Three different security models have been advocated to determine the access rights to documents in a network of computers; DAC, MLS, and RBAC. Each of these models has its strength and weakness. No one can urge that any of these models can offer alone by itself an automated support for either the security or the access rights. In this paper, we propose a content-based management model for the access control to documents in a large enterprise. The model determines the access rights to documents based on their content and automatically classifies the access levels or detects possible incorrect settings. The content-based document access control can be used in advanced business applications to allow developers to provide a high level integration of security models within business applications.
[1]
Timo Honkela,et al.
WEBSOM - Self-organizing maps of document collections
,
1998,
Neurocomputing.
[2]
Teuvo Kohonen,et al.
Self-Organizing Maps
,
2010
.
[3]
Dieter Gollmann,et al.
Computer Security
,
1979,
Lecture Notes in Computer Science.
[4]
Matthew Chalmers,et al.
A linear iteration time layout algorithm for visualising high-dimensional data
,
1996,
Proceedings of Seventh Annual IEEE Visualization '96.
[5]
Gerard Salton,et al.
Automatic Text Processing: The Transformation, Analysis, and Retrieval of Information by Computer
,
1989
.