This study designed a system that prevents the leakage of information flowing through physical communication networks in ubiquitous computing environment. The information security system was designed from the view-point of information life cycle based on u-Office' service scenario and, as a result, security holes were identified including indiscreet information access, malicious information leakage, unauthorized information alteration, illegal information retrieval, information leakage using various portable storage devices and printed-out information leakage. In addition, this study defined and designed essential security technology required to resolve these security holes. © Springer-Verlag Berlin Heidelberg 2005.
CITATION STYLE
Chang, H., & Kim, K. K. (2005). Design of inside information leakage prevention system in ubiquitous computing environment. In Lecture Notes in Computer Science (Vol. 3483, pp. 128–137). Springer Verlag. https://doi.org/10.1007/11424925_16
Mendeley helps you to discover research relevant for your work.