Browse > Article

Study On Distribute Computing Network Security Using Encrypted User Security Module  

Lee Dae-Young (조선대학교 전산통계학과)
Kim Ok-Hwan (목포해양대학교 해양전자통신공학과)
Abstract
This paper describes access control, user authentication, and User Security and Encryption technology for the construction of database security system from network users. We propose model of network encrypted database security system for combining these elements through the analysis of operational and technological elements. Systematic combination of operational and technological elements with proposed model can construct encrypted database security system secured from unauthorized users in distributed computing environment.
Keywords
Database security; Protection in Network Environment;
Citations & Related Records
연도 인용수 순위
  • Reference
1 한국정보보호진흥원, 정보보호 기술교육과정(암호 이론/암호응용기술), 2001
2 김기현, '접근통제기술개요', 한국정보보호진흥원, 1999
3 Sung-Ki Yang, 'User Authentication System using RSA Algorithm'. ITC-CSCC 2002, The 2002 International Technical Conference on Circuit/Systems, Computers and Communications, vol. 1.pp.156-159, 2002
4 D.Y. Lee, B.S Bae, S.JWi, J.P Jeong, S.J Lim. 'Encrypted database security construction for information protection in distribute computing environment'. SAM'03 International Conference, vol. 2. pp.631-635, 2003
5 George Coulouris. Jean Dollimore and Tim Kindberg. 'Distributed Systems Concepts and Design'. Addison-Wesley Publishing Company. 1994