Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Incorporating access control in forms systems
Yeo G. Computers and Security4 (2):109-122,1985.Type:Article
Date Reviewed: Feb 1 1986

Many current computer systems work on the basis of forms for input and output. Many of these systems have elaborate editing languages to allow the programmer to specify the structure of the form, and the format of the fields. The author proposes that a third element is necessary in the form, and that is the field security.

In the traditional DP form, security is not obvious and may change from user to user. The originator enters some data; he or she then passes it on for another to approve, or to add additional data. Some sort of relationship must be maintained about the approval; either after approval the first entered data cannot be changed, or changing the data removes the approval. Current forms management systems do not allow for this concept very well.

The author proposes a semantic language for defining this security. The concepts are well thought out, but the reviewer thinks that the solution would need much more consideration before it could be considered complete. The concepts within this paper are very important for future consideration as we proceed more and more into office automation with relatively low level “programmers.”

Reviewer:  Charles W. Bash Review #: CR109936
Bookmark and Share
 
Security, Integrity, And Protection (H.2.0 ... )
 
 
Access Controls (D.4.6 ... )
 
 
Access Methods (H.2.2 ... )
 
 
Office Automation (H.4.1 )
 
Would you recommend this review?
yes
no
Other reviews under "Security, Integrity, And Protection": Date
Views for multilevel database security
Denning D., Akl S., Heckman M., Lunt T., Morgenstern M., Neumann P., Schell R. IEEE Transactions on Software Engineering SE-13(2): 129-140, 1987. Type: Article
Feb 1 1988
Computer security: a comprehensive controls checklist
Wood C., Banks W., Guarro S., Garcia A., Hampel V., Sartorio H., Wiley-Interscience, New York, NY, 1987. Type: Book (9789780471847953)
Feb 1 1988
The NTree: a two dimension partial order for protection groups
Sandhu R. ACM Transactions on Computer Systems 6(2): 197-222, 1988. Type: Article
Feb 1 1989
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy