Browse > Article

Design of Security Mechanism for Electronic Document Repository System  

Kim, Jeom-Goo (남서울대학교 컴퓨터학과)
Kim, Sang-Choon (강원대학교 전자정보통신공학부)
Publication Information
Abstract
The management and deposit of paper document costs are increased gradually. Specially, it is too expensive to safekeeping paper document in the warehouse. Also paper based document system is exposed in several security problems. Therefore, demands of transformation process from paper document into electronic ones are quietly needed. Electronic document repository system is one of the best solutions for solving paper based document system issues. Electronic document repository system can reduce overall costs and provides some advantages in comparison with paper based document system. But, electronic document repository system has no formal methodology for guarantee safeties. Therefore, we suggest a security mechanism for establish electronic document repository system. Suggested security methodology can help for design of more secure electronic document repository system.
Keywords
Security; Electronic Document;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Gopalan Sivathanu, Charles P. Wright, and Er ez Zadok, "Ensuring data integrity in storage: techniques and applications", Proceedings of the 2005 ACM workshop on Storage security and survivability, Fairfax, United States, Nov. 2005, pp. 26-36.
2 Mihir Bellarea, 1, Joe Kilianb and Phillip Roga way, "The Security of the Cipher Block Chaini ng Message Authentication Code", Journal of C omputer and System Sciences, Volume 61, Issue 3, December 2000, pp. 362-399.   DOI   ScienceOn
3 SangYeob Na and Suhhyun Cheon, "Dynamic Role Assignment in Role-Based Access Control ", Proceeding of the 5th ACM RBAC Workshop, Berlin, Germany, Jul 2000, pp.39-44.
4 Chi-Kwong Chan and L. M. Cheng, "Cryptana lysis of a Timestamp-Based Password Authent ication Scheme", Computers & Security, Volum e 21, Issue 1, 2001, pp. 74-76.   DOI   ScienceOn
5 Jane F. kinkus, Science and Technology Resour ces on the Internet: Computer Security, Issues in Science and Technology Librarianship, No 36, Fall 2002.
6 Seth T. Ross, UNIX System Security Tools, McGraw-Hill, ISBN 0079 13788 1, 1999.
7 Frank Stajano, Security for Ubiquitous Computing, Wiley, ISBN 0470 84493 0, 2002.
8 The information security glossary, http://www. your window.to/information-security/gl_nonrepu diation.htm, Nov 2007.
9 David F. Ferraiolo, Janet A.Cugini, and D. Ric hard Kuhn, "Role-Based Access Control(RBAC): Feature and Motivation", National Institute of Standard and Technology, 1995.
10 Ralph C. Merkle, "A certified digital signature ", Proceedings on Advances in cryptology, Cali fornia, United States, 1989, pp. 218 - 238
11 Deborah Russell and G.T. Gangemi Sr, Comput er Security Basics, O'Reilly, ISBN 0 937175 71 4, 1992.
12 Hans Dobbertin, Lars Knudsen, and Matt Robs haw, "The Cryptanalysis of the AES - A Brief Survey", Advanced Encryption Standard - AE S, 4th International Conference, AES 2004, LN CS 3373, Bonn, Germany, May 2004, pp. 1-10.
13 E. Biham and A. Shamir. Differential Cryptanalysis of the Data Encryption Standard. Springer-Verlag, New York, 1993.
14 M Naor and M.Yung, "Universal one-way has h functions and their cryptographic applications ", Annual ACM Symposium on Theory of Com puting, Seattle, 1989, pp. 33 - 43.
15 Charles T. Cullen, Peter B. Hirtle, David Levy, Clifford A. Lynch and Jeff Rothengerg, Authenticity in Digital Environment, Council on Library and Information Resources, ISBN 1 887334 777, May 2000.
16 Adobe, "A primer on electronic document security", Technical White Paper, Nov 2004.
17 Computer Security: A practical Definition, http:/ /www. albion.com/security/intro-4.html, Jul 200 7.