Corcoran, 2000 - Google Patents
Combining provenance and security policies in a web-based document management systemCorcoran, 2000
View HTML- Document ID
- 381709509540854867
- Author
- Corcoran B
- Publication year
External Links
Snippet
This research explores the intersection of provenance and security policies within a web- based document management system called the Collaborative Planning Application (CPA). Utilizing the SELINKS programming language, which supports label-based security policies …
- 230000003993 interaction 0 abstract description 5
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/22—Manipulating or registering by use of codes, e.g. in sequence of text characters
- G06F17/2288—Version control
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/3089—Web site content organization and management, e.g. publishing, automatic linking or maintaining pages
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/24—Editing, e.g. insert/delete
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30011—Document retrieval systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30943—Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
- G06F17/30946—Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type indexing structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2145—Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7729876B2 (en) | Protecting sensitive data in documents | |
US7984513B1 (en) | Method and system for using a rules engine for enforcing access and usage policies in rights-aware applications | |
US20060149735A1 (en) | Automated records management with enforcement of a mandatory minimum retention record | |
Hajba | Website Scraping with Python | |
Król et al. | Peculiarity of the bit rot and link rot phenomena | |
Krishnamurthi | The CONTINUE server (or, How I administered PADL 2002 and 2003) | |
Corcoran | Combining provenance and security policies in a web-based document management system | |
Karabiyik | Building an intelligent assistant for digital forensics | |
US20030106023A1 (en) | Electronic virtual components description import in intranet catalogs | |
Bell et al. | Underscoring archival authenticity with blockchain technology | |
Dimitrov et al. | Types of dark data and hidden cybersecurity risks | |
Anderson | Data scalability in open hypermedia systems | |
Glennan | The New RDA Toolkit: Everything Has Changed or Has It | |
Buckley et al. | Electronic Publishing of Scholarly Journals: A Bibliographic Essay of Current Issues: Theme: Electronic Journals in Science and Technology Libraries | |
Moore et al. | Assessment of RLG trusted digital repository requirements | |
JP5632753B2 (en) | File storage control system and method and program | |
Röder et al. | History-based access control for XML documents | |
Burleson | Oracle internals: tips, tricks, and techniques for DBAs | |
Shepherd et al. | Are ISO 15489‐1: 2001 and ISAD (G) compatible? Part 2 | |
CN107515742A (en) | Web page is set to access the framework method and system of mobile APP local resources | |
Tansley et al. | DSpace system documentation | |
Allen et al. | Fdl: A prototype formal digital library | |
Arnaldi | Giacomo Leopardi in the Anthropocene: translating the non-human from animals to AI | |
Bastiman et al. | Ante-Purgatory | |
Siah | The attribution of creativity and agency to artificial intelligence |