Digital Library
Search: "[ keyword: Protection ]" (88)
Protection Profile for Smart Meters: Vulnerability and Security Requirements Analysis
Chul-Jo Jung,
Sun-Ki Eun,
Jin-Ho Choi,
Soo-Hyun Oh,
Hwan-Koo Kim,
Vol. 20, No. 6, pp. 111-126,
Dec.
2010
10.13089/JKIISC.2010.20.6.111
Keywords: Smart Grid, Smart meters, Protection profile

Keywords: Smart Grid, Smart meters, Protection profile
Integrated Privacy Protection Model based on RBAC
Hyug-Hyun Cho,
Hee-Man Park,
Young-Lok Lee,
Bong-Nam Noh,
Hyung-Hyo Lee,
Vol. 20, No. 4, pp. 135-144,
Aug.
2010
10.13089/JKIISC.2010.20.4.135
Keywords: Privacy Protection, RBAC, P-RBAC

Keywords: Privacy Protection, RBAC, P-RBAC
Improving Research Information Security in Academic Institutes through the Analysis of Security Awareness and Activities
Il-Hyung Park,
Seong-Woo Kim,
Seung-Woo Seo,
Vol. 20, No. 2, pp. 91-108,
Apr.
2010
10.13089/JKIISC.2010.20.2.91
Keywords: Academic Security, Research Information Protection, Security Awareness, security level, Survey

Keywords: Academic Security, Research Information Protection, Security Awareness, security level, Survey
System Specification-based Design of Mobile Alarm System for Privacy Protection
Eun-Young Jang,
Hyung-Jong Kim,
Vol. 20, No. 1, pp. 113-122,
Feb.
2010
10.13089/JKIISC.2010.20.1.113
Keywords: Mobile alarm system, System specification-based software design, Private information protection

Keywords: Mobile alarm system, System specification-based software design, Private information protection
Study on Structure for Robust App Protection through Commercial Android App Hardening Service
하동수,
오희국,
Vol. 28, No. 5, pp. 1209-1223,
Oct.
2018
10.13089/JKIISC.2018.28.5.1209
Keywords: Android, Obfuscator, Protector, Packer, App hardening, Runtime protection, Android, Obfuscator, Protector, Packer, App hardening, Runtime protection

Keywords: Android, Obfuscator, Protector, Packer, App hardening, Runtime protection, Android, Obfuscator, Protector, Packer, App hardening, Runtime protection
Study on Personal Information Protection Behavior in Social Network Service Using Health Belief Model
Se-mi Shin,
Seong-jun Kim,
Do-soon Kwon,
Vol. 26, No. 6, pp. 1619-1637,
Dec.
2016
10.13089/JKIISC.2016.26.6.1619
Keywords: Social Network Service (SNS), personal information protection behavior, health belief model

Keywords: Social Network Service (SNS), personal information protection behavior, health belief model
A Study on Metering Data De-identification Method for Smart Grid Privacy Protection
Donghyeok Lee,
Namje Park,
Vol. 26, No. 6, pp. 1593-1604,
Dec.
2016
10.13089/JKIISC.2016.26.6.1593
Keywords: Smart Grid, Privacy Protection, De-Identification, Utilizing Personal Information

Keywords: Smart Grid, Privacy Protection, De-Identification, Utilizing Personal Information
EU-US Privacy Shield Agreement and Domestic Policy Direction
Jaesuk YUN,
Vol. 26, No. 5, pp. 1269-1278,
Oct.
2016
10.13089/JKIISC.2016.26.5.1269
Keywords: Personal Data, Privacy Shield, Safe Harbor, Data Protection Directive, General Data Protection Regulation

Keywords: Personal Data, Privacy Shield, Safe Harbor, Data Protection Directive, General Data Protection Regulation
SEAndroid Policy Protection Architecture Design and Implementation in Android
Seok-man Yoo,
Jin-Hyung Park,
Dong-hoon Lee,
Vol. 26, No. 5, pp. 1105-1120,
Oct.
2016
10.13089/JKIISC.2016.26.5.1105
Keywords: SEAndroid, SE for Android, Policy, update, integrity, SEAndroid Policy Protection Architecture

Keywords: SEAndroid, SE for Android, Policy, update, integrity, SEAndroid Policy Protection Architecture
Improving Personal Data Protection in IoT Environments
Ae Ri Lee,
Soomin Son,
Hyun Jin Kim,
Beomsoo Kim,
Vol. 26, No. 4, pp. 995-1012,
Aug.
2016
10.13089/JKIISC.2016.26.4.995
Keywords: IoT, Personal Data Protection, Right of Data Subject, Data Controller, Data Processor

Keywords: IoT, Personal Data Protection, Right of Data Subject, Data Controller, Data Processor