• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: Security ]" (69)
  1. 31. A Study of Security Checks for Android Least Privilege - focusing on mobile financial services -
    Byung-chul Cho, Jin-young Choi, Vol. 17, No. 1, pp. 91-100, Feb. 2016
    10.7472/jksii.2016.17.1.91
    Keywords: Mobile Security, android security, permissions, least privilege
  2. 32. Adaptive Multi-Layer Security Approach for Cyber Defense
    Seong-kee Lee, Tae-in Kang, Vol. 16, No. 5, pp. 1-10, Oct. 2015
    10.7472/jksii.2015.16.5.01
    Keywords: Cyber Defense, Multi-Layer Security Model, Adaptive Security System
  3. 33. An Empirical Analysis on the Persistent Usage Intention of Chinese Personal Cloud Service
    Hexin Yu, Suaini Sura, Jong-chang Ahn, Vol. 16, No. 3, pp. 79-94, Jun. 2015
    10.7472/jksii.2015.16.3.79
    Keywords: Cloud service, Persistent usage intention, External variable, Brand influence, Perceived security
  4. 34. OTACUS: Parameter-Tampering Prevention Techniques using Clean URL
    Guiseok Kim, Seungjoo Kim, Vol. 15, No. 6, pp. 55-64, Dec. 2014
    10.7472/jksii.2014.15.6.55
    Keywords: Web service Security, URL Parameter, OWASP
  5. 35. A Framework for Making Decision on Optimal Security Investment to the Proactive and Reactive Security Solutions management
    Yoon-Ho Choi, Vol. 15, No. 3, pp. 91-100, Jun. 2014
    10.7472/jksii.2014.15.3.91
    Keywords: Decision Making, mathematical analysis, investment on security solutions, optimal security investment
  6. 36. A Study on Smart card-based Security Mechanisms of upgrades Smart Meter SW for secure deployment in Smart Grid
    Inseok Yang, Seokhie Hong, Vol. 15, No. 2, pp. 129-142, Apr. 2014
    10.7472/jksii.2014.15.2.129
    Keywords: SW Update of Smart meter, security of smart meter, smart card, Type approval, PKI for Legal Metrology instrument
  7. 37. A Systematic Literature Review on Secure Software Development using Feature Driven Development (FDD) Agile Model
    Adila Firdaus Arbain, Imran Ghani, Seung Ryul Jeong, Vol. 15, No. 1, pp. 13-28, Feb. 2014
    10.7472/jksii.2014.15.1.13
    Keywords: Agile Methodology, Security, software engineering, Feature Driven Development
  8. 38. An Object-Oriented Analysis and Design Methodology for Security of Web Applications
    Kyung-Soo Joo, Jung-Woong Woo, Vol. 14, No. 4, pp. 35-42, Aug. 2013
    10.7472/jksii.2013.14.4.35
    Keywords: Object-Oriented Analysis and Design, Web Application, Security, RBAC, Java EE
  9. 39. An Analysis on the Vulnerability of Secure Keypads for Mobile Devices
    Yunho Lee, Vol. 14, No. 3, pp. 15-22, Jun. 2013
    10.7472/jksii.2013.14.3.15
    Keywords: Mobile Security, Secure Keypads, Personal Information, Keylogger
  10. 40. Research on Military SNS Protection Profile for National defense
    DeokHoon Yu, SeungJoo Kim, Vol. 14, No. 1, pp. 41-52, Feb. 2013
    10.7472/jksii.2013.14.41
    Keywords: Military Security, Protection profile, social network service