{"title":"面向对象的办公环境安全模型","authors":"S. Castano, P. Samarati","doi":"10.1109/CCST.1992.253744","DOIUrl":null,"url":null,"abstract":"The authors present a security system for the protection of documents in an office information system. The system takes into consideration aspects of both dynamic changing of user activities and document sharing. The model the system is built on is based on the definition of role as a set of actions and responsibilities associated with a particular working activity. Access authorizations are specified according to roles. The role played by a user at a specific time identifies the working environment of the user and hence the operations that he/she can execute on documents. In modeling roles and documents the graph formalism and the inheritance mechanism are used. The use of an object-oriented programming language in the system realization allows an easy representation of the characteristics of the model.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"491 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"An object-oriented security model for office environments\",\"authors\":\"S. Castano, P. Samarati\",\"doi\":\"10.1109/CCST.1992.253744\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The authors present a security system for the protection of documents in an office information system. The system takes into consideration aspects of both dynamic changing of user activities and document sharing. The model the system is built on is based on the definition of role as a set of actions and responsibilities associated with a particular working activity. Access authorizations are specified according to roles. The role played by a user at a specific time identifies the working environment of the user and hence the operations that he/she can execute on documents. In modeling roles and documents the graph formalism and the inheritance mechanism are used. The use of an object-oriented programming language in the system realization allows an easy representation of the characteristics of the model.<<ETX>>\",\"PeriodicalId\":105477,\"journal\":{\"name\":\"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures\",\"volume\":\"491 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1992-10-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCST.1992.253744\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.1992.253744","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An object-oriented security model for office environments
The authors present a security system for the protection of documents in an office information system. The system takes into consideration aspects of both dynamic changing of user activities and document sharing. The model the system is built on is based on the definition of role as a set of actions and responsibilities associated with a particular working activity. Access authorizations are specified according to roles. The role played by a user at a specific time identifies the working environment of the user and hence the operations that he/she can execute on documents. In modeling roles and documents the graph formalism and the inheritance mechanism are used. The use of an object-oriented programming language in the system realization allows an easy representation of the characteristics of the model.<>