Digital Library
Search: "[ keyword: Security ]" (165)
Intranet Security Evaluation Using Hacking Techniques
Dong Il Seo, Byeong Choel Choi, Sung Won Sohn, Sang Ho Lee The KIPS Transactions:PartC,
Vol. 9, No. 3, pp. 337-342,
Jun.
2002
10.3745/KIPSTC.2002.9.3.337
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
The Design and Implementation of a Secure Internet Phone System
Jae Hee Park, Il Min Kim The KIPS Transactions:PartC,
Vol. 9, No. 2, pp. 157-162,
Apr.
2002
10.3745/KIPSTC.2002.9.2.157
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
A Web - based Remote Recordable Surveillance System using Index Search Algorithm
Eun Mi Lee, Myung Ok Lee The KIPS Transactions:PartC,
Vol. 9, No. 1, pp. 9-16,
Feb.
2002
10.3745/KIPSTC.2002.9.1.9
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Design and Implementation of File protection system based on Windows 2000 system
Nam Hoon Lee, Shin Geun Yoo, Young Chul Shim The KIPS Transactions:PartC,
Vol. 8, No. 6, pp. 741-756,
Dec.
2001
10.3745/KIPSTC.2001.8.6.741
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Design of A Database Architecture for Hierarchical Security Policy Model
Yeo Wung Yun, Yoon Cheol Hwang, Nam Kyeong Um, Kwun Woo Kim, Sang Ho Lee The KIPS Transactions:PartC,
Vol. 8, No. 6, pp. 711-720,
Dec.
2001
10.3745/KIPSTC.2001.8.6.711
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
A Study on Valuation of Security Property in Electronic Commerce
Min Cheol Kim, Kyoo Sung Noh The KIPS Transactions:PartC,
Vol. 8, No. 5, pp. 615-620,
Oct.
2001
10.3745/KIPSTC.2001.8.5.615
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
A Study of Hierarchical Policy Model of Policy - based Integrated Security Management for managing Heterogeneous Security Systems
Dong Young Lee, Dong Soo Kim, Tai Myoung Chung The KIPS Transactions:PartC,
Vol. 8, No. 5, pp. 607-614,
Oct.
2001
10.3745/KIPSTC.2001.8.5.607
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Design and Implementation of a Web Security System using a Chaos Cipher Algorithm
Bong Hwan Lee, Chil Min Kim, Dong Weon Yoon, Yong Wong Chae, Hyeun Gon Kim The KIPS Transactions:PartC,
Vol. 8, No. 5, pp. 585-596,
Oct.
2001
10.3745/KIPSTC.2001.8.5.585
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Design and Analysis of Role - based Security Management Model for Policy - based Security Management in SNMPv3 Network
Gwang Ro Joo, Hyung Hyo Lee, Bong Nam Noh The KIPS Transactions:PartC,
Vol. 8, No. 5, pp. 573-584,
Oct.
2001
10.3745/KIPSTC.2001.8.5.573
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Design and Simulation of Policy Based Integrated Server System Capable to Provide Real - time Internet Security Service
Ki Young Kim, Gae Il Ahn, Jong Soo Jang, Sang Ho Lee The KIPS Transactions:PartC,
Vol. 8, No. 5, pp. 565-572,
Oct.
2001
10.3745/KIPSTC.2001.8.5.565
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)