Browse > Article
http://dx.doi.org/10.6109/jkiice.2014.18.3.617

A Design of Integrated Security Policies for Enabling Adaptive Security in Campus Environment  

Ko, Bong-Koo (Department of Information Technology, Chonbuk University)
Park, Jong-Seon (Division of Computer Science and Engineering, Chonbuk University)
Chung, Seung-Jong (Department of Information Technology, Chonbuk University)
Cho, Gi-Hwan (Division of Computer Science and Engineering, Chonbuk University)
Abstract
A campus network nowadays adapts the security policies in detail and even in variety, along with firewall based access control. Nevertheless, security threats, such as information hacking, intrusion and DoS, are not decreasing yet. This paper proposes an enabling method of discriminative security policies to enforce an adaptive security for security objects on basis of the security elements. The security level of a security devices is decided based on the mapping between the users and the objects. The proposed security policies could improve the security effect in terms of investment in creative campus environment, and aim to provide fast and stable services to users.
Keywords
Campus Network; Firewall; Security Objects; Security Policy;
Citations & Related Records
Times Cited By KSCI : 8  (Citation Analysis)
연도 인용수 순위
1 M. G. Kang and S. S. Kim, "Design and Implementation of Security Solution Structure to Enhance Inside Security in Enterprise Security Management System," Journal of the Korea Contents Association, vol. 5, no. 6, pp. 360-367, Dec. 2005.   과학기술학회마을
2 K. Y. Kim, S. W. Lee, and J. H. Kim, "A Security Monitoring System for Security Information Sharing and Cooperative Countermeasure," Journal of the Institute of Electronics Engineers of Korea, vol. 50, no. 2, pp. 60-69, Feb. 2013.   과학기술학회마을   DOI   ScienceOn
3 Y. J. Kim, S. Y. Lee, H. Y. Kwon, and J. I. Lim, "A Study on the Improvement of Effectiveness in National Cyber Security Monitoring and Control Services," Journal of the Korea Institute of Information Security and Cryptology, vol. 19, no. 1, pp. 103-111, Feb. 2009.   과학기술학회마을
4 KISA, "A Manual of Establishing and Managing a CERT," KISA Guide, no. 2010-13, Jan. 2010.
5 Y. T. Kim, O. J. Kwon, J. M. Lee, and T. S. Kim, "Implementation and Design of Policy Based Security System for Integration Management," Journal of the Korea Multimedia Society, vol. 10, no. 8, pp. 1052-1059, Aug. 2007.   과학기술학회마을
6 G. J. Mun, Y. M. Kim, and B. N. Noh "A Performance Comparison of Network Attacks based on Selecting Statistical Criterion," Review of KIISC, vol. 19, no. 2, pp. 16-25, Apr. 2009.
7 G. H. Lee and C. G. Lee, "A Risk Evaluation and Real-time Alert Alarm Generation for Responding Cyber Attacks in the Cyber Environment," Review of KIISC, vol. 18, no. 5, pp. 112-124, Oct. 2008.
8 J. C. Ahn, "A Government Agency Environment Protects Information System Design using Intrusion Prevention System and Role-base Security Policy," Journal of the Korea Institute of Information Security and Cryptology, vol. 14, no. 6 pp. 91-103, Dec. 2004.   과학기술학회마을
9 J. H. Yoo, J. H. Kim, G. R. Kim, and J. C. Na, "A Standardization Status of the Integrated Security Management and Cyber Trace Technologies," TTA Journal, no. 118, Aug. 2008.
10 Cisco, "Integrated Security Architecture Framework," White paper.
11 H. H. Choi and T. M. Chung, "Study on Generalization of Security Policies for Enterprise Security Management System," The KIPS Transactions, vol. 9, no. 6, pp. 823-830, Aug. 2002.   과학기술학회마을   DOI   ScienceOn
12 J. D. Kim, K. W. Kim, and Y. D. Lee, "The Concept and Approach of Convergence Security," Review of KIISC, vol. 19, no. 6, pp. 68-74, Dec. 2009.
13 W. S. Seo and M. S. Jun, "A Study on Building an Optimized Defense System According to the Application of Integrated Security Policy Algorithm," Journal of the Korea Institute of Information Security and Cryptology, vol. 21, no. 4, pp. 39-46, Aug. 2011.   과학기술학회마을
14 W. S. Jang, J. Y. Choi, and J. I. Lim, "A study on method of setting up the defense integrated security system," Journal of the Korea Institute of Information Security and Cryptology, vol. 22, no. 3, pp. 575-584, Jun. 2012.   과학기술학회마을