This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
An Authorization Model for a Distributed Hypertext System
August 1996 (vol. 8 no. 4)
pp. 555-562

Abstract—Digital libraries support quick and efficient access to a large number of information sources that are distributed but interlinked. As the amount of information to be shared grows, the need to restrict access only to specific users or for specific usage will surely arise. The protection of information in digital libraries, however, is difficult because of the peculiarity of the hypertext paradigm which is generally used to represent information in digital libraries, together with the fact that related data in a hypertext are often distributed at different sites. In this paper, we present an authorization model for distributed hypertext systems. Our model supports authorizations at different granularity levels, takes into consideration different types of data and the relationships among them, and allows administrative privileges to be delegated.

[1] R.M. Akscyn, D.L. McCracken, and E.A. Yoder, "KMS: A Distributed Hypermedia System for Managing Knowledge in Organizations," Comm. ACM, vol. 31, no. 7, pp. 820-835, July 1988.
[2] K. Andrews, F. Kappe, and H. Maurer, "Serving Information to the Web with Hyper-G," Proc. Third World-Wide Web Conf., pp. 919-926, Apr. 1995. http://www.igd.uiuc/www/www95/papers/105/hgw3.html.
[3] T. Berners-Lee, R. Caililiau, A. Luotonen, H.F. Nielsen, and A. Secret, “The World Wide Web,” Comm. ACM, vol. 37, no 8, pp. 76-82, Aug. 1994.
[4] E. Bertino, S. Jajodia, and P. Samarati, "Access Controls in Object-Oriented Database Systems: Some Approaches and Issues," Advanced Database Concepts and Research Issues, N. Adam and B. Bhargava, eds. pp. 17-44. Springer-Verlag, LNCS 759, 1993.
[5] E. Bertino, S. Jajodia, and P. Samarati, "Supporting Multiple Access Control Policies in Database Systems," Proc. IEEE Symp. Security and Privacy,Oakland, Calif., May 1996.
[6] E. Bertino, F. Origgi, and P. Samarati, "An Extended Authorization Model for Object Databases," J. Computer Security, vol. 3, no. 6, pp. 169-206, 1995.
[7] B. Campbell and J.M. Goodman, "HAM: A General Purpose Hypertext Abstract Machine," Comm. ACM, vol. 31, no. 7, pp. 856-861, July 1988.
[8] S. Castano, M.G. Fugini, G. Martella, and P. Samarati, Database Security. Addison-Wesley, 1995.
[9] D.E. Comer and L.L. Peterson, "Understanding Naming in Distributed Systems," Distributed Computing, vol. 3, no. 2, pp. 51-60, 1989.
[10] E.B. Fernandez, E. Gudes, and H. Song, "A Model of Evaluation and Administration of Security in Object-Oriented Databases," IEEE Trans. Knowledge and Data Eng., vol. 6, no. 2, pp. 275-292, Apr. 1994.
[11] E. Fox, M. Akscyn, R. Furuta, and J.Leggett, eds., Communications of the ACM—Special Issue on Digital Libraries, Apr. 1995.
[12] K. Gronbaek and R.H. Trigg, eds., Communications of the ACM—Special Issue on Hypermedia, Feb. 1994.
[13] NCSA httpd Development Team, "NCSA httpd," http://hoohoo.ncsa.uiuc.edu/docs/Overview.html, July 1995.
[14] J. Kahan, "A Distributed Authorization Model for WWW," Proc. INET '95 Conf.,Honolulu, Hawaii, http://www.isoc.org/HMP/PAPER/107, 1995.
[15] M.G. Lavenant and J.A. Kruper, "The Phoenix Project: Distributed Hypermedia Authoring," Proc. First World-Wide Web Conf., http://www.cern.ch/PapersWWW94/j-kruper.ps, 1994.
[16] S. Lewontin and M.E. Zurko, "The DCE Web Project: Providing Authorization and Other Distributed Services to the World Wide Web," Proc. Second World-Wide Web Conf., http://www.ncsa.uiuc.edu/SDG/IT94/Proceedings/Security/, Spring 1994.
[17] A. Luotonen, "Protected CERN server setup," http://www.w3.org/hypertext/WWW/Daemon/User/Access Auth.html, January 1995.
[18] N. Meyrowitz, "Intermedia: The Architecture and Construction of an Object-Oriented Hypermedia System and Application Framework," Proc. OOPSLA '86, Sept. 1986.
[19] B.C. Neuman and T. Ts'o, "Kerberos: An Authentication Service for Computer Networks," IEEE Comm., vol. 32, no. 9, Sep. 1994, pp. 33-38; available at.
[20] M. Nyanchama and S. Osborn, "Role-Based Security: Pros, Cons and Some Research Directions," ACM-SIGSAC Review, vol. 2, no. 2, pp. 11-17, June 1993.
[21] F. Rabitti, E. Bertino, W. Kim, and D. Woelk, “A Model of Authorization for Next-Generation Database Systems,” ACM Trans. Database Systems, vol. 16, no. 1, pp. 88–131, 1994.
[22] H. Shen and P. Dewan, "Access Control for Collaborative Environments," Computer Supported Cooperative Work, pp. 51-58, Nov. 1992.
[23] J.B. Smith and S.F. Weiss, eds., Communications of the ACM—Special Issue on Hypertext, July 1988.
[24] P.D. Stotts and R. Furuta, "Petri-Net Based Hypertext," ACM Trans. Information Systems, vol. 7, no. 1, pp. 3-29, Jan. 1989.

Index Terms:
Digital libraries, hypertext systems, authorization models, security, access control.
Citation:
Pierangela Samarati, Elisa Bertino, Sushil Jajodia, "An Authorization Model for a Distributed Hypertext System," IEEE Transactions on Knowledge and Data Engineering, vol. 8, no. 4, pp. 555-562, Aug. 1996, doi:10.1109/69.536249
Usage of this product signifies your acceptance of the Terms of Use.