2005
DOI: 10.1007/11424925_16
|View full text |Cite
|
Sign up to set email alerts
|

Design of Inside Information Leakage Prevention System in Ubiquitous Computing Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2009
2009
2013
2013

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…Computerization of companies is not a simple change of business environments but a means of securing competitiveness of companies by improving productivity and reducing transaction cost . In addition, computerization of companies is a key basis for creating high added value throughout the economic society using knowledge and information, and it would lead to be capable of coping with high uncertainty of markets . While computerization has this good effect, industrial technologies, which should be protected in safety, are recently leaked out to competitors or overseas at ease as they are integrated with IT to computerize.…”
Section: Introductionmentioning
confidence: 99%
“…Computerization of companies is not a simple change of business environments but a means of securing competitiveness of companies by improving productivity and reducing transaction cost . In addition, computerization of companies is a key basis for creating high added value throughout the economic society using knowledge and information, and it would lead to be capable of coping with high uncertainty of markets . While computerization has this good effect, industrial technologies, which should be protected in safety, are recently leaked out to competitors or overseas at ease as they are integrated with IT to computerize.…”
Section: Introductionmentioning
confidence: 99%
“…A modified i-node with 1-bit flag bit and 1-bit lock bit imposes authentications with integrated network location checking between storage devices and security server, a user can only access the files when she is inside the company and the authentication is succeeded. Change and Kim designed a system to prevent information leakage in ubiquitous computing environment [5]. The approach utilizes cryptographic algorithms and authentication methods in agents to secure the sensitive data during communications.…”
Section: Introductionmentioning
confidence: 99%