Browse > Article
http://dx.doi.org/10.13067/JKIECS.2018.13.6.1155

A Study on the Optimized Balance Module of Security Policy to Enhance Stability in the Service-Based Information System  

Seo, Woo-Seok (Security Consulting)
Publication Information
The Journal of the Korea institute of electronic communication sciences / v.13, no.6, 2018 , pp. 1155-1160 More about this Journal
Abstract
Presently in 2018, the security market is requiring progressive development and innovation in the area of security on account of new changes and technologies. This means the rapid and prompt development of the service platforms and service-based information systems. Here, this study is going to examine the process of operating a number of services and obtaining security, not the criteria for selecting particular service in online environment where the various services exist. Within a series of flows to protect the manager's authority about the platforms operated by information systems, and to provide and destroy services, this author limits the entire service platforms of the optimized balance module into four categories maximum for the security of the area apt for illegal invasion and access, and the proper area. Also, about the area with limited security, this researcher again applies subordinate security policy and technology respectively. This author here will suggest a method to provide and to extend safety and security for the information system and also propose the process of applying it as well.
Keywords
Availability; Balance Module; Information Security; Optimization; Security Policy; Stability;
Citations & Related Records
Times Cited By KSCI : 10  (Citation Analysis)
연도 인용수 순위
1 J. Hom, S. Heon, and T. Mhung, "A Sudy on an Extended Cyber Attack Tree for an Analysis of Network Vulnerability," J. of the Korea Society of Digital Industry and Information Management, vol. 6, no. 3, Sept. 2010, pp. 49-57.
2 J. Jang, D. Mim, and C. Jhoi, "Study on Hybird Type Cloud System," J. of the Korea Institute of Electronic Communication Sciences, vol. 11, no. 6, June 2016, pp. 611-618.   DOI
3 S. Park and N. Kim, "A Verification Csae Study about the Authentication of a Network using AAA," J. of the Korea Institute of Electronic Communication Sciences, vol. 12, no. 2, Apr. 2017, pp. 295-300.   DOI
4 J. Song, B. Kim, and H. Kim, "A Design of A Modbus Application Protocol for Multiple SCU Connections," J. of the Korea Academia-Industrial cooperation Society, vol. 19, no. 4, Apr. 2018, pp. 642-649.   DOI
5 H. Choi and Y. Cho, "Analysis of Security Threats from Increased Usage of Mobile App Services," J. of the Korea Society of Digital Industry and Information Management, vol. 14, no. 1, Mar. 2018, pp. 45-55.   DOI
6 I. Kim, H. Lim, D. Ji, and J. Park, "A Efficient Network Security Management Model in Industrial Control System Environments," J. of the Korea Academia-Industrial cooperation Society, vol. 19, no. 4, Apr. 2018, pp. 664-673.   DOI
7 B. Cha, S. Park, and J. Kim, "Prototype Design of Hornet Cloud using Virtual Honeypot Technique," J. of the Korea Institute of Electronic Communication Sciences, vol. 10, no. 8, Aug. 2015, pp.891-900.   DOI
8 Y. Shin, S. Han, I. Jae, and J. Lee, "A Study on the Linkage between Intelligent Security Techno.logy based on Spatial Information and other Technologies for Demonstration of Convergence Technology," J. of the Korea Academia-Industrial cooperation Society, vol. 19, no. 1, Jan. 2018, pp. 622-632.   DOI
9 K. Kim, D. Wang, and S. Ban, "Home Security System Based on IoT," J. of the Korea Institute of Electronic Communication Sciences, vol. 12, no. 1, Feb. 2017, pp. 147-154.   DOI
10 Y. Hee, Y. Seo, and W. Kim, "Hardware Implementation for High-Speed Generation of Computer Generated Hologram," J. of the Korea Society of Digital Industry and Information Management, vol. 9, no. 1, Mar. 2013, pp. 129-139.
11 J. Lee and J. Lee, "Efficient Hierarchical Mobility Management Scheme for Mobile Content Centric Networking," J. of the Korea Academia-Industrial cooperation Society, vol. 19, no. 2, Feb. 2018, pp. 37-41.   DOI
12 S. Jung, D. Kum, and S. Choi, "Channel Grade Method of multi-mode mobile device for avoiding Interference at WPAN," J. of the Korea Society of Digital Industry and Information Management, vol. 11, no. 3, Sept. 2015, pp. 91-98.   DOI