A Software Engineering Approach for Access Control to Multi-Level-Security Documents

Access control to multi level security documents is very important and challenging issue. Millions of organizations around the globe intend to apply security levels over their confidential documents to protect from unauthorized use. Some numbered access control approaches have been proposed and an optimal solution is the need of the time. This chapter presents an overview of a robust software engineering approach for access control to multi-level security documents. The access control system incorporates stages including data refinement, text comprehension, and understanding of multi-stage protection and application levels. It will scan the document, tag the sections of certain text, understand the meaning of various levels, group-up the text using bottom-up approach, and then classify the levels as per protection norms (set as organization wise) defined. This approach will be very helpful for multi-level protection of precious information. Only authorized users would be able to access the information relevant to them as defined by the authorities.

[1]  Hassan Mathkour,et al.  An integrated statistical comparative analysis between variant genetic datasets of Mus musculus , 2009, CI 2009.

[2]  Ernesto Damiani,et al.  Design and implementation of an access processor for xml documents , 2000 .

[3]  Yi Pan,et al.  Partitioned optimization algorithms for multiple sequence alignment , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).

[4]  Ping Ma,et al.  An Improved Ant Colony Algorithm for DNA Sequence Alignment , 2008, 2008 International Symposium on Information Science and Engineering.

[5]  Chou-Yuan Lee,et al.  An Intelligent System for Multiple Sequences Alignment , 2005, 2005 IEEE International Conference on Systems, Man and Cybernetics.

[6]  Mohammad Alhammouri,et al.  Management of Groups and Group Keys in Multi-level Security Environments , 2007, SAFECOMP.

[7]  Ankit Agrawal,et al.  Pairwise DNA Alignment with Sequence Specific Transition-Transversion Ratio Using Multiple Parameter Sets , 2008, 2008 International Conference on Information Technology.

[8]  Dan He,et al.  An improved algorithm for the regular expression constrained multiple sequence alignment problem , 2006, Sixth IEEE Symposium on BioInformatics and BioEngineering (BIBE'06).

[9]  Ernesto Damiani,et al.  Design and implementation of an access control processor for XML documents , 2000, Comput. Networks.

[10]  Rey-Long Liu Interactive high-quality text classification , 2008, Inf. Process. Manag..

[11]  R. Abdullah,et al.  Fast Dynamic Programming Based Sequence Alignment Algorithm , 2006, The 2nd International Conference on Distributed Frameworks for Multimedia Applications.

[12]  Srinivas Aluru,et al.  Space and time optimal parallel sequence alignments , 2004, IEEE Transactions on Parallel and Distributed Systems.

[13]  J. Anttila,et al.  Information Security Standards and Global Business , 2006, 2006 IEEE International Conference on Industrial Technology.

[14]  S. Muftic,et al.  A Design of an Access Control Model for Multilevel-Security Documents , 2008, 2008 10th International Conference on Advanced Communication Technology.

[15]  H.L. Armstrong,et al.  Mapping information security curricula to professional accreditation standards , 2007, 2007 IEEE SMC Information Assurance and Security Workshop.

[16]  Makoto Murata,et al.  XML access control using static analysis , 2006, TSEC.

[17]  Jin Zhang,et al.  An empirical study of sentiment analysis for chinese documents , 2008, Expert Syst. Appl..

[18]  Sara Nasser,et al.  Multiple Sequence Alignment using Fuzzy Logic , 2007, 2007 IEEE Symposium on Computational Intelligence and Bioinformatics and Computational Biology.

[19]  Ridvan Saraçoglu,et al.  A new approach on search for similar documents with multiple categories using fuzzy clustering , 2008, Expert Syst. Appl..

[20]  Linda G. Wallace,et al.  Is Information Security Under Control?: Investigating Quality in Information Security Management , 2007, IEEE Security & Privacy.

[21]  Jan H. P. Eloff,et al.  Security classification for documents , 1996, Comput. Secur..