최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기한국정보통신학회논문지 = Journal of the Korea Institute of Information and Communication Engineering, v.25 no.10, 2021년, pp.1391 - 1396
한성화 (Department of Information Security, Tongmyung University) , 이후기 (Department of Cyber Security, Konyang University)
The boundary-based security system has the advantage of high operational efficiency and easy management of security solutions, and is suitable for denying external security threats. However, since it is operated on the premise of a trusted user, it is not suitable to deny security threats that occur...
R. Riccardo and M. Repetto, "Building situational awareness for network threats in fog/edge computing: Emerging paradigms beyond the security perimeter model," Future Generation Computer Systems, vol. 85, pp. 235-249, 2018.
H. B. Chang, "A Study on The Countermeasure by The Types through Case Analysis of Industrial Secret Leakage Accident," Convergence security journal, vol. 15 no. 7, pp. 39-45, 2015.
J. Kindervag, "Build security into your network's dna: The zero trust network architecture," Forrester Research Inc, pp. 1-26, 2010.
M. Sudakshina, D. A. Khan, and S. Jain, "Cloud-Based Zero Trust Access Control Policy: An Approach to Support Work-From-Home Driven by COVID-19 Pandemic," New Generation Computing, pp. 1-24, 2021.
A. Rastogi and K. E. Nygard, "Software Engineering Principles and Security Vulnerabilities," in CATA, pp. 180-190, Mar. 2019.
X. Hao, W. Ren, R. Xiong, T. Zhu, and K. K. R. Choo, "Asymmetric cryptographic functions based on generative adversarial neural networks for Internet of Things," Future Generation Computer Systems, 2021.
A. Kerman, O. Borchert, S. Rose, and A. Tan, "Implementing A Zero Trust Architecture," The MITRE Corporation, Tech. Rep, 2020.
G. Anil, "A Zero-Trust Security Framework for Granular Insight on Blind Spot and Comprehensive Device Protection in the Enterprise of Internet of Things (E-IOT)," BMS Institute of Technology, 2021.
K. D. Uttecht, "Zero Trust (ZT) Concepts for Federal Government Architectures," Massachusetts inst of tech lexington United States, 2020.
M. Al-Asli and T. A. Ghaleb, "Review of signature-based techniques in antivirus products," International Conference on Computer and Information Sciences (ICCIS). IEEE, 2019.
L. Abeni and C. Kiraly, "Investigating the network performance of a real-time Linux Kernel," Proc. 15th Real Time Linux Workshop (RTLWS 2013), 2013.
C. Wright, C. Cowan, J. Morris, S Smalley, and G. Kroah-Hartman, "Linux security module framework," in Ottawa Linux Symposium, vol. 8032, pp. 6-16, Jun. 2002.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.