{"title":"基于上下文感知安全的网络安全体系结构和应用","authors":"Hoon Ko, Chang Choi, Pankoo Kim, Junho Choi","doi":"10.5121/CSIT.2019.90308","DOIUrl":null,"url":null,"abstract":"The number of services and smart devices which require context is increasing, and there is a clear need for new security policies which provide security that is convenient and flexible for the user. In particular, there is an urgent need for new security policies regarding IT vulnerability layers for children, the elderly, and the disabled who experience many difficulties using current security technology. For a convenient and flexible security policy, it is necessary to collect and analyze data such as user service use patterns, locations, etc., which can be used to distinguish attack contexts and define a security service provision technology which is suitable to the user. This study has designed a user context-aware network security architecture which reflects the aforementioned requirements, collected user context-aware data, studied a user context analysis platform, and studied and analyzed context-aware security applications.","PeriodicalId":372948,"journal":{"name":"Computer Science & Information Technology (CS & IT )","volume":"89 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"NETWORK SECURITY ARCHITECTURE AND APPLICATIONS BASED ON CONTEXT-AWARE SECURITY\",\"authors\":\"Hoon Ko, Chang Choi, Pankoo Kim, Junho Choi\",\"doi\":\"10.5121/CSIT.2019.90308\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The number of services and smart devices which require context is increasing, and there is a clear need for new security policies which provide security that is convenient and flexible for the user. In particular, there is an urgent need for new security policies regarding IT vulnerability layers for children, the elderly, and the disabled who experience many difficulties using current security technology. For a convenient and flexible security policy, it is necessary to collect and analyze data such as user service use patterns, locations, etc., which can be used to distinguish attack contexts and define a security service provision technology which is suitable to the user. This study has designed a user context-aware network security architecture which reflects the aforementioned requirements, collected user context-aware data, studied a user context analysis platform, and studied and analyzed context-aware security applications.\",\"PeriodicalId\":372948,\"journal\":{\"name\":\"Computer Science & Information Technology (CS & IT )\",\"volume\":\"89 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-03-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Science & Information Technology (CS & IT )\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5121/CSIT.2019.90308\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Science & Information Technology (CS & IT )","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5121/CSIT.2019.90308","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
NETWORK SECURITY ARCHITECTURE AND APPLICATIONS BASED ON CONTEXT-AWARE SECURITY
The number of services and smart devices which require context is increasing, and there is a clear need for new security policies which provide security that is convenient and flexible for the user. In particular, there is an urgent need for new security policies regarding IT vulnerability layers for children, the elderly, and the disabled who experience many difficulties using current security technology. For a convenient and flexible security policy, it is necessary to collect and analyze data such as user service use patterns, locations, etc., which can be used to distinguish attack contexts and define a security service provision technology which is suitable to the user. This study has designed a user context-aware network security architecture which reflects the aforementioned requirements, collected user context-aware data, studied a user context analysis platform, and studied and analyzed context-aware security applications.