메뉴 건너뛰기




Volumn 59, Issue 7, 2016, Pages 1076-1090

An end-to-end security approach for digital document management

Author keywords

digital document management; encryption; fingerprinting; insider threat tracing; security

Indexed keywords

ACCESS CONTROL; CRYPTOGRAPHY; INFORMATION SERVICES; LIFE CYCLE; NETWORK SECURITY;

EID: 84982279617     PISSN: 00104620     EISSN: 14602067     Source Type: Journal    
DOI: 10.1093/comjnl/bxw002     Document Type: Article
Times cited : (1)

References (51)
  • 1
    • 84982262818 scopus 로고    scopus 로고
    • Technical Report. Computer Emergency Response Team (CERT), Mass, EEUU
    • Kimberland, K. (2010). 2010 CybersecurityWatch Survey. Technical Report. Computer Emergency Response Team (CERT), Mass, EEUU
    • (2010) 2010 CybersecurityWatch Survey
    • Kimberland, K.1
  • 3
    • 77949791448 scopus 로고    scopus 로고
    • A review of digital watermarking techniques for text documents
    • ICIMT?09, Jeju Island, South Korea, December 16-18 IEEE, New Jersey, USA
    • Jalil, Z., and Mirza, A. (2009). A Review of Digital Watermarking Techniques for Text Documents. Int. Conf. Information, and Multimedia Technology. ICIMT?09, Jeju Island, South Korea, December 16-18, pp. 230-234. IEEE, New Jersey, USA
    • (2009) Int. Conf. Information, and Multimedia Technology , pp. 230-234
    • Jalil, Z.1    Mirza, A.2
  • 5
    • 0024931843 scopus 로고
    • Fifth Annual Computer Security Applications Conf. Tucson, AZ, December 4-8 IEEE, New Jersey, USA
    • Casey, T., Roe, M., Tuck, B., and Wilbur, S. (1989). Secure Automated Document delivery. Fifth Annual Computer Security Applications Conf., 1989, Tucson, AZ, December 4-8, pp. 348-356. IEEE, New Jersey, USA
    • (1989) Secure Automated Document Delivery , vol.1989 , pp. 348-356
    • Casey, T.1    Roe, M.2    Tuck, B.3    Wilbur, S.4
  • 7
    • 33745728510 scopus 로고    scopus 로고
    • 2005 IEEE Int. Conf. Information Reuse, and Integration, Las Vegas, NV, USA, August 15-17 IEEE, New Jersey, USA
    • Shi, J., and Ouyang, J. (2005). eSign: An Enterprise Portal for Secure Document Management. 2005 IEEE Int. Conf. Information Reuse, and Integration, Las Vegas, NV, USA, August 15-17, pp. 481-486. IEEE, New Jersey, USA
    • (2005) ESign: An Enterprise Portal for Secure Document Management , pp. 481-486
    • Shi, J.1    Ouyang, J.2
  • 8
    • 33749068906 scopus 로고    scopus 로고
    • The 6th Annual 2005 Int. Siberian Workshop, and Tutorials on Electron Devices, and Materials, Erlagol, Altai, Russia, July 1-3 IEEE, New Jersey, USA
    • Gerasimov, D. (2005). Creation of the System of Secure Document Circulation for State Organization. The 6th Annual 2005 Int. Siberian Workshop, and Tutorials on Electron Devices, and Materials, Erlagol, Altai, Russia, July 1-3, pp. 248-249. IEEE, New Jersey, USA
    • (2005) Creation of the System of Secure Document Circulation for State Organization , pp. 248-249
    • Gerasimov, D.1
  • 9
    • 71049147865 scopus 로고    scopus 로고
    • IEEE 10th Int. Enterprise Distributed Object Computing Conference Workshops 2006. EDOCW?06, Hong Kong, China, October 16-20 IEEE, New Jersey, USA
    • Kwok, T., and Nguyen, T. (2006). An Enterprise Electronic Contract Management System using Dual XML, and Secure PDF Documents. IEEE 10th Int. Enterprise Distributed Object Computing Conference Workshops, 2006. EDOCW?06, Hong Kong, China, October 16-20, pp. 57-60. IEEE, New Jersey, USA
    • (2006) An Enterprise Electronic Contract Management System Using Dual XML, and Secure PDF Documents , pp. 57-60
    • Kwok, T.1    Nguyen, T.2
  • 11
    • 71249087251 scopus 로고    scopus 로고
