DOI QR코드

DOI QR Code

Indirection based Multilevel Security Model and Application of Rehabilitation Psychology Analysis System

재활심리분석시스템의 다중 우회기반 접근통제 모델 및 응용

  • Kim, Young-Soo (Research and Business Foundation, Korea Nazarene University) ;
  • Jo, Sun-Goo (Department of Hotel & Tourism Management, Korea Nazarene University)
  • Received : 2013.08.07
  • Accepted : 2013.09.17
  • Published : 2013.10.31

Abstract

These days, Rehabilitation psychology analysis system is being used by world wide web in everyday's life. And on the other hand, we are facing spam messages' problems. To block these spam message, we are using filtering or pricing systems. But these solutions are raising other problems such as impediment in reception or availability caused by false positive or payment resistance. To solve these problems, we propose an Indirect Model on Message Control System(IMMCS) which controls an unsolicited message and prevents an useful message from discarding. We design and implement the IMMCS to enhance the usefulness and the availability. Being tested the IMMCS to verify the usability and the efficiency, it gave us a very successful result.

재활심리분석시스템으로서 웹이 보편적으로 사용되면서 스팸메시지가 급격히 증가하고 있다. 이의 억제를 위한 메시지통제시스템은 기술적이고 경제적 대안으로 필터시스템과 과금 시스템을 사용하고 있으나 차단오류와 과금저항으로 인한 메시지의 수신과 가용성을 제한한다. 이의 해결을 위해서 불법적인 메시지는 억제하지만 송 수신자에게 유익하고 합법적인 메시지가 폐기되고 상실되는 것을 방지할 수 있는 메시지통제시스템의 우회 모델을 제안하고 이를 사용하여 메시지의 유용성과 가용성을 높여줄 수 있는 웹기반의 메시지통제시스템을 구현하여 모델의 실용성을 검증하였다.

Keywords

References

  1. Abadi, M. et al., "Certified E-mail with a light on Line Trusted Third Party: Design and Implementation," Proceedings of the Eleventh International World Wide Web Conference, Vol.2, pp.387-395, May, 2002.
  2. Pollock, S. "A Rule-Based Message Filtering System," ACM Transactions on Office Information Systems, vol. 6, no. 3, pp.232-254, July 1988. https://doi.org/10.1145/45945.214327
  3. Cynthia, D. and N, Moni "Pricing via processing or combatting junk mail," In Proceedings of Advances in Cryptology - CRYPTO' 92, pp 139-147, 1992.
  4. Wendy E. Mackay, "Diversity in the Use of Electronic Mail:A preliminary Inquiry," ACM Transactions on Office Information Systems, vol. 6, no. 4, pp.380-397, Oct. 1988. https://doi.org/10.1145/58566.58567
  5. Lawrence E. Hughes, "Internet E-mail; Protocols, Standards, and Implementation," Artech House, 1998.
  6. Young soo, kim, "Design and Implementation of Authentication Protocol in the Message Security System," Ph.D. of MIS Paper, Kookmin University, 2003.
  7. David A. Turner, Daniel M. Havey, Controlling spam through lightweight currency," In Proceedings of the Hawaii International Conference on Computer Sciences, pp.1-9, 2003.
  8. Jajodia, S., et al., "Flexible Support for Multiple Access control Policies," ACM Trans. on Database Systems, vol. 26, no. 2, pp. 214-260, June 2001. https://doi.org/10.1145/383891.383894
  9. Sandhu, R., et al., "Role Based Access Control Models," IEEE Computer, vol. 29, no. 2, pp. 38-47, Feb. 1996.
  10. Yao. C., "Theory and applications of trapdoor functions," in Proceedings of the Twenty-Third Annual IEEE Symposium on Foundations of Computer Science, pp. 80-91, 1982.
  11. Telang, R. "Information Overload and Pricing of Communication Services," Carnegie Mellon University Working Paper, 2002.
  12. Fahlman, S., "A way to control unwanted E-mail and telephone calls," IBM Systems Journal, vol. 41, no. 4, pp.759-766, June, 2002. https://doi.org/10.1147/sj.414.0759
  13. Hoffman, P. "SMTP service extension for secure SMTP over Transport Layer Security," IETF, RFC3207, Feb. 2002.
  14. Jonscher, D., R, Dittrich, "A Configurable Access Control System Interoperable Environment," In Proceedings of the ninth annual IFIP TC11 WG11.3 working conference on Database security IX, pp43-60, 1996.
  15. Joshi, J.B.D. et al., "Security Models for Web-based Applications," Communications of the ACM, vol. 44, no. 2, pp. 38-44, Feb. 2001.

Cited by

  1. 분석단계에서 접근 통제의 보안 요건 정의 vol.19, pp.11, 2013, https://doi.org/10.9708/jksci.2014.19.11.097