Abstract
With continuing security concerns for airport operations, the protection of internal operational protocols of an international airport has become more critical than ever before. Therefore, the Information Security System (ISS) was developed for Incheon International Airport which can protect the critical information related to airport operations. The developed ISS includes a document access control server/client agent, a user access control service linker, and an operational log file database. The ISS was developed in consideration of information life cycle of airport workflow. As a result, it can securely protect the computer system at Incheon International Airport by (1) performing real-time encoding of the users who accessed the protected files and folders, (2) limiting the user’s capability to edit the protected documents, (3) tracking transmitted files to the outside companies, (4) blocking the user’s access to portable storage devices, and (5) inserting security water marks on the printed outputs. With the implementation of the ISS, the real-time information system audit environment has been securely established at the Incheon International Airport Corporation.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
IIAC Newsletter, Issue 60 (May 2006)
Otwell, K., Aldridge, B.: The Role of Vulnerability in Risk Management. In: IEEE Proceedings of the 5th Annual Computer Security Applicant Conference, pp. 32–38 (1989)
Wagner, G.: Agent-Oriented Analysis and Design of Organizational Information Systems. In: Proc. of Fourth IEEE International Baltic Workshop on Databases and Information Systems, Vilnius (Lithuania) (May 2000)
Weiser, M.: The Computer for the 21st Century. Scientific American 265(3) (September 1991)
Suematsu, Y., Takadama, K., Nawa, N., Shimohara, K., Katai, O.: Analyzing levels of the microapproach and its implications in the agent-based simulation. In: Proceedings of the 6th International Conference on Complex Systems, Chuo University, Tokyo, Japan, pp. 44–51 (September 2002)
Wagner, G.: The Agent-Object-Relationship metamodel: Towards a uni-fied conceptual view of state and behavior. Technical report, Eindhoven Univ. of Technology, Fac. of Technology Management, Information Systems (May 2002), http://AOR.rezearch.info
Bellifemine, F., Poggi, A., Rimassa, G.: Developing Multi-agent Systems with JADE. In: Castelfranchi, C., Lespérance, Y. (eds.) ATAL 2000. LNCS (LNAI), vol. 1986, pp. 89–103. Springer, Heidelberg (2001)
Bergenti, F., Poggi, A.: Ubiquitous Information Agents. International Journal of Cooperative Information Systems 11(3-4), 231–244 (2002)
Ayesh, A., Bechkoum, K.: Framework of multi-agents internet security system. In: AI 2000. Appl Inform (2000)
Lalana, K., Tim, F., Anupam, J.: Developing secure agent systems using delegation based trust management. In: Falcone, R., Barber, S., Korba, L., Singh, M.P. (eds.) AAMAS 2002. LNCS (LNAI), vol. 2631, Springer, Heidelberg (2003)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chang, H., Kim, M., Kwon, Hj., Han, B. (2007). The Case Study of Information Security System for International Airports . In: Denko, M.K., et al. Emerging Directions in Embedded and Ubiquitous Computing. EUC 2007. Lecture Notes in Computer Science, vol 4809. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77090-9_3
Download citation
DOI: https://doi.org/10.1007/978-3-540-77090-9_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77089-3
Online ISBN: 978-3-540-77090-9
eBook Packages: Computer ScienceComputer Science (R0)