@article{ART002226593},
author={Kyungroul Lee and Lee,Sun-Young and Kang-bin Yim},
title={An Analysis of Security Threats and Security Requirements on the Designated PC Solution},
journal={Journal of The Korea Society of Computer and Information},
issn={1598-849X},
year={2017},
volume={22},
number={5},
pages={29-39},
doi={10.9708/jksci.2017.22.05.029}
TY - JOUR
AU - Kyungroul Lee
AU - Lee,Sun-Young
AU - Kang-bin Yim
TI - An Analysis of Security Threats and Security Requirements on the Designated PC Solution
JO - Journal of The Korea Society of Computer and Information
PY - 2017
VL - 22
IS - 5
PB - The Korean Society Of Computer And Information
SP - 29
EP - 39
SN - 1598-849X
AB - In this paper, we analyse security threats and security requirements about the designated PC solution which restricts usable PCs that are only an user own PCs or a registered PC for online banking or very important services. Accordingly, causable threats of the designated PC solution are classified a process, a network layer, a software module, and an environment of platform, and we draw security requirements based on analysed security threats. Results of this research are considered utilization of criteria for improving security of the designated PC solution and standards for giving hint of imposition of the designated PC solution.
KW - Designated PC solution;Security threat;Security requirement;Identification;Device authentication;User authentication
DO - 10.9708/jksci.2017.22.05.029
ER -
Kyungroul Lee, Lee,Sun-Young and Kang-bin Yim. (2017). An Analysis of Security Threats and Security Requirements on the Designated PC Solution. Journal of The Korea Society of Computer and Information, 22(5), 29-39.
Kyungroul Lee, Lee,Sun-Young and Kang-bin Yim. 2017, "An Analysis of Security Threats and Security Requirements on the Designated PC Solution", Journal of The Korea Society of Computer and Information, vol.22, no.5 pp.29-39. Available from: doi:10.9708/jksci.2017.22.05.029
Kyungroul Lee, Lee,Sun-Young, Kang-bin Yim "An Analysis of Security Threats and Security Requirements on the Designated PC Solution" Journal of The Korea Society of Computer and Information 22.5 pp.29-39 (2017) : 29.
Kyungroul Lee, Lee,Sun-Young, Kang-bin Yim. An Analysis of Security Threats and Security Requirements on the Designated PC Solution. 2017; 22(5), 29-39. Available from: doi:10.9708/jksci.2017.22.05.029
Kyungroul Lee, Lee,Sun-Young and Kang-bin Yim. "An Analysis of Security Threats and Security Requirements on the Designated PC Solution" Journal of The Korea Society of Computer and Information 22, no.5 (2017) : 29-39.doi: 10.9708/jksci.2017.22.05.029
Kyungroul Lee; Lee,Sun-Young; Kang-bin Yim. An Analysis of Security Threats and Security Requirements on the Designated PC Solution. Journal of The Korea Society of Computer and Information, 22(5), 29-39. doi: 10.9708/jksci.2017.22.05.029
Kyungroul Lee; Lee,Sun-Young; Kang-bin Yim. An Analysis of Security Threats and Security Requirements on the Designated PC Solution. Journal of The Korea Society of Computer and Information. 2017; 22(5) 29-39. doi: 10.9708/jksci.2017.22.05.029
Kyungroul Lee, Lee,Sun-Young, Kang-bin Yim. An Analysis of Security Threats and Security Requirements on the Designated PC Solution. 2017; 22(5), 29-39. Available from: doi:10.9708/jksci.2017.22.05.029
Kyungroul Lee, Lee,Sun-Young and Kang-bin Yim. "An Analysis of Security Threats and Security Requirements on the Designated PC Solution" Journal of The Korea Society of Computer and Information 22, no.5 (2017) : 29-39.doi: 10.9708/jksci.2017.22.05.029