• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Secure Knowledge Management for Prevent illegal data leakage by Internal users


Dae-Hee Seo, Jang-Mi Baek, Min-Kyung Lee, Mi-Yeon Yoon, Dong-Sub Cho, Journal of Internet Computing and Services, Vol. 11, No. 2, pp. 73-84, Apr. 2010
Full Text:
Keywords: Ubiquitous Computing, Knowledge Management System, Prevent illegal data leakage, access control, authentication

Abstract

Rapid development of Internet has increased users' desire for more information, and as a result, it created 'deluge of information', generating so much information. Especially, profit-pursuing corporations have done a lot of research to secure its own technological power. However, damages caused by illegal copy of information by illegal outside users or insiders are coming to the fore as social problem. Therefore, this paper is to propose secure knowledge management system to prevent illegal copy of data by insiders. The proposed scheme is a secure knowledge management system that carries out explicit authentication for internal users using 2MAC and provides data based on the authentication, thereby preventing illegal copy of data by insiders.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[APA Style]
Seo, D., Baek, J., Lee, M., Yoon, M., & Cho, D. (2010). Secure Knowledge Management for Prevent illegal data leakage by Internal users. Journal of Internet Computing and Services, 11(2), 73-84.

[IEEE Style]
D. Seo, J. Baek, M. Lee, M. Yoon, D. Cho, "Secure Knowledge Management for Prevent illegal data leakage by Internal users," Journal of Internet Computing and Services, vol. 11, no. 2, pp. 73-84, 2010.

[ACM Style]
Dae-Hee Seo, Jang-Mi Baek, Min-Kyung Lee, Mi-Yeon Yoon, and Dong-Sub Cho. 2010. Secure Knowledge Management for Prevent illegal data leakage by Internal users. Journal of Internet Computing and Services, 11, 2, (2010), 73-84.