Browse Prior Art Database

Identifying a Date And Time After Which Security Restrictions Can Be Released From a Document

IP.com Disclosure Number: IPCOM000099782D
Original Publication Date: 1990-Feb-01
Included in the Prior Art Database: 2005-Mar-15
Document File: 1 page(s) / 34K

Publishing Venue

IBM

Related People

Williams, ML: AUTHOR

Abstract

This article describes a mechanism for IBM's Document Interchange Architecture (DIA) Services whereby an enterprise can specify a date and time which, after occurring, could circumvent the security of the document. An enterprise's security classifications may only have significance for a particular time. An enterprise may wish to associate a time after which the security attributes no longer apply for a document. Currently, no mechanism exists in DIA services whereby an originator or enterprise can specify the date and time at which the security attributes for a document are no longer applicable. A mechanism is needed which permits enterprises to specify the date and time after the security restrictions can be relinquished.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 100% of the total text.

Identifying a Date And Time After Which Security Restrictions Can Be Released From a Document

       This article describes a mechanism for IBM's Document
Interchange Architecture (DIA) Services whereby  an enterprise can
specify a date and time which, after occurring, could circumvent the
security of the document. An enterprise's security classifications
may only have significance for a particular time. An enterprise may
wish to associate a time after which the security attributes no
longer apply for a document. Currently, no mechanism exists in DIA
services whereby an originator or enterprise can specify the date and
time at which  the security attributes for a document are no longer
applicable. A mechanism is needed which permits enterprises to
specify the date and time after the security restrictions can be
relinquished.

      An enterprise can interchange information as to whether the
security attributes of a document should still be enforced by
creating an access control object for a document which contains a
self-defining field which identifies the date and time after which
the security constraints can be relinquished for the document.

      This mechanism  permits an enterprise to convey information as
to the validity of the security attributes of a document by
ascertaining the date and time at which the security characteristics
were relinquished and notifies the enterprise as to whether security
constraints should be enforced.