    • 10th ACIS Int. Conf. Software Engineering, Artificial Intelligences, Networking, and Parallel/Distributed Computing 2009. SNPD, Daegu, South Korea, May 27-29 IEEE, New Jersey, USA
    • Odagiri, K., Ishii, N., Yaegashi, R., and Tadauchi, M. (2009). A Distribution System of Document Medium with Copyright Protection. 10th ACIS Int. Conf. Software Engineering, Artificial Intelligences, Networking, and Parallel/Distributed Computing, 2009. SNPD, Daegu, South Korea, May 27-29, pp. 207-212. IEEE, New Jersey, USA
    • (2009) A Distribution System of Document Medium with Copyright Protection , pp. 207-212
    • Odagiri, K.1    Ishii, N.2    Yaegashi, R.3    Tadauchi, M.4
  • 12
    • 48349107806 scopus 로고    scopus 로고
    • Access control for xml document
    • Nguyen, N., Borzemski L., Grzech, A., and Ali, M. (eds Springer, Berlin, Germany
    • Bai, Y. (2008). Access Control for XML Document. In Nguyen, N., Borzemski, L., Grzech, A., and Ali, M. (eds), New Frontiers in Applied Artificial Intelligence, Lecture Notes in Computer Science 5027, pp. 621-630. Springer, Berlin, Germany
    • (2008) New Frontiers in Applied Artificial Intelligence, Lecture Notes in Computer Science , vol.5027 , pp. 621-630
    • Bai, Y.1
  • 15
    • 84900199367 scopus 로고    scopus 로고
    • Adobe White Paper. Adobe Systems Incorporated, California, USA
    • Adobe (2007) A Primer on Electronic Document Security. White Paper. Adobe Systems Incorporated, California, USA
    • (2007) A Primer on Electronic Document Security
  • 16
    • 84865354418 scopus 로고    scopus 로고
    • New system to fingerprint extensible markup language documents using winnowing theory
    • Darwish, S. (2012). New system to fingerprint extensible markup language documents using winnowing theory. Signal Process. IET, 6, 348-357
    • (2012) Signal Process. IET , vol.6 , pp. 348-357
    • Darwish, S.1
  • 17
    • 1142267351 scopus 로고    scopus 로고
    • The 2003 ACM SIGMOD Int. Conf. Management of Data, SIGMOD?03, San Diego, CA, June 9-12 ACM, New York, NY, USA
    • Schleimer, S., Wilkerson, D.S., and Aiken, A. (2003). Winnowing: Local Algorithms for Document Fingerprinting. The 2003 ACM SIGMOD Int. Conf. Management of Data, SIGMOD?03, San Diego, CA, June 9-12, pp. 76-85. ACM, New York, NY, USA
    • (2003) Winnowing: Local Algorithms for Document Fingerprinting , pp. 76-85
    • Schleimer, S.1    Wilkerson, D.S.2    Aiken, A.3
  • 19
    • 58349109703 scopus 로고    scopus 로고
    • The 9th Int. Conf. Young Computer Scientists CYCS, Shanghai, East China, November 18-21 IEEE, New Jersey, USA
    • Lu, P., Lu, Z., Zhou, Z., and Gu, J. (2008). An Optimized Natural Language Watermarking Algorithm based on TMR. The 9th Int. Conf. Young Computer Scientists CYCS, Shanghai, East China, November 18-21, pp. 1459-1463. IEEE, New Jersey, USA
    • (2008) An Optimized Natural Language Watermarking Algorithm Based on TMR , pp. 1459-1463
    • Lu, P.1    Lu, Z.2    Zhou, Z.3    Gu, J.4
  • 21
    • 84982290177 scopus 로고    scopus 로고
    • A method of text watermarking using presuppositions
    • Eduard, J., and Delp III, P.W. W. (eds IX, San Jose, CA, USA, January 29-February 1 SPIE, Bellingham, Washington, USA
    • Voybornova, O., and Macq, B. (2007). A Method of Text Watermarking Using Presuppositions. In Eduard, J., and Delp III, P.W. W. (eds), Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose, CA, USA, January 29-February 1, pp. 1-10. SPIE, Bellingham, Washington, USA
    • (2007) Security, Steganography, and Watermarking of Multimedia Contents , pp. 1-10
    • Voybornova, O.1    Macq, B.2
  • 23
    • 79551639722 scopus 로고    scopus 로고
