Browse > Article
http://dx.doi.org/10.13067/JKIECS.2012.7.2.287

A Study on Control of Access to Internal Network Information and Authority Set Up Management for Client by Class  

Seo, Woo-Seok (숭실대학교 일반대학원 컴퓨터학과)
Park, Jae-Pyo (숭실대학교)
Jun, Moon-Seog (숭실대학교)
Publication Information
The Journal of the Korea institute of electronic communication sciences / v.7, no.2, 2012 , pp. 287-293 More about this Journal
Abstract
It has been only few years that various contents information subject for information processing system has been remarkably increased in online. If we say the year 2000 is the technology based year when deluge of information and data such as real time sharing, the time since after 2000 until 2011 has been a period plentiful of application based functions and solutions. Also, as the applicable range of these information process systems extends, individual information effluence has been social issues twice in 2009 and 2010. Thus now there are continuous efforts made to develop technologies to secure and protect information. However, the range problem has been extended from the illegal access from outside to the legal access from internal user and damages by agents hidden in internal information process system and client system. Therefore, this study discusses the necessity for the studies on efficiency based information security by control of access to internal information and authority setting for administrator and internal users. Based on the result of this study, it provides data that can be used from SOHO class network to large scale for information security method.
Keywords
Information Security; Internal Network Information; Control of Access; Authority;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 정우열, 이선근, "네트워크 환경에 적용하기 위한대칭형 혼합형 암호시스템 설계에 관한 연 구", 한국전자통신학회논문지, 2권, 3호, pp. 150-156, 2007.
2 엄정호, 박선호, 정태명, "내부자의 불법적 정보 유출 차단을 위한 접근통제 모델 설계", 정보보호학회논문지, 20권, 5호, pp. 59-67, 2010.
3 이창훈, 하옥현, "기밀유출방지를 위한 융합보안 관리 체계", 정보.보안 논문지, 10권, 4호, pp. 61-67, 2010.
4 조혁현, 김정욱, 노봉남, "DSTM 터널링 보안 취약점 분석", 한국전자통신학회논문지, 2권, 4호, pp. 215-225, 2007.
5 인터넷침해대응센터, "인터넷 침해사고 동향 및 분석 월보", 2011년 8월호, pp. 5, Aug, 2011.
6 한국정보통신기술협회, 정보통신 용어사전, http://word.tta.or.kr/terms/terms.jsp, 2005
7 이병엽, 박준호, 김미경, 유재수, "데이터베이스 규제 준수, 암호화, 접근제어 유형 분류에 따른 체크리스트 구현", 한국콘텐츠학회논문지, 11권, 2호, pp. 61-68, 2011.
8 나성훈, 신현식, "VoIP 보안관련 주요기술에 대한 분석", 한국전자통신학회논문지, 5권, 4호, pp. 385-390, 2010.