Digital Library
Search: "[ keyword: CC ]" (129)
방화벽 접근정책의 계층적 가시화 방법에 대한 연구
김태용,
권태웅,
이준,
이윤수,
송중석,
Vol. 30, No. 6, pp. 1087-1101,
12월.
2020
10.13089/JKIISC.2020.30.6.1087
주제어: firewall, Access Control List, Hierarchical Visualization, 3D Drill-Down User Interface, Policy Anomaly, firewall, Access Control List, Hierarchical Visualization, 3D Drill-Down User Interface, Policy Anomaly
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: firewall, Access Control List, Hierarchical Visualization, 3D Drill-Down User Interface, Policy Anomaly, firewall, Access Control List, Hierarchical Visualization, 3D Drill-Down User Interface, Policy Anomaly
타이젠 용 데스크톱 버스 (D-Bus) 권한 우회 취약점 분석 및 자동 탐지
김동성,
최형기,
Vol. 30, No. 6, pp. 1023-1030,
12월.
2020
10.13089/JKIISC.2020.30.6.1023
주제어: Tizen, Wearable, Privilege, Desktop Bus, access control, D-Bus, Vulnerability, Tizen, Wearable, Privilege, Desktop Bus, access control, D-Bus, Vulnerability
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Tizen, Wearable, Privilege, Desktop Bus, access control, D-Bus, Vulnerability, Tizen, Wearable, Privilege, Desktop Bus, access control, D-Bus, Vulnerability
GDPR 준수 가능한 블록체인 기반 접근제어 시스템
임준호,
천지영,
노건태,
정익래,
Vol. 30, No. 6, pp. 981-997,
12월.
2020
10.13089/JKIISC.2020.30.6.981
주제어: Blockchain, GDPR, access control, ABE(Attribute Based Encryption), Chameleon Hash, Smart Contract, Blockchain, GDPR, access control, ABE(Attribute Based Encryption), Chameleon Hash, Smart Contract
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Blockchain, GDPR, access control, ABE(Attribute Based Encryption), Chameleon Hash, Smart Contract, Blockchain, GDPR, access control, ABE(Attribute Based Encryption), Chameleon Hash, Smart Contract
안드로이드 애플리케이션 환경에서 CFI 우회 공격기법 연구
이주엽,
최형기,
Vol. 30, No. 5, pp. 881-893,
10월.
2020
10.13089/JKIISC.2020.30.5.881
주제어: Android, CFI(Control Flow Integrity), IFCC(Indirect Function Call Checks), SCS(Shadow Call Stack), Bypass, Android, CFI(Control Flow Integrity), IFCC(Indirect Function Call Checks), SCS(Shadow Call Stack), Bypass
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Android, CFI(Control Flow Integrity), IFCC(Indirect Function Call Checks), SCS(Shadow Call Stack), Bypass, Android, CFI(Control Flow Integrity), IFCC(Indirect Function Call Checks), SCS(Shadow Call Stack), Bypass
저작권 침해 사이트 생애 주기 모델 개발
김득훈,
정해선,
곽진,
Vol. 30, No. 1, pp. 101-121,
2월.
2020
10.13089/JKIISC.2020.30.1.101
주제어: Copyright, Copyright infringement, Lifecycle model, Pirated contents, Acceptance rate, Prediction rate, Copyright, Copyright infringement, Lifecycle model, Pirated contents, Acceptance rate, Prediction rate
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Copyright, Copyright infringement, Lifecycle model, Pirated contents, Acceptance rate, Prediction rate, Copyright, Copyright infringement, Lifecycle model, Pirated contents, Acceptance rate, Prediction rate
취약점 데이터베이스 기반 개선된 보안관제 모델의 효과성 연구
현석우,
권태경,
Vol. 29, No. 5, pp. 1167-1177,
10월.
2019
10.13089/JKIISC.2019.29.5.1167
주제어: Vulnerability Database, security vulnerability, Security Operation, Infringement Accident, Cyber Threat, Vulnerability Database, security vulnerability, Security Operation, Infringement Accident, Cyber Threat
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Vulnerability Database, security vulnerability, Security Operation, Infringement Accident, Cyber Threat, Vulnerability Database, security vulnerability, Security Operation, Infringement Accident, Cyber Threat
OP Code 특징 기반의 텍스트와 이미지 데이터셋 연구를 통한 인공지능 백신 개발
최효경,
이세은,
이주현,
홍래영,
최원혁,
김형종,
Vol. 29, No. 5, pp. 1019-1026,
10월.
2019
10.13089/JKIISC.2019.29.5.1019
주제어: AI Vaccine, Intelligent Vaccine, OP Code feature, Text based, Image based, AI Vaccine, Intelligent Vaccine, OP Code feature, Text based, Image based
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: AI Vaccine, Intelligent Vaccine, OP Code feature, Text based, Image based, AI Vaccine, Intelligent Vaccine, OP Code feature, Text based, Image based
위협모델링과 공통평가기준을 활용한 인포테인먼트의 안전한 업데이트 보안요구사항 분석
강수영,
김승주,
Vol. 29, No. 3, pp. 613-628,
5월.
2019
10.13089/JKIISC.2019.29.3.613
주제어: Threat modeling, STRIDE, IVI(In-Vehicle-Infotainment), SOTA(Security Over-The-Air), CC(Common Criteria), Threat modeling, STRIDE, IVI(In-Vehicle-Infotainment), SOTA(Security Over-The-Air), CC(Common Criteria)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Threat modeling, STRIDE, IVI(In-Vehicle-Infotainment), SOTA(Security Over-The-Air), CC(Common Criteria), Threat modeling, STRIDE, IVI(In-Vehicle-Infotainment), SOTA(Security Over-The-Air), CC(Common Criteria)
스마트 컨트랙트 기반의 산업제어시스템 접근 제어 메커니즘
조민정,
이창훈,
Vol. 29, No. 3, pp. 579-588,
5월.
2019
10.13089/JKIISC.2019.29.3.579
주제어: Blockchain, Smart Contract, industrial control system(ICS), access control, Availability, Blockchain, Smart Contract, industrial control system(ICS), access control, Availability
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Blockchain, Smart Contract, industrial control system(ICS), access control, Availability, Blockchain, Smart Contract, industrial control system(ICS), access control, Availability