A global strategy for controlling document distribution in confidential document management system

Many enterprises, organizations, governments and militaries are all facing a problem: How to protect their confidential documents, especially how to prevent them from being unauthorized redistributed is a serious trouble as lacking of mechanism to forbid this action at present. In this paper, we give a global document distribution control strategy for a confidential document management system base on our previous works on Security Confidential Document Model. In the global strategy, we first design a distribution control policy on the server, and then proposed a Confidential Document Distribution Control Protocol (CDDCP) to control the confidential documents' distribution. Analysis approved that the document in the confidential document management system can be controlled in security.

[1]  Shing-Chi Cheung,et al.  The Use of Digital Watermarking for Intelligence Multimedia Document Distribution , 2008, J. Theor. Appl. Electron. Commer. Res..

[2]  Zunera Jalil,et al.  A Review of Digital Watermarking Techniques for Text Documents , 2009, 2009 International Conference on Information and Multimedia Technology.

[3]  Jun Liu,et al.  An USB-Key_based approach for software tamper resistance , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).

[4]  Tao Li,et al.  File View: Secure Model in Intranet , 2009, 2009 International Conference on Networking and Digital Society.

[5]  Benedict G. E. Wiedemann Protection? , 1998, Science.

[6]  P. Samarati,et al.  Access control: principle and practice , 1994, IEEE Communications Magazine.

[7]  Yong Ai,et al.  A Framework for a File View Model in Intranets , 2009, 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology.

[8]  Jun Liu,et al.  A Secure Confidential Document Model and Its Application , 2010, 2010 International Conference on Multimedia Information Networking and Security.

[9]  Shing-Chi Cheung,et al.  A watermarking infrastructure for enterprise document management , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[10]  Chen Chao,et al.  Application of Digital Watermarking Using Plugins to Prevent Leaking of E-Documents from Internal Networks , 2008 .

[11]  Ravi S. Sandhu,et al.  How to do discretionary access control using roles , 1998, RBAC '98.