指纹识别技术在防内幕信息泄露系统中的应用及其发展形式建议

Mitsuharu Kodama, T. Umezaki, Yukio Sato
{"title":"指纹识别技术在防内幕信息泄露系统中的应用及其发展形式建议","authors":"Mitsuharu Kodama, T. Umezaki, Yukio Sato","doi":"10.1002/ECJC.20346","DOIUrl":null,"url":null,"abstract":"Changes are occurring in the environment surrounding business organizations, such as the development of open networks and flexible migration of employees. In the context of such changes, it has recently been considered more important to prepare measures against information leaks from inside the organization. Among these, an urgent issue in ordinary organizations is to reinforce the existing business system so as to realize highly cost-effective security functions. This paper considers an actual case of information leakage as a model and systematically summarizes the conditions regarding security functions, based on the views of legal specialists. An actually introduced security system based on fingerprint identification is investigated, and it is shown that practical security measures can be established. A development configuration is then proposed in which part of the security system is placed in a data center and shared by multiple organizations. © 2007 Wiley Periodicals, Inc. Electron Comm Jpn Pt 3, 90(10): 54– 62, 2007; Published online in Wiley InterScience (www.interscience.wiley. com). DOI 10.1002/ecjc.20346","PeriodicalId":100407,"journal":{"name":"Electronics and Communications in Japan (Part III: Fundamental Electronic Science)","volume":"84 1","pages":"54-62"},"PeriodicalIF":0.0000,"publicationDate":"2007-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Application of fingerprint identification technology to systems against inside information leaks and a proposal for its development form\",\"authors\":\"Mitsuharu Kodama, T. Umezaki, Yukio Sato\",\"doi\":\"10.1002/ECJC.20346\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Changes are occurring in the environment surrounding business organizations, such as the development of open networks and flexible migration of employees. In the context of such changes, it has recently been considered more important to prepare measures against information leaks from inside the organization. Among these, an urgent issue in ordinary organizations is to reinforce the existing business system so as to realize highly cost-effective security functions. This paper considers an actual case of information leakage as a model and systematically summarizes the conditions regarding security functions, based on the views of legal specialists. An actually introduced security system based on fingerprint identification is investigated, and it is shown that practical security measures can be established. A development configuration is then proposed in which part of the security system is placed in a data center and shared by multiple organizations. © 2007 Wiley Periodicals, Inc. Electron Comm Jpn Pt 3, 90(10): 54– 62, 2007; Published online in Wiley InterScience (www.interscience.wiley. com). DOI 10.1002/ecjc.20346\",\"PeriodicalId\":100407,\"journal\":{\"name\":\"Electronics and Communications in Japan (Part III: Fundamental Electronic Science)\",\"volume\":\"84 1\",\"pages\":\"54-62\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Electronics and Communications in Japan (Part III: Fundamental Electronic Science)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1002/ECJC.20346\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Electronics and Communications in Japan (Part III: Fundamental Electronic Science)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1002/ECJC.20346","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

商业组织周围的环境正在发生变化,例如开放式网络的发展和员工的灵活迁移。在这种变化的背景下,最近被认为更重要的是准备防止组织内部信息泄露的措施。其中,对现有业务系统进行加固,实现高性价比的安全功能,是普通组织急需解决的问题。本文以一个实际的信息泄露案例为模型,在法律专家观点的基础上,系统地总结了安全功能的条件。研究了一种实际引入的基于指纹识别的安全系统,并表明可以建立切实可行的安全措施。然后提出一种开发配置,其中安全系统的一部分放置在数据中心并由多个组织共享。©2007 Wiley期刊公司电子工程学报,2009,35 (3):444 - 444;在线发表于Wiley InterScience (www.interscience.wiley)。com)。DOI 10.1002 / ecjc.20346
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Application of fingerprint identification technology to systems against inside information leaks and a proposal for its development form
Changes are occurring in the environment surrounding business organizations, such as the development of open networks and flexible migration of employees. In the context of such changes, it has recently been considered more important to prepare measures against information leaks from inside the organization. Among these, an urgent issue in ordinary organizations is to reinforce the existing business system so as to realize highly cost-effective security functions. This paper considers an actual case of information leakage as a model and systematically summarizes the conditions regarding security functions, based on the views of legal specialists. An actually introduced security system based on fingerprint identification is investigated, and it is shown that practical security measures can be established. A development configuration is then proposed in which part of the security system is placed in a data center and shared by multiple organizations. © 2007 Wiley Periodicals, Inc. Electron Comm Jpn Pt 3, 90(10): 54– 62, 2007; Published online in Wiley InterScience (www.interscience.wiley. com). DOI 10.1002/ecjc.20346
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Toward systematic generation of 3COL instances based on minimal unsolvable structures Two computational algorithms for deriving phase equations: Equivalence and some cautions A data‐driven processor for alleviating bottlenecks of sequential programs and maintaining multiprocessing capability Robust and adaptive merge of multiple range images with photometric attribute Autostereoscopic visualization of volume data using computer‐generated holograms
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1