The Case Study of Information Security System for International Airports

With continuing security concerns for airport operations, the protection of internal operational protocols of an international airport has become more critical than ever before. Therefore, the Information Security System (ISS) was developed for Incheon International Airport which can protect the critical information related to airport operations. The developed ISS includes a document access control server/client agent, a user access control service linker, and an operational log file database. The ISS was developed in consideration of information life cycle of airport workflow. As a result, it can securely protect the computer system at Incheon International Airport by (1) performing realtime encoding of the users who accessed the protected files and folders, (2) limiting the user's capability to edit the protected documents, (3) tracking transmitted files to the outside companies, (4) blocking the user's access to portable storage devices, and (5) inserting security water marks on the printed outputs. With the implementation of the ISS, the real-time information system audit environment has been securely established at the Incheon International Airport Corporation.

[1]  Gerd Wagner,et al.  Agent-oriented analysis and design of organisational information systems , 2001 .

[2]  James H. Aylor,et al.  Computer for the 21st Century , 1999, Computer.

[3]  Timothy W. Finin,et al.  Developing Secure Agent Systems Using Delegation Based Trust Management , 2002, AAMAS 2002.

[4]  Bruce Aldridge,et al.  The role of vulnerability in risk management , 1989, [1989 Proceedings] Fifth Annual Computer Security Applications Conference.

[5]  Aladdin Ayesh,et al.  Framework of multi-agents internet security system , 2000 .

[6]  Agostino Poggi,et al.  Ubiquitous Information Agents , 2002, Int. J. Cooperative Inf. Syst..

[7]  Nicholas R. Jennings,et al.  Agent Theories, Architectures, and Languages: A Survey , 1995, ECAI Workshop on Agent Theories, Architectures, and Languages.

[8]  Rino Falcone,et al.  Trust, Reputation, and Security: Theories and Practice , 2003, Lecture Notes in Computer Science.

[9]  Agostino Poggi,et al.  Developing Multi-agent Systems with JADE , 2007, ATAL.