Designing Mutual Cooperation Security Model for IP Spoofing Attacks about Medical Cluster Basis Big Data Environment |
An, Chang Ho
((사)전국지방의료원연합회 기획운영부)
Baek, Hyun Chul (경남도립남해대학 스마트융합정보과) Seo, Yeong Geon (경상대학교 컴퓨터과학과) Jeong, Won Chang (진주보건대학 복지행정계열) Park, Jae Heung (경상대학교 컴퓨터과학과) |
1 | 의료기관간 진료정보교류표준 고시(안)소개, 보건복지부, 2016. 10. |
2 | C-C. Park, G-H. Park, S-H. Kim, and S-H. Koh, The proposal of evaluation measure from hospital information system : The case study of C national university hospital in Korea, Journal of The Korea Knowledge Information Technology Systems, Vol. 2, No. 2, pp. 69-77, 2007. |
3 | J-H. Choi, Analysis of changes in the muscle activity and fatigue of the erector spinae using IT convergent type medical equipment, Journal of Knowledge Information Technology and Systems, Vol. 10, No. 6, pp. 665-673, 2015. |
4 | S-K. Park, A study on the regional differences of telemedicine and digital divide, Journal of the Kor ean Geographical Society, Vol. 50, No. 3, pp. 325-338, 2015. |
5 | 전정훈, "클라우드 컴퓨팅 서비스의 취약성과 대응 기술 동향에 관한 연구" 한국융합보안학회, Vol 13, No. 6, pp. 1239-1246, 2013. 4. |
6 | J-K. Park, A study on measures to active cultural contents service in big data age, Vol. 20, No. 1, pp. 324-334, Mar. 2014. |
7 | Q. Miao, When intelligence meeting wity big data : Review and perceptions of big Data' S hotspot intelligence tracking, Institute of Scientific & Technical Information of Shanghai, Shanghai 200031, No. 5, Serial No. 187, 2013. |
8 | S-Y. Kim, J-I. Lim, and K-h. Lee, A study on the security policy improvement using the big data, Korea University, Graduate School of Information Security, Vol. 23, No. 5, pp. 969-976, 2013, http://dx.doi.org/10.13089/JKIISC.2013.23.5.96, 2013. DOI |
9 | 김명희, 백현철, 홍석원, 박재흥 "빅데이터 환경에서 정부민원서비스센터 어플리케이션 불법 이용에 대한 서비스 자료 암호화 모델", 한국융합보안학회, Vol 15, No. 7, pp. 31-38, 2015. 12. |
10 | S. Bellovin, M. Leech, and T. Taylor, ICMP Traceback message, IETF, draft-ietfitrace-04, Feb. 2003. |
11 | http://www.hankookilbo.com/v/e6104b4b86d4446ba63127649079e13f |
12 | http://news.mk.co.kr/newsRead.php?no=845839&year=2016 |
13 | Y-Y. Mu, H-C. Baek, J-Y. Choi, W-C. Jeong, and S-B. Kim, A proposal of a defense model for the abnormal data collection using traceback information in big data environments, Journal of Knowledge Information Technology a nd Systems, Vol. 10, No. 2. pp. 753-162, 2015. |
14 | 허승표, 이대성, 김귀남, "모바일 환경에서 OTP기술과 얼굴인식 기술을 이용한 사용자 인증 개선에 관한 연구", 한국융합보안학회, Vol 11, No. 3, pp. 75-84, 2011. 6. |