{"title":"基于LDAP的防止工业秘密泄露的研究","authors":"Do Hyeong Kim","doi":"10.1109/ICISA.2010.5480303","DOIUrl":null,"url":null,"abstract":"This study researched into the method that allows only the certified user and computational engineer to possibly use network resources and computing resources by implementing the system of the intensified certification and security based on LDAP(Lightweight Directory Access Protocol) directory service, that copes with incapacitation in security program due to making the security program forcibly installed, and that can correctly track down the industrial-secret exporter along with applying the user-based security policy through inter-working with the existing method for the protection of industrial secret. Through this study, the intensified method for the protection of industrial secret can be embodied by implementing the integrated infra system through strengthening the existing system of managing the protection of industrial secret, and through supplementing vulnerability to the method for the protection of industrial secret.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Study on Prevention of the Leaking of Industrial Secret Based on LDAP\",\"authors\":\"Do Hyeong Kim\",\"doi\":\"10.1109/ICISA.2010.5480303\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This study researched into the method that allows only the certified user and computational engineer to possibly use network resources and computing resources by implementing the system of the intensified certification and security based on LDAP(Lightweight Directory Access Protocol) directory service, that copes with incapacitation in security program due to making the security program forcibly installed, and that can correctly track down the industrial-secret exporter along with applying the user-based security policy through inter-working with the existing method for the protection of industrial secret. Through this study, the intensified method for the protection of industrial secret can be embodied by implementing the integrated infra system through strengthening the existing system of managing the protection of industrial secret, and through supplementing vulnerability to the method for the protection of industrial secret.\",\"PeriodicalId\":313762,\"journal\":{\"name\":\"2010 International Conference on Information Science and Applications\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-04-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on Information Science and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICISA.2010.5480303\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Information Science and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICISA.2010.5480303","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Study on Prevention of the Leaking of Industrial Secret Based on LDAP
This study researched into the method that allows only the certified user and computational engineer to possibly use network resources and computing resources by implementing the system of the intensified certification and security based on LDAP(Lightweight Directory Access Protocol) directory service, that copes with incapacitation in security program due to making the security program forcibly installed, and that can correctly track down the industrial-secret exporter along with applying the user-based security policy through inter-working with the existing method for the protection of industrial secret. Through this study, the intensified method for the protection of industrial secret can be embodied by implementing the integrated infra system through strengthening the existing system of managing the protection of industrial secret, and through supplementing vulnerability to the method for the protection of industrial secret.