Browse > Article

Secure Knowledge Management for Prevent illegal data leakage by Internal users  

Seo, Dae-Hee (한국전자통신연구원)
Baek, Jang-Mi (순천향대학교 컴퓨터학부)
Lee, Min-Kyung (이화여자대학교 일반대학원)
Yoon, Mi-Yeon (한국인터넷진흥원)
Cho, Dong-Sub (이화여자대학교 컴퓨터학과)
Publication Information
Journal of Internet Computing and Services / v.11, no.2, 2010 , pp. 73-84 More about this Journal
Abstract
Rapid development of Internet has increased users' desire for more information, and as a result, it created 'deluge of information', generating so much information. Especially, profit-pursuing corporations have done a lot of research to secure its own technological power. However, damages caused by illegal copy of information by illegal outside users or insiders are coming to the fore as social problem. Therefore, this paper is to propose secure knowledge management system to prevent illegal copy of data by insiders. The proposed scheme is a secure knowledge management system that carries out explicit authentication for internal users using 2MAC and provides data based on the authentication, thereby preventing illegal copy of data by insiders.
Keywords
Ubiquitous Computing; Knowledge Management System; Prevent illegal data leakage; Access Control; Authentication;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Seoksoo Kim, Soongohn Kim, Geuk Lee, "Structure design and test of enterprise security management system with advanced internal security," Future Gener. Comput. Syst. Vol 25, 3, pp. 358-363, 2009.   DOI   ScienceOn
2 Todd Borandi, "Introduction to Secure Global Collaboration," Information Security Journal: A Global Perspective, Vol 18, pp. 51-56, 2009.   DOI   ScienceOn
3 http://pdfserve.informaworld.com/880539_758492345_906858502.pdf
4 문진규, "내부 정보 유출 방지를 위한 DRM 적용 방법 설계," 한국정보과학회 2007 논문집 제34권 제 1호, pp. 7-10, 2007.
5 Hongju Yeom; Hwasung Kim, "An efficient multicast mechanism for data loss prevention," Advanced Communication Technology, 2005, ICACT 2005. The 7th International Conference on , vol.1, pp. 497-502 Vol. 1, pp. 21-23 2005.
6 김동진, "기업환경의 내부보안을 위한 통합 보안 관리 시스템의 설계 및 구현," 석사학위논문, 2008.
7 Snader, R., Borisov, N., "A tune-up for Tor: Improving security and performance in the Tor network," Network & Distributed System Security Symposium, Internet Society, 2008.
8 송성근, 박지숙, 우재현, 임종인, "情報技術 유 출 예방을 위한 기업內 컴퓨팅 환경 최적화 방안 연구," 한국정보보호학회, 정보보호학회지 제18권 제6호, pp. 43-57, 2008.   과학기술학회마을
9 http://drm.insideitsolution.com/