Abstract
In a real world meeting, sometimes it is required to use secret documents which are used during the meeting, but are not permitted to bring back. Such a function is very hard to be realized by distributed meeting systems consisting of computers and networks. Participants of the meeting cannot usually access the material after the meeting. The requirements of such security meeting are contrary to the open connectivity of distributed environments. Thus, the security meeting remains in old styles that the participants come together at a restricted meeting room with their authorizations. In this paper, we discuss constraints to use the secret material on a distributed security meeting, and propose the strictly restricted meeting system which controls action and state of meeting participants with supporting multi-level security. The architecture of the proposed system is called SDMS(Secure Distributed Meeting System), and its requirements to be realized on the Server-Client model are described.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
John Baker, “Meeting manager”, ACM interactions 3,3 (May. 1996), Pages 42–43
Sandhu, R., Coyne, E., Feinstein, H.L., and Youman, C.E., “Role-based access control models”, IEEE Computer 29,2(Feb.), Pages 38–47
Ronald L. Rivest, Adi Shamir, and Leonard M.Adleman, “A method for obtaining digital signatures and public-key cryptosystems”, Communications of the ACM, Vol. 21, No. 2, Pages 120–126, 1978.
Kil-ho Shin, Masaki Kyohima, “Secure and Efficient Schemes to Entrust the Use of Private Keys”, IEEE Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 1999.
Clark, D., and Wilson, D.,“A comparision of commercial and military computer security policies”, Proceedings of the 1987 IEEE Symposium on Security and Privacy, Pages 184–194.
Steven J. Greenwald, “A new security policy for distributed resource management and access control”, Proceedings of the UCLA Conference on New Security paradigms workshops, 1996, Pages 74–86.
Kim C. Ng, Hiroshi Ishiguro, Mohan Trivedi and Takushi Sogo, Monitoring dynamically changing environments by ubiquitous vision system, in Proc. Workshop on Visual Surveillance, 1999.
Scott Oaks, “The Java Sandbox model”, Java Security, O’Reilly, May 1998.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, R., Kambayashi, Y. (2000). Data Security for Distributed Meeting Systems. In: Ibrahim, M., Küng, J., Revell, N. (eds) Database and Expert Systems Applications. DEXA 2000. Lecture Notes in Computer Science, vol 1873. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44469-6_26
Download citation
DOI: https://doi.org/10.1007/3-540-44469-6_26
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67978-3
Online ISBN: 978-3-540-44469-5
eBook Packages: Springer Book Archive