Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2005.12C.7.965

An Architecture for Securing Digital Documents Using Radio Frequency Identification(RFID)  

Choi, Jae-Hyun (숭실대학교 대학원 컴퓨터학과)
Lee, Woo-Jin (숭실대학교 대학원 컴퓨터학과)
Chon, Ki-Won (숭실대학교 컴퓨터학부)
Abstract
Digital documents have become the mainstay of the paperless office. This is due to the increased usage of computer networks and the widespread digital culture. Along with the increased usage of digital documents comes the problem of securing them. The documents nay have very important information such as confidential business policies and intellectual Property statements. Generally, most of users protect them by using a password or secured flash memory or security software, but it has several weaknesses. Accordingly, we propose a new architecture for securing digital documents. The proposed architecture bases on RFID and several encrypting techniques. It makes up for the weakness of traditional securing architectures, and supports various Policies for digital documents of users.
Keywords
Radio Frequency Identification( RFID); Digital Documents; Security; Architecture;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 R.Kazman, M.Klein, M.Barbacci, H.Lipson, T.Longstaff, and S. J. Carriere, 'The Architecture Tradeoff Analysis Method,' Proc. Fourth Int'l Conf. Eng. Of Complex Computer Systems (ICECCS '98), pp.68-78, Aug., 1998   DOI
2 Len Bass, Paul Clements, Rick Kazman, Software Architecture in Practice, Addison Wesley, 2003
3 Lilianan Dobrica, Eila Niemela, 'A Survey on Software Architecture Analysis Methods,' IEEE Transactions on Software Engineering, Vol.28, No.7, pp.638-653, July, 2002   DOI   ScienceOn
4 Ollivier, M.M., 'RFID-a new solution technology for security problems,' Security and Detection, European Convention on,16-18 May, 1995, Page(s) : 234-238, 1995
5 www.winzip.com, 'Secure your documents with 128- or 256- bit AES encryption,' http://www.winzip.com/powertips.htm#encrypt
6 R. Rivest, 'The Message-Digest Algorithm,' IETF RFC 1321, http://www.ietf.org/rfc/rfc1321.txt?number=1321, 1992
7 Inside Technology, 'M210-2G Proximity Coupler,' http://www.insidecontactless.com/pdf/M210_2G.PDF
8 Inside Technology, 'PicoTagTM: ISO 15693 Memory Chips,' http://www.insidecontactless.com/pdf/PicoTag.pdf
9 Sangani, K., 'RFID sees all,' IEE Review, Volume 50, Issue 4, April, 2004, Page(s) : 22-24, 2004   DOI   ScienceOn
10 IDC, 'IDC, Worldwide Flash Memory Card and USB Flash Drive Forecast and Analysis, 2003-2007'
11 Microsoft Office Online, 'Protect a document from unauthorized changes,' http://office.microsoft.com/en-us/assistance/HP010446741033.aspx
12 김광조, 'RFID/USN 정보보호 기술,' TTA Journal, 2004   과학기술학회마을
13 Weis, S.A, 'RFID Privacy Workshop,' Security & Privacy Magazine, IEEE, Volume 2, Issue 2, Mar-Apr 2004 Page(s): 48-50, 2004   DOI   ScienceOn
14 Want, R, 'Enabling ubiquitous sensing with RFID,' Computer Volume 37, Issue 4, April, 2004, Page(s): 84-86, 2004   DOI   ScienceOn
15 권수갑, 'RFID 개념과 동향,' 한국전자부품연구원, 2004
16 CSI (Computer Security Institute), '2004 CSI/FBI Computer Crime and Security Survey,' http//www.GoCSI.com, 2004
17 Steven Shepard, 'RFID(McGraw-Hill Networking Professional),' McGraw-Hill, 2004
18 표철식, 채종석, 'RFID 기술 및 표준화 동향,' TTA Journal, 2004   과학기술학회마을
19 한국 인터넷 침해 사고 대응 지원 센터, '2003년 12월 해킹바이러스 통계 및 분석월보,' http//www.krcert.or.kr, 2003
20 한국 인터넷 침해 사고 대응 지원 센터, '2002년 12월 해킹 통계 보고서,' http//www.krcert.or.kr, 2002