{"title":"Research issues in authorization models for hypertext systems","authors":"E. Bertino, P. Samarati","doi":"10.1109/NSPW.1995.492340","DOIUrl":null,"url":null,"abstract":"The proper characteristics of hypertext systems, such as absence of a schema, connections among the different \"chunks\" of information, and the possibility of navigating in the hypertext, make conventional authorization models inadequate for their protection. These characteristics on the one hand raise new protection requirements, thus making the problem of protection much harder; while on the other hand, they provide a flexibility in the specification of authorizations which is greater than in more structured data models. We are currently working on an authorization model for the protection of information in distributed hypertext systems. In this paper, we illustrate the new requirements that arise and discuss some of the issues we are currently investigating.","PeriodicalId":111230,"journal":{"name":"Proceedings of 1995 New Security Paradigms Workshop","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1995-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of 1995 New Security Paradigms Workshop","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NSPW.1995.492340","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
The proper characteristics of hypertext systems, such as absence of a schema, connections among the different "chunks" of information, and the possibility of navigating in the hypertext, make conventional authorization models inadequate for their protection. These characteristics on the one hand raise new protection requirements, thus making the problem of protection much harder; while on the other hand, they provide a flexibility in the specification of authorizations which is greater than in more structured data models. We are currently working on an authorization model for the protection of information in distributed hypertext systems. In this paper, we illustrate the new requirements that arise and discuss some of the issues we are currently investigating.