1 |
Ministry of Land, Transport and Maritime Affairs(Ministry of land, transport and maritime affairs), Korea, ACT ON THE CONSTRUCTION, ETC. OF UBUQUITOUS CITIES, amended by Act No. 9705, May 22, 2009.
|
2 |
Ministry of Land, Infrastructure and Transport, Act on Smart City Creation and Industry Promotion, etc, This Decree enter into force on Sept. 22, 2017. Law No.14718.
|
3 |
H. S. Jung, C. S. Jeong, Y. W. LEE & P. D. Hong. (2009). An Intelligent Ubiquitous Middleware for U-city: SmartUM, Journal of Information Science and Engineering, 25(2), 375-388. DOI: 10.1688/JISE.2009.25.2.3
|
4 |
J. Hoh and C. Y. Jung. (2017). Convergence-based Smart Factory Security Threats and Response Trends. Journal of the Korea Convergence Society, 8(11), 29-35, DOI: 10.15207/JKCS.2017.8.11.029
DOI
|
5 |
S. W. Lee, J. J. N. Kim. (2017). Service-oriented protocol security framework in ICT converged industrial environment. Journal of the Korea Convergence Society, 8(12), 15-22. DOI: 10.15207/JKCS.2017.8.12.015
DOI
|
6 |
K. H. Lee. (2010). Analysis of Threats Factor in IT Convergence Security. Journal of the Korea Convergence Society, 1(1), 2233-4890. ISSN: 2233-4890
|
7 |
S. W. Rho, C. H. Yun & Y. W. LEE. (2011). Provision of U-city web services using cloud computing. The 13th International Conference Advanced Communication Technology (ICACT), 1545-1549. ISBN: 978-89-5519-154-7
|
8 |
S. Ramgovind, M. Eloff & E. Smith. (2010). The Management of Security in Cloud Computing. Information Security for South Africa (ISSA), 1-7, DOI: 10.1109/ISSA.2010.5588290
|
9 |
S. M. Kim, J. O. Kim, C. H. Yun, J. W. Park, H. S. Jung & Y. W. Lee. (2011). Security Management of a Cloud-based U-City Management System, The Second International Conference on Cloud Computing, GRIDs, and Virtualization, 74-78. ISBN: 978-1-61208-153-3
|
10 |
J. O. Kim, C. H. Yun, J. W. Park, T. H. Hong, K. G. Lee, E. D. Hwang, S. M. Kim & Y. W. LEE. (2011) Implementation of Security Layer for U-City Middleware, Proc. Korean Society For Internet Information. 12(1). 217-218. ISSN: 1738-9593
|
11 |
S. K Yoon & H. S. Jang. (2011) Design of Information Security in Ubiquitous City, Journal of Information and Security, 11(4), 37-42, ISSN: 1598-7329
|
12 |
Y. S. Kim & S. C. Park, Analysis and Protection Method of Security Threat Factor in u-City Management Center, Proc. Korean Society For Internet Information, 9(1), 129-132. ISSN: 1738-9593
|
13 |
J. O. Kim, C. H. Yun, J. W. Park, T. H. Hong, K. G. Lee, E. D. Hwang, S. M. Kim, Y. W. LEE, Device Access Management in the U-City Middleware, Proc. Korean Society For Internet Information, 12(2). ISSN: 1738-9593
|
14 |
K. G. Im & J. S. Kim. (2007). u-City operating Center and Platform as a u-City Infrastructure, TTA Journal IT Standard & Test, 112, 60-66. UCI: http://uci.or.kr/G901:A-0002388813
|
15 |
S. H. Lee & D. W. Lee. (2013) A Study on Digital Convergence and Smart City. The Journal of Digital Convergence, 11(9), 167-172. DOI: 10.14400/JDPM.2013.11.9.167
DOI
|
16 |
S. H. Lee. (2014) A Case Study on Foreign Smart City. The Journal of Digital Convergence, 12(4), 305-310. I: 10.14400/JDC.2014.12.4.305
DOI
|
17 |
S. H. Lee, D. H. Shim & D. W. Lee. (2016). Actual Cases of Internet of Thing on Smart City Industry. Journal of Convergence for Information Technology, 6(4). 65-70. DOI: 10.22156/CS4SMB.2016.6.4.065
DOI
|
18 |
Ministry of Public Administration and Security. (2010). Practices Guide for Information Security Management.[Online]. http://mois.go.kr/frt/bbs/type001/commonSelectBoardArticle.do?bbsId=BBSMSTR_000000000015&nttId=39918
|
19 |
National Intelligence Service. (2018). White Paper on National Information Security, [Online]. https://isis.kisa.or.kr/ebook/ebook2.html#
|
20 |
S. Frankel, P. Hoffman, A. Orebaugh, & R. Park. (2008). Guide to SSL VPNs. Special Publication (Nist SP) 800-113, 87. DOI: 10.6028/NIST.SP.800-113
|
21 |
S. Frankel, K. Kent, R. Lewkowski, R., A. D. Orebaugh, R. W. Ritchey, & S. R. Sharma. (2005). Guide to IPsec VPNs. Special Publication (Nist SP) 800-77, 126. DOI: 10.6028/NIST.SP.800-77
|
22 |
Korea Institute for Advancement of Technology. (2012) Technical Road Map for Information Security, [Online]. http://www.itfind.or.kr/report/analysis/read.do?selectedId=02-004-150421-000029
|
23 |
Telecommunications Technology Association (TTA). (2009), Information Telecommunication Technology Standards Roadmap 2009, ISBN: 9788993092226
|
24 |
D. Geer. (2010) Whatever Happened to Network Access Control Technology?. IEEE Computer, 43, 13-16, DOI: 10.1109/MC.2010.2692010
DOI
|
25 |
Advanced Encryption Standard (AES). (2001) Federal Information Processing Standards Publication 197. DOI: 10.6028/NIST.FIPS.197
DOI
|
26 |
Secure Hash Standard(SHS). (2015) Federal Information Processing Standard (FIPS) 180-4. DOI: 10.6028/NIST.FIPS.180-4
DOI
|