industrial Security Center, http://service12.nis.go.kr
|
2 |
Privacy Information Protection Portal, http://www.privacy.go.kr
|
3 |
Jung-Ho Eom, Seon-Ho Park, and Tai M. Chung, "An Architecture of Access Control Model for Preventing Illegal Information Leakage by Insider," Journal of The Korea Institute of Information Security and Cryptology, Vol.20, No.1, pp.59-67, 2010.
|
4 |
Dae-Sung Lee, Jason Kim, and Kui-Nam Kim, "Research and Technology Trends for Prevention of Data Leakage," Review of The Korea Institute of Information Security and Cryptology, Vol.20, No.1, pp.56-65, 2010.
|
5 |
Hang-Bae Chang, "The Design of Information Security Management System for SMEs Industry Technique Leakage Prevention," Journal of Korea Multimedia Society, Vol.13, No.1, pp.111-121, 2010.
|
6 |
Ji-Hoon Song, Si-Jin Lee, "A Study of Information Security Measures Requirements Analysis Considering Insider Threats," Proceedings of the conference on Korean Society for Internet Information, pp.399-404, 2010.
|
7 |
Song-Young Kim, Joseph Kim, Jong-In Lim, and Kyung-Ho Lee, "A study on the security policy improvement using the big data," Journal of The Korea Institute of Information Security and Cryptology, Vol.23, No.5, pp.969-976, 2013.
DOI
|
8 |
Jang-Su Park, Jung-Hyun Park, Yong-Suk Kang, and Im-Yeong Lee, "A study on Scenario Design Methodology for Prevention of Information Leak by Using Modeling of User Behavior," Proceedings of the conference on Korea Information Processing Society, Vol.20, No.1, 2013.
|
9 |
Jang-Su Park, Yong-Suk Kang, and Im-Yeong Lee, "A Study on The Management Plan for Prevention of Information Leak by Using Call-out," Proceedings of the conference on Korea Information Processing Society, Vol.21, No.1, 2014.
|
10 |
Jang-Su Park, Im-Yeong Lee, "A Study on Log Analysis Plan for Prevention of Information Leak Security Solution - focusing at a Single Scenario for Information Leak," Proceedings of the Korea Institute of Information Security and Cryptology Chungnam Conference, 2014.
|