Digital Library


Search: "[ keyword: Protection ]" (88)
    Comparative study of the privacy information protection policy - Privacy information basic laws and dedicated organizations -
    Dae-Kyeong Jeong, Vol. 22, No. 4, pp. 923-944, Aug. 2012
    10.13089/JKIISC.2012.22.4.923
    Keywords: privacy information protection policy, privacy(data) protection policy

    A Study on adopting cloud computing in the military
    Worl-Su Jang, Jung-Young Choi, Jong-In Lim, Vol. 22, No. 3, pp. 645-654, Jun. 2012
    10.13089/JKIISC.2012.22.3.645
    Keywords: Cloud computing, Security system, Military Security, information protection, Security Policy

    Analysis on Vulnerability and Establishing Countermeasure Methodologies for Privacy Protection in NFC Environments
    Jae-Sik Lee, Hyung-Joo Kim, Han-Na You, Tae-Sung Park, Moon-Seog Jun, Vol. 22, No. 2, pp. 357-366, Apr. 2012
    10.13089/JKIISC.2012.22.2.357
    Keywords: NFC, Privacy Protection, Analysis on Vulnerability, Establishing Countermeasure, Methodology

    A Study on the Criminal Threat and Privacy Protection with a Proxy Service
    Shin-Beom Kang, Sang-Jin Lee, Jong-In Lim, Vol. 22, No. 2, pp. 317-326, Apr. 2012
    10.13089/JKIISC.2012.22.2.317
    Keywords: Personal Information Protection and Security, proxy service, Cyber Criminal Threat, Security Policy

    An Efficient Mixnet for Electronic Voting Systems
    Woong-Ryul Jeon, Jee-Yeon Kim, Young-Sook Lee, Dong-Ho Won, Vol. 22, No. 1, pp. 117-130, Feb. 2012
    10.13089/JKIISC.2012.22.1.117
    Keywords: Smartphone, Protection profile, Common Criteria, Security

    A Protection Profile for E-Document Issuing System
    Hyun-Jung Lee, Dong-Ho Won, Vol. 21, No. 6, pp. 109-118, Dec. 2011
    10.13089/JKIISC.2011.21.6.109
    Keywords: E-Document Issuing System, Common Criteria, Protection profile

    Anonymous Qualification Verifying Method on Web Environment
    Yun-Kyung Lee, Jung-Yeon Hwang, Byung-Ho Chung, Jeong-Nyeo Kim, Vol. 21, No. 5, pp. 181-196, Oct. 2011
    10.13089/JKIISC.2011.21.5.181
    Keywords: anonymous access control, Anonymous Authentication, Privacy Protection

    A Study on Critical Success Factors for Implementing Governance of Personal Information Protection
    Jung-Duk Kim, Soo-Ha Hwang, Vol. 21, No. 5, pp. 197-203, Oct. 2011
    10.13089/JKIISC.2011.21.5.197
    Keywords: Personal Information, Governance of Personal Information Protection, CSFs

    Implementation of Privacy Protection Policy Language and Module For Social Network Services
    Ji-Hye Kim, Hyung-Hyo Lee, Vol. 21, No. 1, pp. 53-64, Feb. 2011
    10.13089/JKIISC.2011.21.1.53
    Keywords: Privacy Protection, SNS, Attribute-based access control policy

    Prohibiting internal data leakage to mass storage device in mobile device
    Bo-Heung Chung, Jung-Nyu Kim, Vol. 21, No. 1, pp. 125-134, Feb. 2011
    10.13089/JKIISC.2011.21.1.125
    Keywords: Data leakage protection, Mobile Security, Signature Sampling