A Secured Access Control Technique for Co-authoring Systems

نویسندگان

  • Anandi Giridharan
  • P. Venkataram
چکیده

We propose a simple and efficient protection method for access control in co-authoring Systems. In this method we integrate the access control authentication into the key and lock distribution scheme to obtain an authenticated secure session key distribution system. This method has advantages on performance in Co-authoring systems, especially, while adding new files and users to the system.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A method of secured Co-authoring System development over wireless Network

over wireless Network Anandi Giridharan and P. Venkataram Department of Electrical Communication Engineering Indian Institute of Science Bangalore 560 012, India Email: anandi, [email protected] Abstract Information is a critical resource in today's enterprise, with security issues increasingly gaining importance, co-operative environment and especially work ow have to be incorporated t...

متن کامل

A standard Interactive Multimedia eBook Generator Engine for e-Learning Process

Introduction: Using standard authoring tools is essential to promote E-Learning in teaching-learning process. Learning content in medical sciences often consists of multimedia elements. On the other hand, it is frequently required to revise and update the medical content. Hence, access to the authoring tools that can encompass multimedia elements and allow easy content revision is helpful in e-...

متن کامل

WebDAV-Based Distributed Authoring of Databases (WEBDAD)

Recently many applications and much software has been provided to support distributed authoring of file systems (files and directories) based on WebDAV (protocol for Web-based Distributed Authoring and Versioning). WebDAV claims to handle any resource accessible using a Uniform Resource Identifier (URI). However, there is a lack of applications which support distributed authoring of databases u...

متن کامل

Applying Penetration Tests on a Highly Secured Cooperative Network

Security plays a vital role in the design; development and practical use of the distributed computing environment, for greater availability and access to information in turn imply that distributed systems are more prone to attacks. The need for practical solutions for secure networked system management is becoming increasingly significant. Any cooperative network should be supplied with differe...

متن کامل

An Authoring Framework for Security Policies: A Use-Case within the Healthcare Domain

Traditionally, the definition and the maintenance of security and access control policies has been the exclusive task of system administrators or security officers. In modern distributed and heterogeneous systems, there exist the need to allow different stakeholders to create and edit their security and access control preferences. In order to solve this problem two main challenges need to be me...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1996