Study on Detection Technique of Privacy Distribution Route based on Interconnection of Security Documents and Transaction ID

Vol. 25, No. 6, pp. 1435-1448, Dec. 2015
10.13089/JKIISC.2015.25.6.1435, Full Text:
Keywords: Personal Information, DRM, Distribution channel, Systematic chains, Life-Cycle management
Abstract

Finance Companies are operating a security solution such as E-DRM(Enterprise-Digital Right Management), Personal information search, DLP(Data Loss Prevention), Security of printed paper, Internet network separation system, Privacy monitoring system for privacy leakage prevention by insiders. However, privacy leakages are occurring continuously and it is difficult to the association analysis about relating to the company's internal and external distribution of private document. Because log system operated in the separate and independent security solutions. This paper propose a systematic chains that can correlatively analyze business systems and log among heterogeneous security solutions organically and consistently based on security documents. Also, we suggest methods of efficient detection for Life-Cycle management plan about security documents that are created in the personal computer or by individual through the business system and distribution channel tracking about security documents contained privacy.

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
J. Shin and I. Kim, "Study on Detection Technique of Privacy Distribution Route based on Interconnection of Security Documents and Transaction ID," Journal of The Korea Institute of Information Security and Cryptology, vol. 25, no. 6, pp. 1435-1448, 2015. DOI: 10.13089/JKIISC.2015.25.6.1435.

[ACM Style]
Jae-ho Shin and In-seok Kim. 2015. Study on Detection Technique of Privacy Distribution Route based on Interconnection of Security Documents and Transaction ID. Journal of The Korea Institute of Information Security and Cryptology, 25, 6, (2015), 1435-1448. DOI: 10.13089/JKIISC.2015.25.6.1435.