• DocumentCode
    2597064
  • Title

    Access Control Algorithm on File View in Intranets

  • Author

    Ai, Yong ; Dong, Hongbin ; Wu, Xing ; Liang, Yiwen

  • Author_Institution
    Comput. Sch., Wuhan Univ., Wuhan, China
  • Volume
    2
  • fYear
    2010
  • fDate
    24-25 April 2010
  • Firstpage
    166
  • Lastpage
    170
  • Abstract
    Nowadays, a new security problem is arising in intranets. The threats from inside an organization account for a rapidly increasing proportion of losses. A new concept of “File View” is proposed to resolve this security problem in intranets, which uses the structure of database view for reference. Because of the differences between file system and database, there are some challenges in extending this proposal to file systems. This paper proposes an algorithm to protect confidential information in file system from being accessed by illegal users. First, the paper proposes an algorithm as “File View Access Control Algorithm”(FVACA) which revises the algorithms proposed in previous work. Then, to verify the feasible of this algorithm, this paper suggests to realize it on “Microsoft Office Word” which is one of the most popular digital formats used in intranets. For protecting the confidential information in file view, a method based on the compound format of “MSWord” is adopted. Finally, the experiment based on “MS Word” shows that FVACA is effective on protecting content from being accessed by illegal users.
  • Keywords
    authorisation; computer network security; file organisation; intranets; FVACA; Intranet security problem; Microsoft office word; access control algorithm; confidential information protection; file system; file view; illegal users; Access control; Computer networks; Computer security; Data security; Databases; File systems; Information security; Operating systems; Protection; XML; Access Control; File View; Information Hidden; Information Security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Networks Security Wireless Communications and Trusted Computing (NSWCTC), 2010 Second International Conference on
  • Conference_Location
    Wuhan, Hubei
  • Print_ISBN
    978-0-7695-4011-5
  • Electronic_ISBN
    978-1-4244-6598-9
  • Type

    conf

  • DOI
    10.1109/NSWCTC.2010.175
  • Filename
    5480761