- Volume 8 Issue 6
As the development of information telecommunication technology and thus the information sharing and opening is accelerated, f system is exposed to various threatener and the avrious security incident is rasing its head with social problem. As countermeasure, to protect safely and prepare in the attack for a system from a be latent security threat, various security systems are been using such as IDS, Firewall, VPN etc.. But, expertise or expert is required to handle security system. The module, implemented in this paper, is based on Windows XP, like Linux and Unix, and has effect integrity and non-repudiation for a file.
- 김재명, 홍기융, 홍기완, 'Secure OS 보안정책 및 메커니즘' 정보보호학회지, 13 권 4 호, 2003,pp. 49-59
- 이홍섭, 이철원, 이정효, 박정호, '정보통신 기반구조 보호를 위한 보안 커널 개발 동향', 정보보호학회지, 8권 4호, 1998,pp. 63-76
- 소우영 외 3 인, '컴퓨터 통신 보안' 그린출판사， 2001, 1월, pp. 603-606
- San Jose, 'Common Criteria Solutions', Security Lab, http://www.fact-index.com/t/tc/tcsec.html