Digital Library


Search: "[ keyword: Agent ]" (11)
    A Study on Applying Zero Trust Architecture: Focusing on Implementing Remote Work System
    , , Vol. 33, No. 6, pp. 1001-1020, Dec. 2023
    10.13089/JKIISC.2023.33.6.1001

    Detection of Abnormal Traffic by Pre-Inflow Agent
    조영민, 권헌영, Vol. 28, No. 5, pp. 1169-1177, Sep. 2018
    10.13089/JKIISC.2018.28.5.1169
    Keywords: abnormal traffic, Agent, pre-inflow, Detection, abnormal traffic, Agent, pre-inflow, Detection

    A Study on ACAS for Enhanced Security in Cloud Virtualization Internal Environment
    Tae-Sung Park, Do-Hyeon Choi, Kyoung-Hwa Do, Moon-Seog Jun, Vol. 22, No. 6, pp. 1355-1362, Dec. 2012
    10.13089/JKIISC.2012.22.6.1355
    Keywords: access control, Cloud Virtualization, Agent Management, Hypervisor

    An Extended SAML Delegation Model Based on Multi-Agent for Secure Web Services
    Kyu-Il Kim, Dong-Ho Won, Ung-Mo Kim, Vol. 18, No. 4, pp. 111-122, Aug. 2008
    10.13089/JKIISC.2008.18.4.111
    Keywords: SAML, XACML, Agent

    Design and Implementation of an Agent-Based System for Luring Hackers
    Ik-Su Kim, Myung-Ho Kim, Vol. 17, No. 5, pp. 117-130, Oct. 2007
    10.13089/JKIISC.2007.17.5.117
    Keywords: computer security, Agent, signature, Honeypot, Intrusion

    Shared Key and Public Key based Mobile Agent Authentication Scheme supporting Multiple Domain in Home Network Environments
    , , , Vol. 14, No. 5, pp. 109-120, Oct. 2004
    10.13089/JKIISC.2004.14.5.109
    Keywords: mobile agent, authentication, Home Network, Shared Key

    Design and Implementation of a Traceback System based on Multi-Agents
    , , , Vol. 13, No. 4, pp. 3-12, Aug. 2003
    10.13089/JKIISC.2003.13.4.3
    Keywords: Traceback, sniffing, spoofing, traceback server, traceback agents

    Cryptographic Traces for the Protection of Mobile Agent Execution
    Weon Shin, Kyung-Hyune Rhee, Vol. 11, No. 3, pp. 71-78, Jun. 2001
    10.13089/JKIISC.2001.11.3.71
    Keywords: Mobile Agent Security, Cryptographic Trace

    Protecting Mobile Agent with VPN
    , , Vol. 11, No. 3, pp. 3-12, Jun. 2001
    10.13089/JKIISC.2001.11.3.3
    Keywords: mobile agent, VPN, IPsec, IKE

    A Digital Nominative Proxy Signature Scheme for Mobile Communication
    , , Vol. 11, No. 2, pp. 27-36, Apr. 2001
    10.13089/JKIISC.2001.11.2.27
    Keywords: Nominative Proxy Signature, Agent, Mobile communication, Confidentiality, Safety, Non-Repudiation