[go: up one dir, main page]

Corcoran, 2000 - Google Patents

Combining provenance and security policies in a web-based document management system

Corcoran, 2000

View HTML
Document ID
381709509540854867
Author
Corcoran B
Publication year

External Links

Snippet

This research explores the intersection of provenance and security policies within a web- based document management system called the Collaborative Planning Application (CPA). Utilizing the SELINKS programming language, which supports label-based security policies …
Continue reading at www.academia.edu (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • G06F17/21Text processing
    • G06F17/22Manipulating or registering by use of codes, e.g. in sequence of text characters
    • G06F17/2288Version control
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/3089Web site content organization and management, e.g. publishing, automatic linking or maintaining pages
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • G06F17/21Text processing
    • G06F17/24Editing, e.g. insert/delete
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30011Document retrieval systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30943Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
    • G06F17/30946Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2145Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring

Similar Documents

Publication Publication Date Title
JP7729876B2 (en) Protecting sensitive data in documents
US7984513B1 (en) Method and system for using a rules engine for enforcing access and usage policies in rights-aware applications
US20060149735A1 (en) Automated records management with enforcement of a mandatory minimum retention record
Hajba Website Scraping with Python
Król et al. Peculiarity of the bit rot and link rot phenomena
Krishnamurthi The CONTINUE server (or, How I administered PADL 2002 and 2003)
Corcoran Combining provenance and security policies in a web-based document management system
Karabiyik Building an intelligent assistant for digital forensics
US20030106023A1 (en) Electronic virtual components description import in intranet catalogs
Bell et al. Underscoring archival authenticity with blockchain technology
Dimitrov et al. Types of dark data and hidden cybersecurity risks
Anderson Data scalability in open hypermedia systems
Glennan The New RDA Toolkit: Everything Has Changed or Has It
Buckley et al. Electronic Publishing of Scholarly Journals: A Bibliographic Essay of Current Issues: Theme: Electronic Journals in Science and Technology Libraries
Moore et al. Assessment of RLG trusted digital repository requirements
JP5632753B2 (en) File storage control system and method and program
Röder et al. History-based access control for XML documents
Burleson Oracle internals: tips, tricks, and techniques for DBAs
Shepherd et al. Are ISO 15489‐1: 2001 and ISAD (G) compatible? Part 2
CN107515742A (en) Web page is set to access the framework method and system of mobile APP local resources
Tansley et al. DSpace system documentation
Allen et al. Fdl: A prototype formal digital library
Arnaldi Giacomo Leopardi in the Anthropocene: translating the non-human from animals to AI
Bastiman et al. Ante-Purgatory
Siah The attribution of creativity and agency to artificial intelligence