Skip to main content
Log in

The study on a convergence security service for manufacturing industries

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

In the current global economic recession, the manufacturing industry, a backbone of national economy, is in danger of collapse. For manufacturing business, which has a large effect on national production and employment, to contribute to the growth of national economy, we should, among others, prepare a plan to prevent the leakage of high technology. However, since manufacturing businesses have different business processes, it is hard to work out a security measure. Accordingly, the present thesis has developed a convergence security service for business process of manufacturing industries. The new service answering the prayer of each business was developed as a security measure by building ontology in application of Semantic technology after analyzing the business process of manufacturing industries.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. Booz, Allen, & Hamilton (2005). Convergence of enterprise security organizations. In The alliance for enterprise security risk management (AESRM), November 8, 2005.

    Google Scholar 

  2. Lee, C., Lee, S., Park, J.H., Hussain, S., & Song, J.H. (2010). Security analysis of pure DDP-based cipher proper for multimedia and ubiquitous device. 44, 267–279.

  3. Deloitte (2007). The convergence of physical and information security in the context of enterprise risk management. In The alliance for enterprise security risk management, 2007.

    Google Scholar 

  4. Masmoudi, K., & Afifi, H. (2008). Building identity-based security associations for provider-provisioned virtual private networks, From the issue entitled “Special Issue: QoS, Control, and Security in Next Generation Networks”. 39, 215–222

  5. Pan, Z., & Heflin, J. (2003). DLDB: extending relational databases to support semantic web queries. In Workshop on practical and scaleable semantic web systems (pp. 109–113).

    Google Scholar 

  6. Tarkoma, S., Heikkinen, J., & Pohja, M. (2007). Secure push for mobile airline services, From the issue entitled “Special Issue: Security, Privacy and Trust in Beyond-3G Networks”. 35, 177–187

  7. van Renssen, A. S. H. P. (2005). Gellish: a generic extensible ontological language—design and application of a universal data structure. Doctoral Thesis, Delft University of Technology, the Netherlands, September 14.

  8. W3C (2004). OWL Web Ontology Language Guide, http://www.w3.org/TR/2004/REC-owl-guide-20040210/.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hangbae Chang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Kang, J., Lee, J., Hwang, C. et al. The study on a convergence security service for manufacturing industries. Telecommun Syst 52, 1389–1397 (2013). https://doi.org/10.1007/s11235-011-9651-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-011-9651-9

Keywords