Browse > Article
http://dx.doi.org/10.6109/jkiice.2013.17.10.2301

Indirection based Multilevel Security Model and Application of Rehabilitation Psychology Analysis System  

Kim, Young-Soo (Research and Business Foundation, Korea Nazarene University)
Jo, Sun-Goo (Department of Hotel & Tourism Management, Korea Nazarene University)
Abstract
These days, Rehabilitation psychology analysis system is being used by world wide web in everyday's life. And on the other hand, we are facing spam messages' problems. To block these spam message, we are using filtering or pricing systems. But these solutions are raising other problems such as impediment in reception or availability caused by false positive or payment resistance. To solve these problems, we propose an Indirect Model on Message Control System(IMMCS) which controls an unsolicited message and prevents an useful message from discarding. We design and implement the IMMCS to enhance the usefulness and the availability. Being tested the IMMCS to verify the usability and the efficiency, it gave us a very successful result.
Keywords
Rehabilitation psychology; Message control; Multilevel Security; Indirect model;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Abadi, M. et al., "Certified E-mail with a light on Line Trusted Third Party: Design and Implementation," Proceedings of the Eleventh International World Wide Web Conference, Vol.2, pp.387-395, May, 2002.
2 Pollock, S. "A Rule-Based Message Filtering System," ACM Transactions on Office Information Systems, vol. 6, no. 3, pp.232-254, July 1988.   DOI
3 Cynthia, D. and N, Moni "Pricing via processing or combatting junk mail," In Proceedings of Advances in Cryptology - CRYPTO' 92, pp 139-147, 1992.
4 Wendy E. Mackay, "Diversity in the Use of Electronic Mail:A preliminary Inquiry," ACM Transactions on Office Information Systems, vol. 6, no. 4, pp.380-397, Oct. 1988.   DOI
5 Lawrence E. Hughes, "Internet E-mail; Protocols, Standards, and Implementation," Artech House, 1998.
6 Young soo, kim, "Design and Implementation of Authentication Protocol in the Message Security System," Ph.D. of MIS Paper, Kookmin University, 2003.
7 David A. Turner, Daniel M. Havey, Controlling spam through lightweight currency," In Proceedings of the Hawaii International Conference on Computer Sciences, pp.1-9, 2003.
8 Jajodia, S., et al., "Flexible Support for Multiple Access control Policies," ACM Trans. on Database Systems, vol. 26, no. 2, pp. 214-260, June 2001.   DOI   ScienceOn
9 Sandhu, R., et al., "Role Based Access Control Models," IEEE Computer, vol. 29, no. 2, pp. 38-47, Feb. 1996.
10 Yao. C., "Theory and applications of trapdoor functions," in Proceedings of the Twenty-Third Annual IEEE Symposium on Foundations of Computer Science, pp. 80-91, 1982.
11 Telang, R. "Information Overload and Pricing of Communication Services," Carnegie Mellon University Working Paper, 2002.
12 Fahlman, S., "A way to control unwanted E-mail and telephone calls," IBM Systems Journal, vol. 41, no. 4, pp.759-766, June, 2002.   DOI   ScienceOn
13 Hoffman, P. "SMTP service extension for secure SMTP over Transport Layer Security," IETF, RFC3207, Feb. 2002.
14 Jonscher, D., R, Dittrich, "A Configurable Access Control System Interoperable Environment," In Proceedings of the ninth annual IFIP TC11 WG11.3 working conference on Database security IX, pp43-60, 1996.
15 Joshi, J.B.D. et al., "Security Models for Web-based Applications," Communications of the ACM, vol. 44, no. 2, pp. 38-44, Feb. 2001.