A Software Engineering Approach for Access Control to Multi-Level-Security Documents

A Software Engineering Approach for Access Control to Multi-Level-Security Documents

Muneer Ahmad, Noor Zaman, Low Tang Jung, Fausto Pedro García Márquez
ISBN13: 9781466636798|ISBN10: 1466636793|EISBN13: 9781466636804
DOI: 10.4018/978-1-4666-3679-8.ch019
Cite Chapter Cite Chapter

MLA

Ahmad, Muneer, et al. "A Software Engineering Approach for Access Control to Multi-Level-Security Documents." Software Development Techniques for Constructive Information Systems Design, edited by Khalid A. Buragga and Noor Zaman, IGI Global, 2013, pp. 345-353. https://doi.org/10.4018/978-1-4666-3679-8.ch019

APA

Ahmad, M., Zaman, N., Jung, L. T., & Márquez, F. P. (2013). A Software Engineering Approach for Access Control to Multi-Level-Security Documents. In K. Buragga & N. Zaman (Eds.), Software Development Techniques for Constructive Information Systems Design (pp. 345-353). IGI Global. https://doi.org/10.4018/978-1-4666-3679-8.ch019

Chicago

Ahmad, Muneer, et al. "A Software Engineering Approach for Access Control to Multi-Level-Security Documents." In Software Development Techniques for Constructive Information Systems Design, edited by Khalid A. Buragga and Noor Zaman, 345-353. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-3679-8.ch019

Export Reference

Mendeley
Favorite

Abstract

Access control to multi level security documents is very important and challenging issue. Millions of organizations around the globe intend to apply security levels over their confidential documents to protect from unauthorized use. Some numbered access control approaches have been proposed and an optimal solution is the need of the time. This chapter presents an overview of a robust software engineering approach for access control to multi-level security documents. The access control system incorporates stages including data refinement, text comprehension, and understanding of multi-stage protection and application levels. It will scan the document, tag the sections of certain text, understand the meaning of various levels, group-up the text using bottom-up approach, and then classify the levels as per protection norms (set as organization wise) defined. This approach will be very helpful for multi-level protection of precious information. Only authorized users would be able to access the information relevant to them as defined by the authorities.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.