Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

이용 PC 지정에 대한 보안위협 및 보안 요구사항 분석

Full metadata record
DC Field Value Language
dc.contributor.author이경률-
dc.contributor.author이선영-
dc.contributor.author임강빈-
dc.date.accessioned2021-08-11T16:23:55Z-
dc.date.available2021-08-11T16:23:55Z-
dc.date.created2021-06-17-
dc.date.issued2017-
dc.identifier.issn1598-849X-
dc.identifier.urihttps://scholarworks.bwise.kr/sch/handle/2021.sw.sch/8251-
dc.description.abstractIn this paper, we analyse security threats and security requirements about the designated PC solution which restricts usable PCs that are only an user own PCs or a registered PC for online banking or very important services. Accordingly, causable threats of the designated PC solution are classified a process, a network layer, a software module, and an environment of platform, and we draw security requirements based on analysed security threats. Results of this research are considered utilization of criteria for improving security of the designated PC solution and standards for giving hint of imposition of the designated PC solution.-
dc.language한국어-
dc.language.isoko-
dc.publisher한국컴퓨터정보학회-
dc.title이용 PC 지정에 대한 보안위협 및 보안 요구사항 분석-
dc.title.alternativeAn Analysis of Security Threats and Security Requirements on the Designated PC Solution-
dc.typeArticle-
dc.contributor.affiliatedAuthor이선영-
dc.contributor.affiliatedAuthor임강빈-
dc.identifier.doi10.9708/jksci.2017.22.05.029-
dc.identifier.bibliographicCitation한국컴퓨터정보학회논문지, v.22, no.5, pp.29 - 39-
dc.relation.isPartOf한국컴퓨터정보학회논문지-
dc.citation.title한국컴퓨터정보학회논문지-
dc.citation.volume22-
dc.citation.number5-
dc.citation.startPage29-
dc.citation.endPage39-
dc.type.rimsART-
dc.identifier.kciidART002226593-
dc.description.journalClass2-
dc.description.journalRegisteredClasskci-
dc.subject.keywordAuthorDesignated PC solution-
dc.subject.keywordAuthorSecurity threat-
dc.subject.keywordAuthorSecurity requirement-
dc.subject.keywordAuthorIdentification-
dc.subject.keywordAuthorDevice authentication-
dc.subject.keywordAuthorUser authentication-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > Department of Information Security Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Yim, Kang bin photo

Yim, Kang bin
College of Software Convergence (Department of Information Security Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE