1 이동혁, "안전한 해사클라우드 환경을 위한 SH-Tree 기반의 데이터 동기화 기법 제안" 한국정보보호학회 26 (26): 929-940, 2016
2 N. Park, "WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment" 741-748, 2006
3 Korea Software Industry Association, "Software Business Cost Reference Guide"
4 N. Park, "Security and Privacy Mechanisms for Sensor Middleware and Application in Internet of Things (IoT)" 2016 (2016): 2016
5 Böhme, R., "Security Metrics and Security Investment Models" 10-24, 2010
6 N. Park, "Privacy-Enhanced Deduplication Technique in Closed Circuit Television Video Cloud Service Environment" 7 (7): 65-66, 2018
7 "NIST"
8 N. Park, "Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle" 16 (16): 1-16, 2015
9 N. Park, "Mobile middleware platform for secure vessel traffic system in IoT service environment" 9 (9): 500-512, 2016
10 "Ministry of Government Legistation"
1 이동혁, "안전한 해사클라우드 환경을 위한 SH-Tree 기반의 데이터 동기화 기법 제안" 한국정보보호학회 26 (26): 929-940, 2016
2 N. Park, "WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment" 741-748, 2006
3 Korea Software Industry Association, "Software Business Cost Reference Guide"
4 N. Park, "Security and Privacy Mechanisms for Sensor Middleware and Application in Internet of Things (IoT)" 2016 (2016): 2016
5 Böhme, R., "Security Metrics and Security Investment Models" 10-24, 2010
6 N. Park, "Privacy-Enhanced Deduplication Technique in Closed Circuit Television Video Cloud Service Environment" 7 (7): 65-66, 2018
7 "NIST"
8 N. Park, "Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle" 16 (16): 1-16, 2015
9 N. Park, "Mobile middleware platform for secure vessel traffic system in IoT service environment" 9 (9): 500-512, 2016
10 "Ministry of Government Legistation"
11 International Organization for Standardization (ISO), "Information security management (ISO/IEC Standard No. 27001)"
12 KISA, "Information Protection System Implementation Practical Guide"
13 KISA, "Information Protection Service Cost Estimating Guidelines"
14 N. Park, "Implementation of load management application system using smart grid privacy policy in energy management service environment" 17 (17): 653-664, 2014
15 D. Lee, "Geocasting-based synchronization of Almanac on the maritime cloud for distributed smart surveillance" 73 (73): 1103-1118, 2016
16 D. Lee, "Electronic identity information hiding methods using a secret sharing scheme in multimedia-centric internet of things environment" 22 (22): 3-10, 2018
17 D. Lee, "De-identification of metering data for smart grid personal security in intelligent CCTV-based P2P cloud computing environment" 11 (11): 1299-1308, 2018
18 J. Kim, "CCTV Video Processing Metadata Security Scheme Using Character Order Preserving-Transformation in the Emerging Multimedia" 8 (8): 412-426, 2019
19 You-Jin Park, "A Study on an Estimation of Adjusted Coefficient for the Maintenance of Information Security Software in Korea Industry" 2011
20 Yeon-Ho Jo, "A Study on Policy for cost estimate of Security Sustainable Service in Information Security Solutions" 2015
21 Seogwipo city, "2016-2018 Information Security System Maintenance Inspection Report" 2016