Using collaborative filtering to weave an information tapestry
Communications of the ACM - Special issue on information filtering
Index structures for selective dissemination of information under the Boolean model
ACM Transactions on Database Systems (TODS)
Extractors for digital library objects
Extractors for digital library objects
An architecture for large scale information systems
Proceedings of the tenth ACM symposium on Operating systems principles
The SIFT information dissemination system
ACM Transactions on Database Systems (TODS)
Using digital credentials on the World Wide Web
Journal of Computer Security - Special issue on security in the World Wide Web
An Authorization Model for a Distributed Hypertext System
IEEE Transactions on Knowledge and Data Engineering
WVTDB-A Semantic Content-Based Video Database System on the World Wide Web
IEEE Transactions on Knowledge and Data Engineering
A mobile computing middleware for location- and context-aware internet data services
ACM Transactions on Internet Technology (TOIT)
Hi-index | 0.00 |
Abstract: Automatic data dissemination systems are becoming increasingly relevant in internet-based information systems. In such systems, users subscribe to the dissemination service by providing interest profiles. These profiles are then used to determine which information should be delivered to which users, whenever new information is entered into the system. A main shortcoming of existing dissemination systems is the lack of any access control mechanisms, enabling selective information dissemination based for example on security or other regulatory policies. In this paper, we present an access control model suitable for dissemination systems. The model is based on user profiles containing both user interests and user credentials (i.e., a set of attributes characterizing users for access control purposes). Information is then filtered before being delivered to users on the basis of both the user interests and credentials. To make authorization manageable when dealing with very large information systems, our model supports authorization domains, that allow one to group together information objects to which the same access control policies apply. Finally, in addition to formally defining our model and developing the related access control algorithm, we outline an implementation strategy.