    • 2008 Int. Conf. Computer Science, and Software Engineering, Wuhan, China, December 12-14 IEEE, New Jersey, USA
    • He, J., and Zhang, H. (2008). Digital Right Management Model based on Cryptography, and Digital Watermarking. 2008 Int. Conf. Computer Science, and Software Engineering, Wuhan, China, December 12-14, pp. 656-660. IEEE, New Jersey, USA
    • (2008) Digital Right Management Model Based on Cryptography, and Digital Watermarking , pp. 656-660
    • He, J.1    Zhang, H.2
  • 24
    • 79961225125 scopus 로고    scopus 로고
    • 2011 Int. Conf. Multimedia Computing, and Systems (ICMCS Ouarzazate, Morocco, April 7-9 IEEE, New Jersey, USA
    • Zaz, Y., and Fadil, L. (2011). Enhanced EPR Data Protection using Cryptography, and Digital Watermarking. 2011 Int. Conf. Multimedia Computing, and Systems (ICMCS), Ouarzazate, Morocco, April 7-9, pp. 1-5. IEEE, New Jersey, USA
    • (2011) Enhanced EPR Data Protection Using Cryptography, and Digital Watermarking , pp. 1-5
    • Zaz, Y.1    Fadil, L.2
  • 25
    • 79960762009 scopus 로고    scopus 로고
    • 2011 Conf. Network, and Information Systems Security (SAR-SSI La Rochelle, France, May 18-21 IEEE, New Jersey, USA
    • Schick, R., and Ruland, C. (2011). Document Tracking -on the Way to a New Security Service. 2011 Conf. Network, and Information Systems Security (SAR-SSI), La Rochelle, France, May 18-21, pp. 1-5. IEEE, New Jersey, USA
    • (2011) Document Tracking -on the Way to A New Security Service , pp. 1-5
    • Schick, R.1    Ruland, C.2
  • 28
    • 84976219767 scopus 로고    scopus 로고
    • The 1st Int. Workshop on Information Hiding, Cambridge, UK, May 30-June 1 Springer, Berlin
    • Handel, T.G., and Sandford II, M.T. (1996). Hiding Data in the OSI Network Model. The 1st Int. Workshop on Information Hiding, Cambridge, UK, May 30-June 1, pp. 23-38. Springer, Berlin
    • (1996) Hiding Data in the OSI Network Model , pp. 23-38
    • Handel, T.G.1    Sandford, I.I.M.T.2
  • 29
    • 84857824081 scopus 로고    scopus 로고
    • 2011 Nirma University Int. Conf. Engineering (NUiCONE India, December 8-10 IEEE, New Jersey, USA
    • Shah, M., and Patel, S. (2011). Network based Packet Watermarking using TCP/IP Protocol Suite. 2011 Nirma University Int. Conf. Engineering (NUiCONE), India, December 8-10, pp. 1-5. IEEE, New Jersey, USA
    • (2011) Network Based Packet Watermarking Using TCP/IP Protocol Suite , pp. 1-5
    • Shah, M.1    Patel, S.2
  • 30
    • 79952848974 scopus 로고    scopus 로고
    • The 2nd Annual ACM Conf. Multimedia Systems, MMSys?11, San Jose, CA, USA, February 23-25 ACM, New York, NY, USA
    • Hartung, F., Kesici, S., and Catrein, D. (2011). DRM Protected Dynamic Adaptive http Streaming. The 2nd Annual ACM Conf. Multimedia Systems, MMSys?11, San Jose, CA, USA, February 23-25, pp. 277-282. ACM, New York, NY, USA
    • (2011) DRM Protected Dynamic Adaptive Http Streaming , pp. 277-282
    • Hartung, F.1    Kesici, S.2    Catrein, D.3
  • 31
    • 33646062624 scopus 로고    scopus 로고
    • Data hiding in identification, and offset IP fields
    • Ramos, F., Larios Rosillo, V., and Unger, H. (eds Springer, Berlin, Germany
    • Cauich, E., Gómez Cárdenas, R., and Watanabe, R. (2005). Data Hiding in Identification, and Offset IP Fields. In Ramos, F., Larios Rosillo, V., and Unger, H. (eds), Advanced Distributed Systems, Lecture Notes in Computer Science 3563, pp. 118-125. Springer, Berlin, Germany
    • (2005) Advanced Distributed Systems, Lecture Notes in Computer Science , vol.3563 , pp. 118-125
    • Cauich, E.1    Gómez Cárdenas, R.2    Watanabe, R.3
  • 33
    • 84892622093 scopus 로고    scopus 로고
