• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Research on Military SNS Protection Profile for National defense


DeokHoon Yu, SeungJoo Kim, Journal of Internet Computing and Services, Vol. 14, No. 1, pp. 41-52, Feb. 2013
10.7472/jksii.2013.14.41, Full Text:
Keywords: Military Security, Protection profile, social network service

Abstract

Social Network Service(SNS) have become very popular during the past few years. Also SNS, an current communication platform, greatly contributes to transmit the information rapidly and strengthen a sense of community and fellowship in military service. however it has vulnerable factors. For example, invasion of privacy, exposure of personal information and military data. In this particular case, it is a deathblow to the military service. Military Social Network Service require to protect the military security threats and disclosure of defense secrets. For such reasons we need the secure SNS that protects from any attacks or vulnerable factors. We present classification of functional type and analysis the SNS architecture. The goal of this work is propose military SNS security functional requirements for practical use safely.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[APA Style]
Yu, D. & Kim, S. (2013). Research on Military SNS Protection Profile for National defense. Journal of Internet Computing and Services, 14(1), 41-52. DOI: 10.7472/jksii.2013.14.41.

[IEEE Style]
D. Yu and S. Kim, "Research on Military SNS Protection Profile for National defense," Journal of Internet Computing and Services, vol. 14, no. 1, pp. 41-52, 2013. DOI: 10.7472/jksii.2013.14.41.

[ACM Style]
DeokHoon Yu and SeungJoo Kim. 2013. Research on Military SNS Protection Profile for National defense. Journal of Internet Computing and Services, 14, 1, (2013), 41-52. DOI: 10.7472/jksii.2013.14.41.