Digital Library
Search: "[ keyword: Security ]" (69)
-
31. A Study of Security Checks for Android Least Privilege - focusing on mobile financial services -Byung-chul Cho, Jin-young Choi, Vol. 17, No. 1, pp. 91-100, Feb. 2016
10.7472/jksii.2016.17.1.91
Keywords: Mobile Security, android security, permissions, least privilege -
Seong-kee Lee, Tae-in Kang, Vol. 16, No. 5, pp. 1-10, Oct. 2015
10.7472/jksii.2015.16.5.01
Keywords: Cyber Defense, Multi-Layer Security Model, Adaptive Security System -
Hexin Yu, Suaini Sura, Jong-chang Ahn, Vol. 16, No. 3, pp. 79-94, Jun. 2015
10.7472/jksii.2015.16.3.79
Keywords: Cloud service, Persistent usage intention, External variable, Brand influence, Perceived security -
Guiseok Kim, Seungjoo Kim, Vol. 15, No. 6, pp. 55-64, Dec. 2014
10.7472/jksii.2014.15.6.55
Keywords: Web service Security, URL Parameter, OWASP -
Yoon-Ho Choi, Vol. 15, No. 3, pp. 91-100, Jun. 2014
10.7472/jksii.2014.15.3.91
Keywords: Decision Making, mathematical analysis, investment on security solutions, optimal security investment -
Inseok Yang, Seokhie Hong, Vol. 15, No. 2, pp. 129-142, Apr. 2014
10.7472/jksii.2014.15.2.129
Keywords: SW Update of Smart meter, security of smart meter, smart card, Type approval, PKI for Legal Metrology instrument -
Adila Firdaus Arbain, Imran Ghani, Seung Ryul Jeong, Vol. 15, No. 1, pp. 13-28, Feb. 2014
10.7472/jksii.2014.15.1.13
Keywords: Agile Methodology, Security, software engineering, Feature Driven Development -
Kyung-Soo Joo, Jung-Woong Woo, Vol. 14, No. 4, pp. 35-42, Aug. 2013
10.7472/jksii.2013.14.4.35
Keywords: Object-Oriented Analysis and Design, Web Application, Security, RBAC, Java EE -
Yunho Lee, Vol. 14, No. 3, pp. 15-22, Jun. 2013
10.7472/jksii.2013.14.3.15
Keywords: Mobile Security, Secure Keypads, Personal Information, Keylogger -
DeokHoon Yu, SeungJoo Kim, Vol. 14, No. 1, pp. 41-52, Feb. 2013
10.7472/jksii.2013.14.41
Keywords: Military Security, Protection profile, social network service