The Case Study of Information Security System for International Airports

  • Hangbae Chang
  • Moonoh Kim
  • Hyuk-jun Kwon
  • Byungwan Han
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4809)

Abstract

With continuing security concerns for airport operations, the protection of internal operational protocols of an international airport has become more critical than ever before. Therefore, the Information Security System (ISS) was developed for Incheon International Airport which can protect the critical information related to airport operations. The developed ISS includes a document access control server/client agent, a user access control service linker, and an operational log file database. The ISS was developed in consideration of information life cycle of airport workflow. As a result, it can securely protect the computer system at Incheon International Airport by (1) performing real-time encoding of the users who accessed the protected files and folders, (2) limiting the user’s capability to edit the protected documents, (3) tracking transmitted files to the outside companies, (4) blocking the user’s access to portable storage devices, and (5) inserting security water marks on the printed outputs. With the implementation of the ISS, the real-time information system audit environment has been securely established at the Incheon International Airport Corporation.

References

  1. 1.
    IIAC Newsletter, Issue 60 (May 2006)Google Scholar
  2. 2.
    Otwell, K., Aldridge, B.: The Role of Vulnerability in Risk Management. In: IEEE Proceedings of the 5th Annual Computer Security Applicant Conference, pp. 32–38 (1989)Google Scholar
  3. 3.
    Wagner, G.: Agent-Oriented Analysis and Design of Organizational Information Systems. In: Proc. of Fourth IEEE International Baltic Workshop on Databases and Information Systems, Vilnius (Lithuania) (May 2000)Google Scholar
  4. 4.
    Weiser, M.: The Computer for the 21st Century. Scientific American 265(3) (September 1991)Google Scholar
  5. 5.
    Suematsu, Y., Takadama, K., Nawa, N., Shimohara, K., Katai, O.: Analyzing levels of the microapproach and its implications in the agent-based simulation. In: Proceedings of the 6th International Conference on Complex Systems, Chuo University, Tokyo, Japan, pp. 44–51 (September 2002)Google Scholar
  6. 6.
    Wagner, G.: The Agent-Object-Relationship metamodel: Towards a uni-fied conceptual view of state and behavior. Technical report, Eindhoven Univ. of Technology, Fac. of Technology Management, Information Systems (May 2002), http://AOR.rezearch.info
  7. 7.
    Bellifemine, F., Poggi, A., Rimassa, G.: Developing Multi-agent Systems with JADE. In: Castelfranchi, C., Lespérance, Y. (eds.) ATAL 2000. LNCS (LNAI), vol. 1986, pp. 89–103. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  8. 8.
    Bergenti, F., Poggi, A.: Ubiquitous Information Agents. International Journal of Cooperative Information Systems 11(3-4), 231–244 (2002)CrossRefGoogle Scholar
  9. 9.
    Ayesh, A., Bechkoum, K.: Framework of multi-agents internet security system. In: AI 2000. Appl Inform (2000)Google Scholar
  10. 10.
    Lalana, K., Tim, F., Anupam, J.: Developing secure agent systems using delegation based trust management. In: Falcone, R., Barber, S., Korba, L., Singh, M.P. (eds.) AAMAS 2002. LNCS (LNAI), vol. 2631, Springer, Heidelberg (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Hangbae Chang
    • 1
  • Moonoh Kim
    • 2
  • Hyuk-jun Kwon
    • 2
  • Byungwan Han
    • 3
  1. 1.Daejin University, San 11-1 Sundan Dong, Pocheon Si, Gyonggi Do, 487-711Korea
  2. 2.Yonsei University, 134 Sinchon-Dong, Seodaemun-Gu, Seoul, 120-749Korea
  3. 3.Tongwon College, Sinchon Ri, Silchon Eup, Gwanju-Si, Gyonggi Doul, 464-711Korea

Personalised recommendations