Role-Based Access Control Models
Computer
interactions
Java security
A new security policy for distributed resource management and access control
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Secure and Efficient Schemes to Entrust the Use of Private Keys
WETICE '99 Proceedings of the 8th Workshop on Enabling Technologies on Infrastructure for Collaborative Enterprises
Monitoring Dynamically Changing Environments by Ubiquitous Vision System
VS '99 Proceedings of the Second IEEE Workshop on Visual Surveillance
Hi-index | 0.00 |
In a real world meeting, sometimes it is required to use secret documents which are used during the meeting, but are not premitted to bring back. Such a function is very hard to be realized by distributed meeting systems consisting of computers and networks. Participants of the meeting cannot usually access the material after the meeting. The requirements of such security meeting are contrary to the open connectivity of distributed environments. Thus, the security meeting remains in old styles that the participants come together at a restricted meeting room with their authorizations. In this paper, we discuss constraints to use the secret material on a distributed security meeting, and propose the strictly restricted meeting system which controls action and state of meeting participants with supporting multi-level security. The architecture of the proposed system is called SDMS (Secure Distributed Meeting System), and its requirements to be realized on the Sever-Client model are described.