Multilevel security for information retrieval systems
Information and Management
Multilevel security for information retrieval systems—II
Information and Management
Proxy signatures for delegating signing operation
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Comparing simple role based access control models and access control lists
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Data management in executive information systems
Information and Management
The Consistency of an Access Control List
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
ACLA: A framework for Access Control List (ACL) Analysis and Optimization
Proceedings of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security Issues of the New Century
Exploring the ncRNA-ncRNA patterns based on bridging rules
Journal of Biomedical Informatics
Information Systems and e-Business Management
Hi-index | 0.00 |
This paper addresses a practical problem in document management systems for which no existing solution is currently available in the market. To store confidential documents, a common approach is to keep only the encrypted version of the documents to ensure confidentiality of the contents. In real cases, documents may need to be shared by more than one person or group in a company and it is common for a manager to delegate the access rights of a documents to a delegatee. How is it possible to share encrypted documents and delegate the access rights of encrypted documents? Here, we discuss the issues related to this problem and provide a practical and easy-to-implement solution for solving the problem. It has been shown to be feasible by a prototype implementation. We also show how to extend our solution to be more scalable by taking advantage of the company's hierarchical structure.