Digital Library
Search: "[ keyword: certification ]" (10)
Certified Key Management in Multi K-FIDO Device Environment
Byoungcheon Lee,
Vol. 27, No. 2, pp. 293-304,
Apr.
2017
10.13089/JKIISC.2017.27.2.293
Keywords: FIDO, K-FIDO, multi-device key management, self-extended certification
10.13089/JKIISC.2017.27.2.293
Keywords: FIDO, K-FIDO, multi-device key management, self-extended certification
Research Trends in Economic Effects of Information Security Certification: Focused on the ISMS (Information Security Management System)
Hee-Kyung Kong,
Hyo-Jung Jun,
Song-Ha Lee,
Min-Seong Kang,
Tae-Sung Kim,
Vol. 26, No. 3, pp. 821-836,
Jun.
2016
10.13089/JKIISC.2016.26.3.821
Keywords: Research Trends, Information Security Certification, economic effects, ISMS
10.13089/JKIISC.2016.26.3.821
Keywords: Research Trends, Information Security Certification, economic effects, ISMS
A Study on Introducing Security Certification for Control Systems
Hoyeol Choi,
Daeyeong Kim,
Hyungjune Shin,
Changhee Hahn,
Junbeom Hur,
Vol. 26, No. 3, pp. 725-734,
Jun.
2016
10.13089/JKIISC.2016.26.3.725
Keywords: SCADA, DNP3, EDSA-CRT, certification, Robustness Testing, Load Stress Testing
10.13089/JKIISC.2016.26.3.725
Keywords: SCADA, DNP3, EDSA-CRT, certification, Robustness Testing, Load Stress Testing
A Study of Security Certification and Accreditation for DNP3 linkage section in EMS/SCADA
Jongwan Kim,
Taeshik Shon,
Vol. 25, No. 3, pp. 703-718,
Jun.
2015
10.13089/JKIISC.2015.25.3.703
Keywords: certification, Accreditation, evaluation, DNP3, EMS/SCADA
10.13089/JKIISC.2015.25.3.703
Keywords: certification, Accreditation, evaluation, DNP3, EMS/SCADA
Strengthening Security on the Internal Cloud Service Certification
Gangshin Lee,
Vol. 23, No. 6, pp. 1231-1238,
Dec.
2013
10.13089/JKIISC.2013.23.6.1231
Keywords: Cloud, certification, Security, Control
10.13089/JKIISC.2013.23.6.1231
Keywords: Cloud, certification, Security, Control
A Study of Patient's Privacy Protection in U-Healthcare
Yoon-Su Jeong,
Sang-Ho Lee,
Vol. 22, No. 4, pp. 913-922,
Aug.
2012
10.13089/JKIISC.2012.22.4.913
Keywords: Cloud computing, User Authentication Protocol, Distribution Process, certification
10.13089/JKIISC.2012.22.4.913
Keywords: Cloud computing, User Authentication Protocol, Distribution Process, certification
User Authentication Protocol through Distributed Process for Cloud Environment
Yoon-Su Jeong,
Sang-Ho Lee,
Vol. 22, No. 4, pp. 841-850,
Aug.
2012
10.13089/JKIISC.2012.22.4.841
Keywords: Cloud computing, User Authentication Protocol, Distribution Process, certification
10.13089/JKIISC.2012.22.4.841
Keywords: Cloud computing, User Authentication Protocol, Distribution Process, certification
A Study on activation and improvement of the Government PKI
,
,
,
Vol. 14, No. 2, pp. 85-100,
Apr.
2004
10.13089/JKIISC.2004.14.2.85
Keywords: digital certification, information security, GPKI, NPKI, APIs
10.13089/JKIISC.2004.14.2.85
Keywords: digital certification, information security, GPKI, NPKI, APIs
Design of International Cross Certification Model using Cross Certificate
,
,
Vol. 13, No. 4, pp. 99-108,
Aug.
2003
10.13089/JKIISC.2003.13.4.99
Keywords: PKI, Cross certification
10.13089/JKIISC.2003.13.4.99
Keywords: PKI, Cross certification
The Proposal of Security Evaluation Criteria for PKI Systems in Korea
,
,
,
,
Vol. 12, No. 3, pp. 61-76,
Jun.
2002
10.13089/JKIISC.2002.12.3.61
Keywords: PKI systems, evaluation, certification
10.13089/JKIISC.2002.12.3.61
Keywords: PKI systems, evaluation, certification