39
Views
12
CrossRef citations to date
0
Altmetric
Original Articles

Heuristic and integrated approach for technical document authority and authentication sequence determination

, &
Pages 1747-1768 | Published online: 21 Feb 2007

References

References

  • Balacheff B Chen L Plaquin D Proudler G 2001 A trusted process to digitally sign a document Proceedings of the 2001 Workshop on New Security Paradigms pp. 79–86
  • Benchiao J 1998 RADIUS: rapid application delivery, installation and upgrade system Proceedings, Technology of Object-Oriented Languages 180 186
  • Chen D Sun C 2001 Optimal instant locking in distributed collaborative graphics editing systems Proceedings of the 8th International Conference on Parallel and Distributed Systems pp. 109–166
  • Dasigi V 1998 Information fusion experiments for text classification IEEE Information Technology Conference pp. 23–26
  • Dengel , A . 1997 . Bridging the media gap from the Guthenberg's world to electronic document management systems . IEEE International Conference on Systems, Man, and Cybernetics, Computational Cybernetics and Simulation , 4 : 3540 – 3545 .
  • Devanbu P Gertz M Kwong A Martel C Nuckolls G Stubblebine SG 2001 Flexible authentication of XML document Proceedings of the 8th ACM conference on Computer and Communications Security pp. 136–145
  • Farkas , J . 1993 . Neural networks and document classification . Canadian Conference on Electrical and Computer Engineering , 1 : 1 – 4 .
  • Hahn , J . 1999 . The committee support system . Computer Standards and Interfaces , 20 ( 4–5 ) : 231 – 241 .
  • Ho KS Leong HV Lam W 2001 A collaborative word processing system using a COBRA-based workflow framework Proceedings of the 3rd International Symposium on Distributed Objects and Applications pp. 176–185
  • Hou , J-L , Trappey , CV and Trappey , AJC . 2001 . A web-based document server for knowledge management in a supply chain . International Journal of Agile Manufacturing , 5 ( 1 ) : 77 – 87 .
  • Israel , JE and Linden , TA . 1983 . Authentication in office system Internetworks . ACM Transactions on Information Systems , 1 ( 3 ) : 193 – 210 .
  • Jurecic M Bunz H 1994 Exchange of patient records – prototype implementation of a security attributes service in X.500 Proceedings of the 1st ACM conference on Computer and Communications Security pp. 30–38
  • Krulwich B 1995 Learning document category descriptions through the extraction of semantically significant phrases The IJCAI Workshop on Data Engineering for Inductive Learning pp. 1–10
  • Kwong A Gertz M 2001 Authentic publication of XML document data Proceedings of the Second International Conference on Web Information Systems Engineering pp. 331–340
  • Lam , W and Low , K-F . 1997 . Automatic document classification based on probabilistic reasoning: model and performance analysis . IEEE International Conference on Systems, Man, and Cybernetics, Computational Cybernetics and Simulation , 3 : 2719 – 2723 .
  • Lee , JY . 2001 . Threshold signature scheme with multiple signing policies . IEE Proceedings-Computers and Digital Techniques , 148 ( 2 ) : 95 – 99 .
  • Russell S 1993 Transparent cosignatures for electronic documents Proceedings of the Ninth Annual Conference on Computer Security Applications pp. 82–91
  • Sun , M-T and Hou , J-L . 2002 . The architecture and models for security reasoning in an EDMS . Journal of the Chinese Society of Industrial Engineers , 20 ( 4 ) : 305 – 316 .
  • Sun QB Feng PR Deng R 2001 An optical watermarking solution for authenticating printed documents Proceedings of the International Conference on Information Technology: Coding and Computing pp. 65–70
  • Takase T Uramoto N Baba K 2002 XML digital signature system independent of existing applications Proceedings of Symposium on Applications and the Internet Workshops pp. 150–157

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.