최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기정보처리학회논문지. KIPS transactions on computer and communication systems 컴퓨터 및 통신 시스템, v.10 no.5, 2021년, pp.145 - 154
장환 (한국방송통신대학교 정보과학과)
Recently, the introduction of Cloud Managing Security Services System to respond to security threats in cloud computing environments is increasing. Accordingly, it is necessary to analyze the security requirements for the Cloud Managing Security Services System. However, the existing research has a ...
National Institutes of Standards and Technology, "NIST Cloud Computing Standards Roadmap," Jul. 2013.
Cloud Security Alliance, "Defined Categories of Security as a Service," 2016.
Hye-Won KIM, Ho-Jun Yu, and Jae-Woo Lee, "Research on technical security threats of email cloud security service (E-mail SecaaS) Focusing on threat modeling techniques," Korea Institute of Information Security And Cryptology, pp.57-64(8). 2017.
Jisoo Park and Seungjoo Kim, "Security Requirements Analysis on IP Camera via Threat Modeling and Common Criteria," Korea Information Processing Society, Vol.6, No.3 121-123. 2017.
Korea Internet & Security Agency, "Casebook of Cloud Security Support Project," 2019.
Jang Hwan, "Cloud SOC's forensic compliance reflects the shared responsibility model". Proc. Conference on Information Security and Cryptography, pp.41-44, 2020.
Malik Nadeem Anwar, Mohammed Nazir, Adeeb, and Mansoor Ansari, "Modeling Security Threats for Smart Cities: A STRIDE-Based Approach," Proc. Smart Cities-Opportunities and Challenges, pp.387-396, 2020.
In-Kyung Oh, Jae-Wan Seo, Min-Kyu Lee, Tae-Hoon Lee, Yu-Na Han, Ui-Seong Park, Han-Byeol Ji, Jong-Ho Lee, Kyu-Hyung Cho, and Kyounggon Kim, "Derivation of Security Requirements of Smart TV Based on STRIDE Threat Modeling," Journal of The Korea Institute of Information Security & Cryptology, Vol.30, No.2, pp.213-230, 2020.
Tong Xin and Ban Xiaofang, "Online Banking Security Analysis based on STRIDE Threat Model," International Journal of Security and Its Applications, Vol.8, No.2, pp.271-282, 2014.
James Sanfilippo, Tamirat Abegaz, Bryson Payne, and Abi Salimi, "STRIDE-Based Threat Modeling for MySQL Databases," Proceedings of the Future Technologies Conference, pp.368-378, 2019.
The Open Web Application Security Project, "OWASP Top Ten Web Application Security Risks | OWASP" [Internet], https://owasp.org/www-project-top-ten.
Telecommunications Technology Association, "TTA Inf ormation and Communication Glossary" [Internet], https://terms.tta.or.kr/main.do.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.