{"title":"An object-oriented security model for office environments","authors":"S. Castano, P. Samarati","doi":"10.1109/CCST.1992.253744","DOIUrl":null,"url":null,"abstract":"The authors present a security system for the protection of documents in an office information system. The system takes into consideration aspects of both dynamic changing of user activities and document sharing. The model the system is built on is based on the definition of role as a set of actions and responsibilities associated with a particular working activity. Access authorizations are specified according to roles. The role played by a user at a specific time identifies the working environment of the user and hence the operations that he/she can execute on documents. In modeling roles and documents the graph formalism and the inheritance mechanism are used. The use of an object-oriented programming language in the system realization allows an easy representation of the characteristics of the model.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"491 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.1992.253744","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
Abstract
The authors present a security system for the protection of documents in an office information system. The system takes into consideration aspects of both dynamic changing of user activities and document sharing. The model the system is built on is based on the definition of role as a set of actions and responsibilities associated with a particular working activity. Access authorizations are specified according to roles. The role played by a user at a specific time identifies the working environment of the user and hence the operations that he/she can execute on documents. In modeling roles and documents the graph formalism and the inheritance mechanism are used. The use of an object-oriented programming language in the system realization allows an easy representation of the characteristics of the model.<>