    • A collusion-resistant fingerprinting system for restricted distribution of digital documents
    • Munoz-Hernandez, M.D., Garcia-Hernandez, J.J., and Morales-Sandoval, M. (2013). A collusion-resistant fingerprinting system for restricted distribution of digital documents. PLoS ONE, 8, 1-14
    • (2013) Plos One , vol.8 , pp. 1-14
    • Munoz-Hernandez, M.D.1    Garcia-Hernandez, J.J.2    Morales-Sandoval, M.3
  • 34
    • 79955003733 scopus 로고    scopus 로고
    • Hierarchical spread spectrum fingerprinting scheme based on CDMA technique
    • Kuribayashi, M. (2011). Hierarchical spread spectrum fingerprinting scheme based on CDMA technique. EURASIP J. Inf. Secur., 2011, 1-16
    • (2011) EURASIP J. Inf. Secur , vol.2011 , pp. 1-16
    • Kuribayashi, M.1
  • 36
    • 84892577047 scopus 로고    scopus 로고
    • Adobe White Paper. Adobe Systems Incorporated. accessed September 28, 2013
    • Adobe (2010) Making the case PDF/A, and Adobe Acrobat. White Paper. Adobe Systems Incorporated. http://goo.gl/F4ZkL (accessed September 28, 2013
    • (2010) Making the Case PDF/A, and Adobe Acrobat
  • 37
    • 84982299178 scopus 로고    scopus 로고
    • Contract lifecycle management
    • accessed September 28, 2013
    • Gupta, R., Karayil, A., and Rajendran, R. (2008). Contract lifecycle management. White paper. Infosys. http://goo.gl/aEQj9 (accessed September 28, 2013
    • (2008) White Paper. Infosys
    • Gupta, R.1    Karayil, A.2    Rajendran, R.3
  • 40
    • 67649210855 scopus 로고    scopus 로고
    • Image encryption using DCT, and stream cipher
    • Krikor, L., Baba, S., Arif, T., and Shaaban, Z. (2009). Image encryption using DCT, and stream cipher. Eur. J. Sci. Res., 32, 48-58
    • (2009) Eur. J. Sci. Res , vol.32 , pp. 48-58
    • Krikor, L.1    Baba, S.2    Arif, T.3    Shaaban, Z.4
  • 41
    • 84982275844 scopus 로고    scopus 로고
    • A taxonomy of cryptographic techniques for securing electronic identity documents
    • Pohlmann, N., Reimer, H., and Schneider, W. (eds Springer, Germany
    • Schmeh, K. (2010). A Taxonomy of Cryptographic Techniques for Securing Electronic Identity Documents. In Pohlmann, N., Reimer, H., and Schneider, W. (eds), Securing Electronic Business Processes. Springer, Germany
    • (2010) Securing Electronic Business Processes
    • Schmeh, K.1
  • 44
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures, and public-key cryptosystems
    • Rivest, R.L., Shamir, A., and Adleman, L. (1978). A method for obtaining digital signatures, and public-key cryptosystems. Commun. ACM, 21, 120-126
    • (1978) Commun. ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 45
    • 78650240174 scopus 로고    scopus 로고
    • The advanced encryption standard
    • Stallings, W. (2002). The advanced encryption standard. Cryptologia, 26, 165-188
    • (2002) Cryptologia , vol.26 , pp. 165-188
    • Stallings, W.1
  • 46
    • 84982291173 scopus 로고    scopus 로고
    • National Institute of Standards Technology (NIST FIPS PUB 180-2
    • National Institute of Standards Technology (NIST) (2002) SHA-2 standard. FIPS PUB 180-2
    • (2002) SHA-2 Standard
  • 48
    • 20744449792 scopus 로고    scopus 로고
    • The design, and implementation of FFTW3
    • Frigo, M., and Johnson, S. (2005). The design, and implementation of FFTW3. Proc. IEEE, 93, 216-231
    • (2005) Proc. IEEE , vol.93 , pp. 216-231
    • Frigo, M.1    Johnson, S.2
  • 50
    • 84982296893 scopus 로고    scopus 로고
    • Independent JPEG Group accessed September 25, 2014
    • Independent JPEG Group (2014) Libjpeg. http://www.ijg.org/(accessed September 25, 2014
    • (2014) Libjpeg


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.