Digital Library


Search: "[ keyword: Protection ]" (88)
    An adaptive digital watermark using the spatial masking
    , Vol. 9, No. 3, pp. 39-52, Jun. 1999
    10.13089/JKIISC.1999.9.3.39
    Keywords: Digital watermarking, copyright protection, spread spectrum, spatial masking

    A Security Evaluation Model On Multiple Protection Countermeasures
    , Vol. 8, No. 3, pp. 3-16, Jun. 1998
    10.13089/JKIISC.1998.8.3.3
    Keywords: Security Evaluation, Protection, Effectiveness, Risk Analysis

    A Study on PIMS Controls for PII Outsourcing Management under the Cloud Service Environment
    Dae-Ha Park, Keun-Hee Han, Vol. 23, No. 6, pp. 1267-1276, Dec. 2013
    10.13089/JKIISC.2013.23.6.1267
    Keywords: Cloud service, Privacy, PII Protection, ISMS, PIMS, PIPL, Outsourcing Control

    Study on Anti-Phishing Solutions, Related Researches and Future Directions
    Ji Sun Shin, Vol. 23, No. 6, pp. 1037-1048, Dec. 2013
    10.13089/JKIISC.2013.23.6.1037
    Keywords: Phishing, Anti-Phising Solutions, Security, Usability, User Protection

    Analysis of Personal Information Protection Circumstances based on Collecting and Storing Data in Privacy Policies
    Jae-Geun Lee, Sang-Ug Kang, Heung-Youl Youm, Vol. 23, No. 4, pp. 767-780, Aug. 2013
    10.13089/JKIISC.2013.23.4.767
    Keywords: Privacy Policy, Personal Information Protection, Data Analysis, Statistics

    A Study on Consigned Party Management System Enhancement for Personal Information Protection
    Tae-Hun Kang, Jong-In Lim, Vol. 23, No. 4, pp. 781-802, Aug. 2013
    10.13089/JKIISC.2013.23.4.781
    Keywords: Personal Information Protection, Consigned Party

    Dynamic User Reliability Evaluation Scheme for Social Network Service
    Changhoon Lee, Youngman Jung, Jaewook Jung, Dongho Won, Vol. 23, No. 2, pp. 157-168, Apr. 2013
    10.13089/JKIISC.2013.23.2.157
    Keywords: social network service, Reliability evaluation, SNS security, Privacy Protection

    A tamper resistance software mechanism using MAC function and dynamic link key
    Jae-Hong Park, Sung-Hoon Kim, Dong-Hoon Lee, Vol. 23, No. 1, pp. 11-18, Feb. 2013
    10.13089/JKIISC.2013.23.1.11
    Keywords: application program protection, Reverse engineering, software protection, code obfuscation

    A method for the protection of the message in social network service(SNS) using access control and hash-chain
    Hanjae Jeong, Dongho Won, Vol. 23, No. 1, pp. 81-88, Feb. 2013
    10.13089/JKIISC.2013.23.1.81
    Keywords: Social network services, SNS, Hash-Chain, message protection

    Threat Analysis based Software Security Testing for preventing the Attacks to Incapacitate Security Features of Information Security Systems
    Dongjin Kim, Youn-Sik Jeong, Gwangyeul Yun, Haeyoung Yoo, Seong-Je Cho, Giyoun Kim, Jinyoung Lee, Hong-Geun Kim, Taeseung Lee, Jae-Myung Lim, Dongho Won, Vol. 22, No. 5, pp. 1191-1204, Oct. 2012
    10.13089/JKIISC.2012.22.5.1191
    Keywords: Vulnerability, Security Testing, Threat Analysis, Penetration Testing, Self-protection, Non-bypassability