Shopping models: a flexible architecture for information commerce
DL '97 Proceedings of the second ACM international conference on Digital libraries
XML document security based on provisional authorization
Proceedings of the 7th ACM conference on Computer and communications security
A fine-grained access control system for XML documents
ACM Transactions on Information and System Security (TISSEC)
An efficient software protection scheme
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
The ADEPT digital library architecture
Proceedings of the 2nd ACM/IEEE-CS joint conference on Digital libraries
Securing XML Documents with Author-X
IEEE Internet Computing
Controlling Access to XML Documents
IEEE Internet Computing
XML-Based Distributed Access Control System
EC-WEB '02 Proceedings of the Third International Conference on E-Commerce and Web Technologies
Going Beyond MAC and DAC Using Mobile Policies
IFIP/Sec '01 Proceedings of the IFIP TC11 Sixteenth Annual Working Conference on Information Security: Trusted Information: The New Decade Challenge
Certificate-based access control for widely distributed resources
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Integrating PMI services in CORBA applications
Computer Standards & Interfaces - CORBA: protocols, applications, process models and standards
A semantic approach for access control in web services
EuroWeb'02 Proceedings of the 2002 international conference on EuroWeb
Hi-index | 0.00 |
Security is a very relevant aspect in the implementation of most digital libraries. Two important security issues in these systems are distributed access control and secure content distribution. This paper presents a system that provides these two features for digital libraries. The system is based on the combination of the use of an external authorization infrastructure, a software protection mechanism and a modular language to specify how access to the contents is controlled. The extensive use of semantic information makes possible the integration of such a complex set of subsystems.