Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

이용 PC 지정에 대한 보안위협 및 보안 요구사항 분석An Analysis of Security Threats and Security Requirements on the Designated PC Solution

Other Titles
An Analysis of Security Threats and Security Requirements on the Designated PC Solution
Authors
이경률이선영임강빈
Issue Date
2017
Publisher
한국컴퓨터정보학회
Keywords
Designated PC solution; Security threat; Security requirement; Identification; Device authentication; User authentication
Citation
한국컴퓨터정보학회논문지, v.22, no.5, pp.29 - 39
Journal Title
한국컴퓨터정보학회논문지
Volume
22
Number
5
Start Page
29
End Page
39
URI
https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/8251
DOI
10.9708/jksci.2017.22.05.029
ISSN
1598-849X
Abstract
In this paper, we analyse security threats and security requirements about the designated PC solution which restricts usable PCs that are only an user own PCs or a registered PC for online banking or very important services. Accordingly, causable threats of the designated PC solution are classified a process, a network layer, a software module, and an environment of platform, and we draw security requirements based on analysed security threats. Results of this research are considered utilization of criteria for improving security of the designated PC solution and standards for giving hint of imposition of the designated PC solution.
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > Department of Information Security Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Yim, Kang bin photo

Yim, Kang bin
College of Software Convergence (Department of Information Security Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE