{"title":"Application of fingerprint identification technology to systems against inside information leaks and a proposal for its development form","authors":"Mitsuharu Kodama, T. Umezaki, Yukio Sato","doi":"10.1002/ECJC.20346","DOIUrl":null,"url":null,"abstract":"Changes are occurring in the environment surrounding business organizations, such as the development of open networks and flexible migration of employees. In the context of such changes, it has recently been considered more important to prepare measures against information leaks from inside the organization. Among these, an urgent issue in ordinary organizations is to reinforce the existing business system so as to realize highly cost-effective security functions. This paper considers an actual case of information leakage as a model and systematically summarizes the conditions regarding security functions, based on the views of legal specialists. An actually introduced security system based on fingerprint identification is investigated, and it is shown that practical security measures can be established. A development configuration is then proposed in which part of the security system is placed in a data center and shared by multiple organizations. © 2007 Wiley Periodicals, Inc. Electron Comm Jpn Pt 3, 90(10): 54– 62, 2007; Published online in Wiley InterScience (www.interscience.wiley. com). DOI 10.1002/ecjc.20346","PeriodicalId":100407,"journal":{"name":"Electronics and Communications in Japan (Part III: Fundamental Electronic Science)","volume":"84 1","pages":"54-62"},"PeriodicalIF":0.0000,"publicationDate":"2007-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Electronics and Communications in Japan (Part III: Fundamental Electronic Science)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1002/ECJC.20346","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
指纹识别技术在防内幕信息泄露系统中的应用及其发展形式建议
商业组织周围的环境正在发生变化,例如开放式网络的发展和员工的灵活迁移。在这种变化的背景下,最近被认为更重要的是准备防止组织内部信息泄露的措施。其中,对现有业务系统进行加固,实现高性价比的安全功能,是普通组织急需解决的问题。本文以一个实际的信息泄露案例为模型,在法律专家观点的基础上,系统地总结了安全功能的条件。研究了一种实际引入的基于指纹识别的安全系统,并表明可以建立切实可行的安全措施。然后提出一种开发配置,其中安全系统的一部分放置在数据中心并由多个组织共享。©2007 Wiley期刊公司电子工程学报,2009,35 (3):444 - 444;在线发表于Wiley InterScience (www.interscience.wiley)。com)。DOI 10.1002 / ecjc.20346
本文章由计算机程序翻译,如有差异,请以英文原文为准。