A content-based authorization model for digital libraries

被引:54
作者
Adam, NR
Atluri, V
Bertino, E
Ferrari, E
机构
[1] Rutgers State Univ, CIMIC, Newark, NJ 07102 USA
[2] Rutgers State Univ, MSIS Dept, Newark, NJ 07102 USA
[3] Univ Milan, Dipartimento Sci Informaz, I-20135 Milan, Italy
[4] Univ Insubria, Dipartimento Sci Chim Fis & Matemat, Como, Italy
关键词
digital libraries; access control; authorization;
D O I
10.1109/69.991718
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Digital Libraries (DLs) introduce several challenging requirements with respect to the formulation, specification, and enforcement of adequate data protection policies. Unlike conventional database environments, a DL environment typically is characterized by dynamic user population, often making accesses from remote locations, and by an extraordinarily large amount of multimedia information, stored in a variety of formats. Moreover, in a DL environment, access policies are often specified based on user qualifications and characteristics, rather than user identity (for example, a user can be given access to an R-rated video only if he/ she is older than 18 years). Another crucial requirement is the support for content-dependent authorizations on digital library objects (for example, all documents containing discussions on how to operate guns must be made available only to users who are 18 or older). Since traditional authorization models do not adequately meet access control requirements typical to DLs, in this paper, we propose a content-based authorization model suitable for a DL environment. Specifically, the most innovative features of our authorization model are: 1) flexible specification of authorizations based on the qualifications and characteristics of users (including positive and negative), 2) both content-dependent and content-independent access control to digital library objects, and 3) varying granularity of authorization objects ranging from sets of library objects to specific portions of objects.
引用
收藏
页码:296 / 315
页数:20
相关论文
共 32 条
[1]  
ADAM N, 1998, CONTENT BASED AUTHOR
[2]  
Adam Nabil, 1996, ACM COMPUTING SURVEY, V28
[3]  
ALTURI V, 1996, P 4 EUR S RES COMP S
[4]  
[Anonymous], 1995, NETWORK SECURITY PRI
[5]  
BARU CK, 1998, P 3 ACM INT C DIG LI, P275
[6]  
Bertino E., 2000, Journal of Computer Security, V8, P109
[7]   A logical framework for reasoning on data access control policies [J].
Bertino, E ;
Buccafurri, F ;
Ferrari, E ;
Rullo, P .
PROCEEDINGS OF THE 12TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, 1999, :175-189
[8]   An extended authorization model for relational databases [J].
Bertino, E ;
Samarati, P ;
Jajodia, S .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 1997, 9 (01) :85-101
[9]   A temporal access control mechanism for database systems [J].
Bertino, E ;
Bettini, C ;
Ferrari, E ;
Samarati, P .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 1996, 8 (01) :67-80
[10]   A flexible authorization mechanism for relational data management systems [J].
Bertino, E ;
Jajodia, S ;
Samarati, P .
ACM TRANSACTIONS ON INFORMATION SYSTEMS, 1999, 17 (02) :101-140