IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A Software Engineering Approach for Access Control to Multi-Level-Security Documents

A Software Engineering Approach for Access Control to Multi-Level-Security Documents
View Sample PDF
Author(s): Muneer Ahmad (King Faisal University, Saudi Arabia), Noor Zaman (King Faisal University, Saudi Arabia), Low Tang Jung (University Technology PETRONAS, Malaysia)and Fausto Pedro García Márquez (University of Castilla-La Mancha, Spain)
Copyright: 2013
Pages: 9
Source title: Software Development Techniques for Constructive Information Systems Design
Source Author(s)/Editor(s): Khalid A. Buragga (King Faisal University, Saudi Arabia)and Noor Zaman (King Faisal University, Saudi Arabia)
DOI: 10.4018/978-1-4666-3679-8.ch019

Purchase

View A Software Engineering Approach for Access Control to Multi-Level-Security Documents on the publisher's website for pricing and purchasing information.

Abstract

Access control to multi level security documents is very important and challenging issue. Millions of organizations around the globe intend to apply security levels over their confidential documents to protect from unauthorized use. Some numbered access control approaches have been proposed and an optimal solution is the need of the time. This chapter presents an overview of a robust software engineering approach for access control to multi-level security documents. The access control system incorporates stages including data refinement, text comprehension, and understanding of multi-stage protection and application levels. It will scan the document, tag the sections of certain text, understand the meaning of various levels, group-up the text using bottom-up approach, and then classify the levels as per protection norms (set as organization wise) defined. This approach will be very helpful for multi-level protection of precious information. Only authorized users would be able to access the information relevant to them as defined by the authorities.

Related Content

Babita Srivastava. © 2024. 21 pages.
Sakuntala Rao, Shalini Chandra, Dhrupad Mathur. © 2024. 27 pages.
Satya Sekhar Venkata Gudimetla, Naveen Tirumalaraju. © 2024. 24 pages.
Neeta Baporikar. © 2024. 23 pages.
Shankar Subramanian Subramanian, Amritha Subhayan Krishnan, Arumugam Seetharaman. © 2024. 35 pages.
Charu Banga, Farhan Ujager. © 2024. 24 pages.
Munir Ahmad. © 2024. 27 pages.
Body Bottom