Abstract
This study designed a system that prevents the leakage of information flowing through physical communication networks in ubiquitous computing environment. The information security system was designed from the view-point of information life cycle based on u-Office' service scenario and, as a result, security holes were identified including indiscreet information access, malicious information leakage, unauthorized information alteration, illegal information retrieval, information leakage using various portable storage devices and printed-out information leakage. In addition, this study defined and designed essential security technology required to resolve these security holes.
Original language | English |
---|---|
Pages (from-to) | 128-137 |
Number of pages | 10 |
Journal | Lecture Notes in Computer Science |
Volume | 3483 |
Issue number | IV |
DOIs | |
Publication status | Published - 2005 |
Event | International Conference on Computational Science and Its Applications - ICCSA 2005 - , Singapore Duration: 2005 May 9 → 2005 May 12 |
All Science Journal Classification (ASJC) codes
- Theoretical Computer Science
- Computer Science(all)