Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Data Security for Distributed Meeting Systems

  • Conference paper
  • First Online:
Database and Expert Systems Applications (DEXA 2000)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1873))

Included in the following conference series:

  • 1780 Accesses

Abstract

In a real world meeting, sometimes it is required to use secret documents which are used during the meeting, but are not permitted to bring back. Such a function is very hard to be realized by distributed meeting systems consisting of computers and networks. Participants of the meeting cannot usually access the material after the meeting. The requirements of such security meeting are contrary to the open connectivity of distributed environments. Thus, the security meeting remains in old styles that the participants come together at a restricted meeting room with their authorizations. In this paper, we discuss constraints to use the secret material on a distributed security meeting, and propose the strictly restricted meeting system which controls action and state of meeting participants with supporting multi-level security. The architecture of the proposed system is called SDMS(Secure Distributed Meeting System), and its requirements to be realized on the Server-Client model are described.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. John Baker, “Meeting manager”, ACM interactions 3,3 (May. 1996), Pages 42–43

    Google Scholar 

  2. Sandhu, R., Coyne, E., Feinstein, H.L., and Youman, C.E., “Role-based access control models”, IEEE Computer 29,2(Feb.), Pages 38–47

    Google Scholar 

  3. Ronald L. Rivest, Adi Shamir, and Leonard M.Adleman, “A method for obtaining digital signatures and public-key cryptosystems”, Communications of the ACM, Vol. 21, No. 2, Pages 120–126, 1978.

    Article  MathSciNet  Google Scholar 

  4. Kil-ho Shin, Masaki Kyohima, “Secure and Efficient Schemes to Entrust the Use of Private Keys”, IEEE Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 1999.

    Google Scholar 

  5. Clark, D., and Wilson, D.,“A comparision of commercial and military computer security policies”, Proceedings of the 1987 IEEE Symposium on Security and Privacy, Pages 184–194.

    Google Scholar 

  6. Steven J. Greenwald, “A new security policy for distributed resource management and access control”, Proceedings of the UCLA Conference on New Security paradigms workshops, 1996, Pages 74–86.

    Google Scholar 

  7. Kim C. Ng, Hiroshi Ishiguro, Mohan Trivedi and Takushi Sogo, Monitoring dynamically changing environments by ubiquitous vision system, in Proc. Workshop on Visual Surveillance, 1999.

    Google Scholar 

  8. Scott Oaks, “The Java Sandbox model”, Java Security, O’Reilly, May 1998.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, R., Kambayashi, Y. (2000). Data Security for Distributed Meeting Systems. In: Ibrahim, M., Küng, J., Revell, N. (eds) Database and Expert Systems Applications. DEXA 2000. Lecture Notes in Computer Science, vol 1873. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44469-6_26

Download citation

  • DOI: https://doi.org/10.1007/3-540-44469-6_26

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-67978-3

  • Online ISBN: 978-3-540-44469-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics