@article{ART001914301},
author={SeongYoon Shin and KangHo-Lee},
title={A Study of Definition of Security Requirements on Encryption and Audit Logging},
journal={Journal of The Korea Society of Computer and Information},
issn={1598-849X},
year={2014},
volume={19},
number={9},
pages={85-91}
TY - JOUR
AU - SeongYoon Shin
AU - KangHo-Lee
TI - A Study of Definition of Security Requirements on Encryption and Audit Logging
JO - Journal of The Korea Society of Computer and Information
PY - 2014
VL - 19
IS - 9
PB - The Korean Society Of Computer And Information
SP - 85
EP - 91
SN - 1598-849X
AB - Encryption is a method to convert information to no-sense code in order to prevent data frombeing lost or altered by use of illegal means. Audit logging creates audit log of users’ activities,exceptions, and information security events, and then conserves it for a certain period forinvestigation and access-control auditing. Our paper suggests that confidentiality and integrity ofinformation should be guaranteed when transmitting and storing important information inencryption. Encryption should consider both one-way encryption and two-way one and thatencryption key should assure security. Also, all history related to electronic financial transactions should be logged and kept. And, it should be considered to check the details of application accesslog and major information. In this paper, we take a real example of encryption and log audit forsafe data transmission and periodic check.
KW - Encryption;Audit Logging;Confidentiality;Integrity;Access Contro
DO -
UR -
ER -
SeongYoon Shin and KangHo-Lee. (2014). A Study of Definition of Security Requirements on Encryption and Audit Logging. Journal of The Korea Society of Computer and Information, 19(9), 85-91.
SeongYoon Shin and KangHo-Lee. 2014, "A Study of Definition of Security Requirements on Encryption and Audit Logging", Journal of The Korea Society of Computer and Information, vol.19, no.9 pp.85-91.
SeongYoon Shin, KangHo-Lee "A Study of Definition of Security Requirements on Encryption and Audit Logging" Journal of The Korea Society of Computer and Information 19.9 pp.85-91 (2014) : 85.
SeongYoon Shin, KangHo-Lee. A Study of Definition of Security Requirements on Encryption and Audit Logging. 2014; 19(9), 85-91.
SeongYoon Shin and KangHo-Lee. "A Study of Definition of Security Requirements on Encryption and Audit Logging" Journal of The Korea Society of Computer and Information 19, no.9 (2014) : 85-91.
SeongYoon Shin; KangHo-Lee. A Study of Definition of Security Requirements on Encryption and Audit Logging. Journal of The Korea Society of Computer and Information, 19(9), 85-91.
SeongYoon Shin; KangHo-Lee. A Study of Definition of Security Requirements on Encryption and Audit Logging. Journal of The Korea Society of Computer and Information. 2014; 19(9) 85-91.
SeongYoon Shin, KangHo-Lee. A Study of Definition of Security Requirements on Encryption and Audit Logging. 2014; 19(9), 85-91.
SeongYoon Shin and KangHo-Lee. "A Study of Definition of Security Requirements on Encryption and Audit Logging" Journal of The Korea Society of Computer and Information 19, no.9 (2014) : 85-91.