Digital Library
Search: "[ keyword: Security ]" (165)
Permission-Based Separation of Duty Model on Role-Based Access Control
Se Jong Oh The KIPS Transactions:PartC,
Vol. 11, No. 6, pp. 725-730,
Dec.
2004
10.3745/KIPSTC.2004.11.6.725
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
A Study on E-trade Securities and Strategic Solutions
Jo Nam Jung , Chun Su Lee , Jang Mook Kang The KIPS Transactions:PartC,
Vol. 11, No. 5, pp. 577-584,
Oct.
2004
10.3745/KIPSTC.2004.11.5.577
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Design and Implementation of Linux-based Integrated Security System (LISS) Using Open Security Tools
Yong Hee Jeon , Min Soo Kim , Jung Sook Jang The KIPS Transactions:PartC,
Vol. 11, No. 4, pp. 485-496,
Aug.
2004
10.3745/KIPSTC.2004.11.4.485
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
A Design of SERDL (Security Evaluation Rule Description Language) and Rule Execution Engine for Evaluating Security of Ipv6 Network
Hyeok Chan Kwon , Sang Choon Kim The KIPS Transactions:PartC,
Vol. 11, No. 4, pp. 471-484,
Aug.
2004
10.3745/KIPSTC.2004.11.4.471
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
A Refundable Elliptic Curve Electronic Cash in Mobile Environments
Eun Kyeong Kwon , Yong Gu Cho , Ki Joon Chae The KIPS Transactions:PartC,
Vol. 11, No. 3, pp. 287-292,
Jun.
2004
10.3745/KIPSTC.2004.11.3.287
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Improvement of WEP Key transmission between APs during STA Movement in Wireless Environment
Song Il Gyu , Hong Chung Seon , Lee Dae Yeong The KIPS Transactions:PartC,
Vol. 11, No. 2, pp. 219-228,
Apr.
2004
10.3745/KIPSTC.2004.11.2.219
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Attack Modeling for an Internet Security Simulation
Seo Jeong Gug , Choe Gyeong Hui , Jeong Gi Hyeon , Park Seung Gyu , Sim Jae Hong The KIPS Transactions:PartC,
Vol. 11, No. 2, pp. 183-192,
Apr.
2004
10.3745/KIPSTC.2004.11.2.183
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
An Integrated Management Model of Administrative Role-Based Access Control and Delegation Policy
O Se Jong , Kim U Seong The KIPS Transactions:PartC,
Vol. 11, No. 2, pp. 177-182,
Apr.
2004
10.3745/KIPSTC.2004.11.2.177
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Security Policy Negotiation Model Design for Secure Network Management
Park Jin Ho , Jeong Jin Ug The KIPS Transactions:PartC,
Vol. 11, No. 2, pp. 171-176,
Apr.
2004
10.3745/KIPSTC.2004.11.2.171
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Implementation and Performance Evaluation of High-Performance Intrusion Detection and Response System
Kim Hyeong Ju , Park Dae Cheol The KIPS Transactions:PartC,
Vol. 11, No. 2, pp. 157-162,
Apr.
2004
10.3745/KIPSTC.2004.11.2.157
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)