Digital Library
Search: "[ keyword: Protection ]" (88)
Comparative study of the privacy information protection policy - Privacy information basic laws and dedicated organizations -
Dae-Kyeong Jeong,
Vol. 22, No. 4, pp. 923-944,
Aug.
2012
10.13089/JKIISC.2012.22.4.923
Keywords: privacy information protection policy, privacy(data) protection policy

Keywords: privacy information protection policy, privacy(data) protection policy
A Study on adopting cloud computing in the military
Worl-Su Jang,
Jung-Young Choi,
Jong-In Lim,
Vol. 22, No. 3, pp. 645-654,
Jun.
2012
10.13089/JKIISC.2012.22.3.645
Keywords: Cloud computing, Security system, Military Security, information protection, Security Policy

Keywords: Cloud computing, Security system, Military Security, information protection, Security Policy
Analysis on Vulnerability and Establishing Countermeasure Methodologies for Privacy Protection in NFC Environments
Jae-Sik Lee,
Hyung-Joo Kim,
Han-Na You,
Tae-Sung Park,
Moon-Seog Jun,
Vol. 22, No. 2, pp. 357-366,
Apr.
2012
10.13089/JKIISC.2012.22.2.357
Keywords: NFC, Privacy Protection, Analysis on Vulnerability, Establishing Countermeasure, Methodology

Keywords: NFC, Privacy Protection, Analysis on Vulnerability, Establishing Countermeasure, Methodology
A Study on the Criminal Threat and Privacy Protection with a Proxy Service
Shin-Beom Kang,
Sang-Jin Lee,
Jong-In Lim,
Vol. 22, No. 2, pp. 317-326,
Apr.
2012
10.13089/JKIISC.2012.22.2.317
Keywords: Personal Information Protection and Security, proxy service, Cyber Criminal Threat, Security Policy

Keywords: Personal Information Protection and Security, proxy service, Cyber Criminal Threat, Security Policy
An Efficient Mixnet for Electronic Voting Systems
Woong-Ryul Jeon,
Jee-Yeon Kim,
Young-Sook Lee,
Dong-Ho Won,
Vol. 22, No. 1, pp. 117-130,
Feb.
2012
10.13089/JKIISC.2012.22.1.117
Keywords: Smartphone, Protection profile, Common Criteria, Security

Keywords: Smartphone, Protection profile, Common Criteria, Security
A Protection Profile for E-Document Issuing System
Hyun-Jung Lee,
Dong-Ho Won,
Vol. 21, No. 6, pp. 109-118,
Dec.
2011
10.13089/JKIISC.2011.21.6.109
Keywords: E-Document Issuing System, Common Criteria, Protection profile

Keywords: E-Document Issuing System, Common Criteria, Protection profile
Anonymous Qualification Verifying Method on Web Environment
Yun-Kyung Lee,
Jung-Yeon Hwang,
Byung-Ho Chung,
Jeong-Nyeo Kim,
Vol. 21, No. 5, pp. 181-196,
Oct.
2011
10.13089/JKIISC.2011.21.5.181
Keywords: anonymous access control, Anonymous Authentication, Privacy Protection

Keywords: anonymous access control, Anonymous Authentication, Privacy Protection
A Study on Critical Success Factors for Implementing Governance of Personal Information Protection
Jung-Duk Kim,
Soo-Ha Hwang,
Vol. 21, No. 5, pp. 197-203,
Oct.
2011
10.13089/JKIISC.2011.21.5.197
Keywords: Personal Information, Governance of Personal Information Protection, CSFs

Keywords: Personal Information, Governance of Personal Information Protection, CSFs
Implementation of Privacy Protection Policy Language and Module For Social Network Services
Ji-Hye Kim,
Hyung-Hyo Lee,
Vol. 21, No. 1, pp. 53-64,
Feb.
2011
10.13089/JKIISC.2011.21.1.53
Keywords: Privacy Protection, SNS, Attribute-based access control policy

Keywords: Privacy Protection, SNS, Attribute-based access control policy
Prohibiting internal data leakage to mass storage device in mobile device
Bo-Heung Chung,
Jung-Nyu Kim,
Vol. 21, No. 1, pp. 125-134,
Feb.
2011
10.13089/JKIISC.2011.21.1.125
Keywords: Data leakage protection, Mobile Security, Signature Sampling

Keywords: Data leakage protection, Mobile Security, Signature Sampling