The study on a convergence security service for manufacturing industries
- 183 Downloads
In the current global economic recession, the manufacturing industry, a backbone of national economy, is in danger of collapse. For manufacturing business, which has a large effect on national production and employment, to contribute to the growth of national economy, we should, among others, prepare a plan to prevent the leakage of high technology. However, since manufacturing businesses have different business processes, it is hard to work out a security measure. Accordingly, the present thesis has developed a convergence security service for business process of manufacturing industries. The new service answering the prayer of each business was developed as a security measure by building ontology in application of Semantic technology after analyzing the business process of manufacturing industries.
KeywordsIT convergence security service Manufacturing industry Technology leakage
Unable to display preview. Download preview PDF.
- 1.Booz, Allen, & Hamilton (2005). Convergence of enterprise security organizations. In The alliance for enterprise security risk management (AESRM), November 8, 2005. Google Scholar
- 2.Lee, C., Lee, S., Park, J.H., Hussain, S., & Song, J.H. (2010). Security analysis of pure DDP-based cipher proper for multimedia and ubiquitous device. 44, 267–279. Google Scholar
- 3.Deloitte (2007). The convergence of physical and information security in the context of enterprise risk management. In The alliance for enterprise security risk management, 2007. Google Scholar
- 4.Masmoudi, K., & Afifi, H. (2008). Building identity-based security associations for provider-provisioned virtual private networks, From the issue entitled “Special Issue: QoS, Control, and Security in Next Generation Networks”. 39, 215–222 Google Scholar
- 5.Pan, Z., & Heflin, J. (2003). DLDB: extending relational databases to support semantic web queries. In Workshop on practical and scaleable semantic web systems (pp. 109–113). Google Scholar
- 6.Tarkoma, S., Heikkinen, J., & Pohja, M. (2007). Secure push for mobile airline services, From the issue entitled “Special Issue: Security, Privacy and Trust in Beyond-3G Networks”. 35, 177–187 Google Scholar
- 7.van Renssen, A. S. H. P. (2005). Gellish: a generic extensible ontological language—design and application of a universal data structure. Doctoral Thesis, Delft University of Technology, the Netherlands, September 14. Google Scholar
- 8.W3C (2004). OWL Web Ontology Language Guide, http://www.w3.org/TR/2004/REC-owl-guide-20040210/.