2006
DOI: 10.1007/11766155_25
|View full text |Cite
|
Sign up to set email alerts
|

Controlling Access to Documents: A Formal Access Control Model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2006
2006
2016
2016

Publication Types

Select...
3
2
1

Relationship

3
3

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 16 publications
0
6
0
Order By: Relevance
“…Thus, the model should be generic enough to take all objects into account. Importance of a generic model is addressed in . Object abstraction: Presence of a very large number of objects (both complete object and subparts) necessitates some abstraction for object, which allows implicit permission assignment. Ease of administration: This follows from the previous point. More the number of rules to be written for defining object permissions to user, more are the chances of error.…”
Section: Related Workmentioning
confidence: 99%
“…Thus, the model should be generic enough to take all objects into account. Importance of a generic model is addressed in . Object abstraction: Presence of a very large number of objects (both complete object and subparts) necessitates some abstraction for object, which allows implicit permission assignment. Ease of administration: This follows from the previous point. More the number of rules to be written for defining object permissions to user, more are the chances of error.…”
Section: Related Workmentioning
confidence: 99%
“…In a companion paper [34], we have applied CSP-OZ to specifying access control for documents, modeled as attributed trees. The full specification comprises around 25 pages and is given in [33].…”
Section: Discussionmentioning
confidence: 99%
“…This shows that CSP-OZ is a good starting point not only for specifying security automata, but also for exploring and interrelating different points in the security-design space. In a companion paper [34], we have applied CSP-OZ to a larger example, specifying a system for secure document processing.…”
Section: Introductionmentioning
confidence: 99%
“…In previous work [23,24,25], we developed an access-control system for documents. Standard operating system security mechanisms can be used to ensure that the system is not tampered with within an enterprise.…”
Section: Fig 5 Key Distributionmentioning
confidence: 99%