Secure automated document delivery

نویسندگان

  • Tom Casey
  • Michael Roe
  • Bill Tuck
  • Steve R. Wilbur
چکیده

A document retrieval system is a specific type of distributed processing which has its own particular security requirements. This paper proposes a model for secure delivery of documents and describes a prototype system, based on earlier work on secure electronic mail and automated document delivery systems, being developed at University College London. In the proposed architecture, security protection is provided for document requests and the actual documents delivered. E-mail protocols are used for document requests and delivery, although file transfer protocols could be used in some circumstances. The paper begins with a discussion of the document delivery system background and then sets out the client– server model for the secure system. The security philosophy, requirements, policy, and techniques are dealt with next. The criterion for validation is analyzed; the relationship to OSI is shown; implementation issues are discussed and the direction of future efforts is pointed out. This work was supported by grants from the British Library Research and Development Department (project Quartet), the Alvey programme (project LOCATOR) and the DELTA programme (project CAPTIVE). 1 Background The Secure Automated Document Delivery System (SADDS) described in this paper is an application program which provides security for an automated document delivery system. The system merges several technologies, prototypes of which are currently under development at University College London; privacy enhanced e-mail [4], directory support for secure messaging [17], and automated document delivery systems [18]. A prototype Automated Document Delivery System (ADDS) is the fundamental model to which security features are to be added. This ADDS prototype was developed under Quartet, a British Library research project. It provides an automated system for searching bibliographic databases, initiating requests to the document filestore, and the mechanism for document delivery to the end user. In some distributed environments, where security is not a concern, the ADDS fulfills many of the requirements for accessing and retrieving documents from a central depository. Yet in other circumstances security is necessary. The principles underlying a SADDS are applicable in many data processing environments where users are provided with read only access to a document database. Particularly relevant are applications where document requests originate at remote sites, and clients, for security reasons, are denied access privileges to the host server. The SADDS effectively allows the client to perform a restricted set of operations on a collection of objects. Client-host session establishment and the concomitant retention of system state information is not an operational requirement. The ability to service document requests in an accountable manner with limited access rights to the underlying host system has clear advantages over other types of security services. Furthermore, the system makes no assumptions about the security

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

Mapping of McGraw Cycle to RUP Methodology for Secure Software Developing

Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...

متن کامل

Examination of Vroom’s motivational theory: A new marketing strategy in consumers of online document delivery services: Case study of Shahid Chamran University of Ahvaz

This study aimed to identify and test expectancy motivational model as a theoretical framework to explain the reasons motivating expected information consumer’s behavior for the selection and use of document delivery services of Shahid Chamran University, Ahvaz. In this study, explanatory survey method was used. In order to test the hypotheses and analysis of model’s data, covariance structural...

متن کامل

Securing Data Delivery in Ad Hoc Networks

A novel Secure Protocol for REliable dAta Delivery (SPREAD) is proposed to enhance the secure data delivery in a mobile ad hoc network. The basic idea is to divide a secret message into multiple shares by secret sharing and deliver them via multiple independent paths to the destination. By this means, an adversary (adversaries) will have more difficulty to compromise the message delivered there...

متن کامل

A Secure Routing Algorithm for Underwater Wireless Sensor Networks

Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1989