Design of inside information leakage prevention system in ubiquitous computing environment

Hangbae Chang, Kyung Kyu Kim

Research output: Contribution to journalConference article

3 Citations (Scopus)

Abstract

This study designed a system that prevents the leakage of information flowing through physical communication networks in ubiquitous computing environment. The information security system was designed from the view-point of information life cycle based on u-Office' service scenario and, as a result, security holes were identified including indiscreet information access, malicious information leakage, unauthorized information alteration, illegal information retrieval, information leakage using various portable storage devices and printed-out information leakage. In addition, this study defined and designed essential security technology required to resolve these security holes.

Original languageEnglish
Pages (from-to)128-137
Number of pages10
JournalLecture Notes in Computer Science
Volume3483
Issue numberIV
Publication statusPublished - 2005 Sep 26

Fingerprint

Ubiquitous Computing
Ubiquitous computing
Security of data
Information retrieval
Security systems
Leakage
Telecommunication networks
Life cycle
Information Security
Design
Communication Networks
Life Cycle
Information Retrieval
Resolve
Scenarios

All Science Journal Classification (ASJC) codes

  • Computer Science (miscellaneous)

Cite this

@article{e629643699e34ae098a0f9069c5d6e65,
title = "Design of inside information leakage prevention system in ubiquitous computing environment",
abstract = "This study designed a system that prevents the leakage of information flowing through physical communication networks in ubiquitous computing environment. The information security system was designed from the view-point of information life cycle based on u-Office' service scenario and, as a result, security holes were identified including indiscreet information access, malicious information leakage, unauthorized information alteration, illegal information retrieval, information leakage using various portable storage devices and printed-out information leakage. In addition, this study defined and designed essential security technology required to resolve these security holes.",
author = "Hangbae Chang and Kim, {Kyung Kyu}",
year = "2005",
month = "9",
day = "26",
language = "English",
volume = "3483",
pages = "128--137",
journal = "Lecture Notes in Computer Science",
issn = "0302-9743",
publisher = "Springer Verlag",
number = "IV",

}

Design of inside information leakage prevention system in ubiquitous computing environment. / Chang, Hangbae; Kim, Kyung Kyu.

In: Lecture Notes in Computer Science, Vol. 3483, No. IV, 26.09.2005, p. 128-137.

Research output: Contribution to journalConference article

TY - JOUR

T1 - Design of inside information leakage prevention system in ubiquitous computing environment

AU - Chang, Hangbae

AU - Kim, Kyung Kyu

PY - 2005/9/26

Y1 - 2005/9/26

N2 - This study designed a system that prevents the leakage of information flowing through physical communication networks in ubiquitous computing environment. The information security system was designed from the view-point of information life cycle based on u-Office' service scenario and, as a result, security holes were identified including indiscreet information access, malicious information leakage, unauthorized information alteration, illegal information retrieval, information leakage using various portable storage devices and printed-out information leakage. In addition, this study defined and designed essential security technology required to resolve these security holes.

AB - This study designed a system that prevents the leakage of information flowing through physical communication networks in ubiquitous computing environment. The information security system was designed from the view-point of information life cycle based on u-Office' service scenario and, as a result, security holes were identified including indiscreet information access, malicious information leakage, unauthorized information alteration, illegal information retrieval, information leakage using various portable storage devices and printed-out information leakage. In addition, this study defined and designed essential security technology required to resolve these security holes.

UR - http://www.scopus.com/inward/record.url?scp=24944456026&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=24944456026&partnerID=8YFLogxK

M3 - Conference article

VL - 3483

SP - 128

EP - 137

JO - Lecture Notes in Computer Science

JF - Lecture Notes in Computer Science

SN - 0302-9743

IS - IV

ER -