Skip to main content
Top
Published in: Wireless Personal Communications 2/2013

01-11-2013

A Study on Convergence Security System for Preventing Leakage of Internal Information

Authors: Min-su Kim, Dong-hwi Lee, Kui-nam J. Kim

Published in: Wireless Personal Communications | Issue 2/2013

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Real-time tracing system blocks the used ports such as FTP, messenger, cloud and etc. to detect abnormal symptom such as leakage of internal information inside based on location tracing of the visitors as well as the internal staffs and operates mail backup server for mail management together with TCP packet monitoring as IPS that tracks the positions of moving objects (human and properties) using passive RFID, and I am willing to suggest the study of convergence security system that can prevent the leakage of internal information and trace the person who leaks the information.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Popov, A. L., Vendik, O. G., & Zubova, N. A. (2010). Magnetic field intensity in near field zone of loop antenna for RFID systems. Technical Physics letters, SP MAIK Nauka/Interperiodica, 36(10), 882–884.CrossRef Popov, A. L., Vendik, O. G., & Zubova, N. A. (2010). Magnetic field intensity in near field zone of loop antenna for RFID systems. Technical Physics letters, SP MAIK Nauka/Interperiodica, 36(10), 882–884.CrossRef
2.
go back to reference Song, T. S., Kim, T. Y., & Lyou, J. (2008). Conformance evaluation method by successively applying self-running test mode in active RFID tag. Korean Institute of Electronics Engineers, 45(6), 204–212. Song, T. S., Kim, T. Y., & Lyou, J. (2008). Conformance evaluation method by successively applying self-running test mode in active RFID tag. Korean Institute of Electronics Engineers, 45(6), 204–212.
3.
go back to reference Rhee, S.-H., Chun, J. H., & Park, J. A. (2006). Performance improvement in passive tag based RFID reader. Korean Institute of Communication Sciences, 31(11A), 1159–1166. Rhee, S.-H., Chun, J. H., & Park, J. A. (2006). Performance improvement in passive tag based RFID reader. Korean Institute of Communication Sciences, 31(11A), 1159–1166.
4.
go back to reference Cole, P. H. (2003). Fundamentals in radio frequency identification. Cole, P. H. (2003). Fundamentals in radio frequency identification.
5.
go back to reference MCRF335/360 reader reference design, Microchip Technology Inc. (2001). MCRF335/360 reader reference design, Microchip Technology Inc. (2001).
6.
go back to reference De Paz, J. F., Tapia, D. I., Alonso, R. S., Pinzon, C. I., Bajo, J., & Corchado, J. M. (2012). Mitigation of the ground reflection effect in real-time locating systems based on wireless sensor networks by using artificial neural networks. Knowledge and Information Systems, Springer-Verlag, 34(1), 193–217. De Paz, J. F., Tapia, D. I., Alonso, R. S., Pinzon, C. I., Bajo, J., & Corchado, J. M. (2012). Mitigation of the ground reflection effect in real-time locating systems based on wireless sensor networks by using artificial neural networks. Knowledge and Information Systems, Springer-Verlag, 34(1), 193–217.
7.
go back to reference De Vira, G., & Iannaccone, G. (2005). Design criteria for the RF section fo UHF and microwave passive RFID transponders. IEEE Transactions on Microwave Theory and Techniques, 53(9), 2978–2990.CrossRef De Vira, G., & Iannaccone, G. (2005). Design criteria for the RF section fo UHF and microwave passive RFID transponders. IEEE Transactions on Microwave Theory and Techniques, 53(9), 2978–2990.CrossRef
8.
go back to reference Stolfo, S. J., Bellovin, S. M., Keromytis, A. D., Sinclair, S., Smith, S. W., & Hershkop, S. (2008). Insider attack and cyber security beyond the hacker. Berlin: Springer.CrossRef Stolfo, S. J., Bellovin, S. M., Keromytis, A. D., Sinclair, S., Smith, S. W., & Hershkop, S. (2008). Insider attack and cyber security beyond the hacker. Berlin: Springer.CrossRef
9.
go back to reference Eom, J. H., Park, S. H., & Chung, T. M. (2010). An architecture of access control model for preventing illegal information leakage by insider. Korea Institute of Information Security and Cryptology, 20(5), 59–67. Eom, J. H., Park, S. H., & Chung, T. M. (2010). An architecture of access control model for preventing illegal information leakage by insider. Korea Institute of Information Security and Cryptology, 20(5), 59–67.
10.
go back to reference Seo, D. H., Beak, J. M., Lee, M. K., Yoon, M. Y., & Cho, D. S. (2010). Secure knowledge management for prevent illegal data leakage by internal users. Korean Society for Internet Information, 11(2), 73–84. Seo, D. H., Beak, J. M., Lee, M. K., Yoon, M. Y., & Cho, D. S. (2010). Secure knowledge management for prevent illegal data leakage by internal users. Korean Society for Internet Information, 11(2), 73–84.
11.
go back to reference Lee, E. B., & Kim, K. Y. (2010). A study on the separate network based information security. 20(1), 39–46. Lee, E. B., & Kim, K. Y. (2010). A study on the separate network based information security. 20(1), 39–46.
Metadata
Title
A Study on Convergence Security System for Preventing Leakage of Internal Information
Authors
Min-su Kim
Dong-hwi Lee
Kui-nam J. Kim
Publication date
01-11-2013
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 2/2013
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-013-1228-3

Other articles of this Issue 2/2013

Wireless Personal Communications 2/2013 Go to the issue