The scheme of 3-level authentication mechanism for preventing internal information leakage

Author(s):  
Sang-Pil Cheon ◽  
Jung-Min Kang ◽  
Min-Woo Park ◽  
Jung-Ho Eom
Author(s):  
Guehee Kim ◽  
Yoshio Suzuki ◽  
Naoya Teshima

Network computing infrastructure for sharing tools and data was implemented to support international collaboration. In designing the system, we focused on three issues: accessibility, security, and usability. In the implementation, we integrated existing network and web technologies into the infrastructure by introducing the authentication gateway. For the first issue, SSL-VPN (Security Socket Layer – Virtual Private Network) technology was adopted to access computing resources beyond firewalls. For the second issue, PKI (Public Key Infrastructure)-based authentication mechanism was used for access control. Shared key based file encryption was also used to protect against information leakage. The introduction of the authentication gateway enables to strengthen the security. To provide high usability, WebDAV (Web-based Distributed Authoring and Versioning) was used to provide users with a function to manipulate distributed files through a windows-like GUI (Graphical User Interface). These functions were integrated into a Grid infrastructure called AEGIS (Atomic Energy Grid InfraStructure). Web applications were developed on the infrastructure for dynamic community creation and information sharing. In this paper, we discuss design issues of the system and report the implementation of a prototype applied to share information for the international project GNEP (Global Nuclear Energy Partnership).


With the size of the enterprise network is growing, more and more computer terminals, internal information leakage and security threats emerging security incidents and daily management to bring a lot of pressure. Business users need a tracking system to address these security issues.A technique and framework for checking and following the exercises of a client of a PC. Affiliations are set up between the conditions of certain PC framework parameters and explicit exercises. The present movement of the client is then definite by the framework dependent on the present condition of the PC framework. As the condition of the PC framework changes, changes in the client's action are checked and followed. The exercises are followed related to time in order to record the time spent on every movement.Through this project we are developing the understanding of the working and the basics of the Linux operating system. We are analysing the need of monitoring the system and solving the issues related to security, unauthorised access and other threats. Through this tool we are trying to address these issues.


2012 ◽  
Vol E95.C (6) ◽  
pp. 1089-1097 ◽  
Author(s):  
Yu-ichi HAYASHI ◽  
Naofumi HOMMA ◽  
Takaaki MIZUKI ◽  
Takeshi SUGAWARA ◽  
Yoshiki KAYANO ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document