DOI QR코드

DOI QR Code

Implementation of the Access Control System for Hangul Document System

한글 문서 접근 제어시스템 구현

  • Jang, Seung-Ju (Department of Computer Engineering, Dongeui University)
  • Received : 2017.11.09
  • Accepted : 2017.12.27
  • Published : 2018.02.28

Abstract

In this paper, we implemented an access control system that only allows specific users to use documents in Hangul document system. The system structure designed in this paper is to transform header information of Hangul document by analyzing the structure of Hangul document. By modifying the function of a specific field of the header information in Hangul document, it prevents users that do not have data for the modified information to open and view the document. By controlling the access rights to important Hangul documents, it is possible to manage Hangul files more safely. In this paper, the actual design of information was implemented and experiments were carried out. Results of the experiment confirmed that the access control system is operated in normal way. In this paper, we implemented an access control system that only allows specific users to use documents in Hangul document system.

본 논문은 한글 문서에서 허가된 사용자만 문서를 사용할 수 있도록 하는 접근 제어 시스템을 구현한다. 본 논문에서 구현하는 시스템은 한글 문서 헤드 정보를 특정 형식으로 변형 설계 및 구현한다. 한글 문서 헤더 정보에서 특정 필드의 기능을 특정 형식으로 만들어 접근 정보를 갖지 않은 사용자는 문서를 열어서 볼 수 없도록 한다. 접근 허용정보를 가진 사용자는 한글 파일에 접근이 가능하도록 한다. 이렇게 함으로써 중요한 한글 문서에 대한 접근 권한을 통제할 수 있도록 한다. 본 논문에서는 제안하는 내용에 대해서 구현하고 실험을 수행하였다. 실험을 수행한 결과 접근제어시스템이 정상적으로 잘 동작됨을 확인할 수 있었다.

Keywords

References

  1. M. Kudo, S. Hada, "XML document security based on provisional authorization," in CCS '00 Proceedings of the 7th ACM conference on Computer and communications security, pp. 87-96, 2012.
  2. J. O. Park, S. M. Lee, S. K. Kim, and M. S. Chun, "Implementation of Electronic Document Management System with Validation Period of Electronic Documents," Journal of the Korean Institute of Communications and Information Sciences. vol. 35, no. 7, pp.1043-1049, July 2010.
  3. Hangul and Computer, Text Document File Structure 5.0 [Internet] Available: http://www.hancom.com/etc/hwpDownload.do.
  4. T. Villwock, Verifiable check and security document system, US Patents US 20120162701 A1 to Thomas Villwock, 2012.
  5. J. S. Park and J. C. Ha, "Analysis of Vulnerability in Secure Document Management in Digital Multifunctional Devices and Their Solutions," Journal of Korean Institute of Information Technology, vol. 10, no. 6, pp. 133-14, June 2012.
  6. E. K. Kim, S. J. Jeon, J. H. Han, M. W. Lee, and S. J. Lee, "An effective detection method for hiding data in compound-document files," Journal of the Korea Institute of Information Security and Cryptology vol. 25, no. 6, pp. 1485-1494, Dec. 2015. https://doi.org/10.13089/JKIISC.2015.25.6.1485
  7. K. S. Seong, J. J. Kim, and H. S. Oh, "System Design for the Safe store and Issue Service Assurance of the E-Document," Journal of the Korean Society of Computer and Information, vol. 13, no. 6, pp.173-180, Nov. 2008.
  8. K.. Gu, H. Li, G. Sun, "Document Security Identification Based on Multi-classifier," in ATCI 2017: International Conference on Applications and Techniques in Cyber Security and Intelligence, pp. 122-127, 21 2017.
  9. J. H. Shin, and I. S. Kim, "Study on Detection Technique of Privacy Distribution Route based on Interconnection of Security Documents and Transaction ID," Journal of the Korea Institute of Information Security and Cryptology, vol. 25, no. 6, pp.1435-1447, Dec. 2015. https://doi.org/10.13089/JKIISC.2015.25.6.1435
  10. S. P. Hong and C. S. Lee, "A Study on Verification of Validity Encrypted XML Documents," Journal of Korea Institute of Electronic Communication Sciences, vol. 9, no. 2, pp. 95-98. Nov. 2015.
  11. S. J. Jang, "Developing File Security for Windows Operating System", Journal of the Korea Institute of Information and Communication Engineering, vol. 14, no. 6, pp. 1423-1428, Jun. 2010. https://doi.org/10.6109/jkiice.2010.14.6.1423
  12. S. H. Kim, J. Yoo, "A Study on Prediction of Malicious Code Infectionin Websites Using Markov Chain", Journal of Security Engineering, vol. 14, no. 1, pp. 9-20, Feb. 2017. https://doi.org/10.14257/jse.2017.02.02