Browse > Article
http://dx.doi.org/10.13067/JKIECS.2013.8.8.1161

Research on the Access Control Methodology for Dualised Hierarchical Personal Information Life-Cycle  

Seo, Woo-Seok (주식회사 이지서티 개인정보보호센터)
Kim, Kye-Soon (한국SMC공압(주))
Jun, Moon-Seog (숭실대학교 컴퓨터학과)
Publication Information
The Journal of the Korea institute of electronic communication sciences / v.8, no.8, 2013 , pp. 1161-1170 More about this Journal
Abstract
Currently in 2013, a law that was drawn as a result of social agreement for personal information protection was enacted, and through several amendments, definite policy of written law and guideline were presented for definitive information protection in various fields of social business including IT field. Based on a series of social issues about the importance of personal information, a new access paradigm to personal information appeared. And from macroscopic access method called information protection, the necessity of technical access method came to the fore. Of course, it seems somewhat irrational to restrict all data in the form of personal information to a certain category of information until now. But in the deluge of information based on IT field, it is true that the part of checking the flow of personal information and selecting as security target has been standardized. But still there are cases in which it is difficult to routinely apply the five standardized flows of personal information Life-Cycle-collect, process, provide, store, and destroy-to information that all companies and organizations have. Therefore, the researcher proposes the standardized methodology by proposing the access control methodology for dualised hierarchical personal information Life-Cycle. The results of this research aim to provide practical data which makes optimal access control to personal information Life-Cycle possible.
Keywords
Personal Information; Access Control; Methodology;
Citations & Related Records
Times Cited By KSCI : 5  (Citation Analysis)
연도 인용수 순위
1 K. S. Lee, H. B. A, S. Y. Lee, "A Study on a Prevention Method for Personal Information Exposure", The Journal of information and security, Vol. 12, No. 1, pp. 71-77, 2012.   과학기술학회마을
2 M. S. Kim, "The Study of Check-list based on Privacy Law in Korea for Private Company", The Journal of computing science and engineering (Proceedings of the 2010 Fall Conference), Vol. 37, No. 2B, pp. 37-42, 2010.
3 D. j. Lee, "The Moderating Role of Site Usage Experience in Internet Users' Decision on Personal Information Disclosure", Information Policy, Vol. 19, No. 2, pp. 21-38, 2012.
4 The Republic of Korea Ministry of Security and Public Administration . Korea Internet & Security Agency, Privacy counseling casebook", pp. 10-11, 2012.
5 S. C. Jin, I. K. K, "A Study on the Psychological anxiety on Private information leakage to likelihood of internet users", The Journal of the Korea Institute of Electronic Communication Sciences, Vol. 6, No. 5, pp. 731-738, 2011.   과학기술학회마을
6 C. I. Hwan, "A study on the Development of Personnel Security Management for Protection against Insider threat", The Journal of the Korea Institute of Electronic Communication Sciences, Vol. 3, No. 4, pp. 210-220, 2008.   과학기술학회마을
7 E. J. Jun, H. B. Kim, H. Y. Youm, "Trends of laws and programs for personal information protection of Japan and China", The Journal of the Korea Institute of Information Security and Cryptology, Vol. 22, No. 5, pp. 90-105, 2012.
8 D. K. Jeong, "Comparative study of the privacy information protection policy - Privacy information basic laws and dedicated organizations -", The Journal of the Korea Institute of Information Security and Cryptology, Vol. 22, No. 4, pp. 923-939, 2012.
9 S. J. Lim, G. J. Kim, T. G. Kang, "Important Information Protection using Client Virtualization", The Journal of The Korea Institute of Electronic Communication Sciences, Vol. 6, No. 1, pp. 111-117, 2011.