TY - GEN
T1 - Design and implementation of document access control model based on role and security policy
AU - Mao, Liangjian
AU - Yao, Shuzhen
AU - Zhang, Kai
AU - Sakurai, Kouichi
N1 - Funding Information:
This paper is supported by the National Defense Basic Scientific Research Program of China under grant No. A2120061061, which was accomplished in Software Engineering Institute of BeiHang University.
PY - 2011
Y1 - 2011
N2 - To design a method of document access control with flexibility, generality and fine-granularity, we establish a document access control model, which is an abstract description for general scene of document access. Security policies are presented to describe security constraints, so as to meet security requirements of this model. In order to demonstrate the theories and strategies more intuitively, we design a prototype system of document access control based on XACML-RBAC framework to verify the validity of model and algorithms and the feasibility of mechanism. It realizes the authorization protection of the standard OFFICE documents.
AB - To design a method of document access control with flexibility, generality and fine-granularity, we establish a document access control model, which is an abstract description for general scene of document access. Security policies are presented to describe security constraints, so as to meet security requirements of this model. In order to demonstrate the theories and strategies more intuitively, we design a prototype system of document access control based on XACML-RBAC framework to verify the validity of model and algorithms and the feasibility of mechanism. It realizes the authorization protection of the standard OFFICE documents.
UR - http://www.scopus.com/inward/record.url?scp=82055200288&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=82055200288&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-25283-9_2
DO - 10.1007/978-3-642-25283-9_2
M3 - Conference contribution
AN - SCOPUS:82055200288
SN - 9783642252822
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 26
EP - 36
BT - Trusted Systems - Second International Conference, INTRUST 2010, Revised Selected Papers
T2 - 2nd International Conference on Trusted Systems, INTRUST 2010
Y2 - 13 December 2010 through 15 December 2010
ER -