Browse > Article
http://dx.doi.org/10.13089/JKIISC.2010.20.1.113

System Specification-based Design of Mobile Alarm System for Privacy Protection  

Jang, Eun-Young (Division of Computer, Seoul Women's University)
Kim, Hyung-Jong (Division of Computer, Seoul Women's University)
Abstract
The system specification is a system theory based formal representation method for systems' structure and behavior modeling. When we make use of the system specification method in each step of software development, we can derive a hierarchical and modularized system design which enables us to manage the software development process flexibly. This research presents system specification based design of a mobile alarm system which sends alerts about illegal usage of private information and manages the response against the each alert. In our design of mobile alarm system, there are formal definition of alert message overcoming the functional limitation of mobile device and hierarchical modularized modeling of alarm processing using system specification. The efficiency of making use of the system specification is shown by applying the specification method to implementation of mobile alarm system. The contribution of this work is in design and implementation of mobile alarm system which enables us to handle the private information leakage situation more flexible way using system specification based software designing method.
Keywords
Mobile alarm system; System specification-based software design; Private information protection;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 B.P. Zeigler, H. Praehofer, and T.G. Kim, Theory of Modeling and Simulation, 2th Ed., Academic Press, Jan. 2000.
2 J. Niinimäki, A. Holopainen, J. Kerttula, and J. Reponen, "Security Development of a Pocket-Sized Teleradiology Consultation System," Studies in Health Technology and Informatics, pp. 1266-1270, Aug. 2001.
3 J. Burkhadrdt, T. Schaeck, S. Happer, K. Rindtorff, and T. Schaeck, "Pervasive computing: Technology and Architecture of mobile internet applications," Addison-Wesley Longman Publishing Co, Jan. 2001.
4 한영태, 민덕기, "이벤트 알림 서비스의 구조설계와 성능분석," 한국시뮬레이션학회 추계학술대회논문집, pp. 95-103, 2003년 11월.
5 B. Lee, "Users' Perspective on Regulation to Protect Privacy on the Web," The International Information & Library Review, pp. 379-402, Sep. 2000.
6 김은하, 조대호, "시스템 형식론에 의한 사용자 인터페이스 시스템 표현과 DEVS 모델링," 한국시뮬레이션학회논문지, 8(4), pp. 137-154, 1999년 12월.
7 I. Mavridis and G. Pangalos, "Security Issues in a Mobile Computing Paradigm," Informatics 97 security issues, pp. 61-76, Sep. 1997.
8 R. Sekar and P. Uppuluri, "Synthesizing Fast Intrusion Prevention / Detection Systems from High-Level Specifications," Proceedings of the 3rd USENIX Windows NT Symposium, pp. 12-15, July 1999.
9 S.P. Hong, S.M. Kang, K.G. Kim, and J.H. Jeoung, "Prototyping the Privacy-Based Policy Management System for Securely Using Privacy Information," WISA 2009, pp. 121-129, Aug. 2009.
10 N.M. Karnik and A.R. Tripathi, "Security in the Ajanta Mobile agent system," Software-Practice & Experience archive, pp. 301-329, May 1999.
11 장은영, 김형종, 황준, "개인정보 관리를 위한 메시지 트리 기반의 모바일 알람 시스템 구축," 정보보호학회논문지, 19(3), pp. 153-162, 2009년 6월.