Differential access for publicly-posted composite documents with multiple workflow participants
Proceedings of the 10th ACM symposium on Document engineering
APEX: automated policy enforcement eXchange
Proceedings of the 10th ACM symposium on Document engineering
System Call Interception Framework for Data Leak Prevention
EDOC '11 Proceedings of the 2011 IEEE 15th International Enterprise Distributed Object Computing Conference
A framework for usage-based document reengineering
Proceedings of the 2013 ACM symposium on Document engineering
Access control requirements for structured document in cloud computing
International Journal of Grid and Utility Computing
Hi-index | 0.00 |
With the boom in interactive and composite documents and the increased coupling between the on-line and physical worlds, the need for secure document engineering is greater than ever. Four important factors contribute to the need to re-engineer document lifecycles and the associated workflows. The first is the rapid increase in mobile access to documents. The second is the movement of documents from private directories, shared directories and intranets to the cloud. The third is the increased generation of - and expectation for - document content, context and use analytics. Finally, the proliferation of social website applications and services over the past half-decade have created for many a constant state of log-in. Each of these trends creates a significantly increased "attack surface" for individuals, organizations and governments interested in breaching the privacy and security of web users. Combined, these transformations create as big a change to content security as that of the browser in the 1990s. In this workshop, we consider the impact of these ongoing transformations in document creation and interaction, and consider what the best approaches will be to provide privacy and security in light of these transformations.