Browse > Article
http://dx.doi.org/10.13089/JKIISC.2008.18.1.23

System Design and Implementation for Security Policy Management of Windows Based PC and Weakness Inspection  

Park, Byung-Yeon (Kongju National University)
Yang, Jong-Won (Kongju National University)
Seo, Chang-Ho (Kongju National University)
Abstract
Attempt to protect personal computer from hacking, virus, worm, and the troy wooden horse is progressed variously. Nevertheless, it is very difficult fer public users to understand configurations to enhance security stability in windows based personal computer, and many security problem is due to there lack of recognize about information accessability, various kind of configuration, these necessity, and efficiency. Accordingly, it is demandded to develop an efficient system to protect networks and personal computer with automated method. In this paper, we derive problems of personal computer by analyzing various vulnerableness and policy on security, through which we design and implement the system to solve various windows system problem conveniently.
Keywords
Security Policy; XML;
Citations & Related Records
연도 인용수 순위
  • Reference
1 D. F. Ferraiolo, D. Richard Kuhn, "Role-Based Access Controls", Proceedings of the 15th NIST-NSA National Computer Security Conference, Baltimore, Maryland, October, 13-16, 1992
2 M. Massie, B. Chun, and D. Culler, "The Ganglia Distributed Monitoring System: Design, Impleementation and Experience," Paralled Computing. Vol.30, Issue. 7, 2004
3 W. Yurcik, X. Meng, and N. Kiyanclar, " NVisionCC: a Visualization Framework for High Performance Cluster Security," Proc. of VizSEC 2004, ACM Press, New York, NY, USA, Oct. 2004. pp. 133-137
4 http://www.symantec.co.kr
5 D.E. DENNING, "A lattice model of secure information flow", Commun, ACM 19, 2, 236-243. 1976   DOI   ScienceOn
6 T. Roney, A. Bailey, and J, Fullop, "Cluster Monitoring at NCS," 2nd LCI Int'l Conf. on Linux Clusters.2001
7 R. SANDHU, P.SAMARATI, "Access control: Principles and practice", IEEE Commun. Mag.32, 9, 40-48 1994
8 http://iase.disa.mil/stigs/SRR/index.html