Browse > Article
http://dx.doi.org/10.6109/jkiice.2018.22.10.1405

Design of the Access Control System for MS-WORD Document System  

Jang, Seung-Ju (Department of Computer Engineering, Dongeui University)
Abstract
This paper designs access control system for MS-word(Microsoft-word) document system. The system designed in this paper uses the document-related information by analyzing the MS-word document structure. It is designed to block access to users who can not access the modified information by partially modifying MS-word document information. This makes it impossible to read documents other than those who have access to the MS-word document. This allows you to control access to the MS-word document. A user with access to the MS-word document will be able to retrieve the modified information back to the original information so that the document can be read normally. In this paper, we design and implement experiments. In the experiment, we performed document access if MS-word document information was modified. Experimental results show that the MS-word access control system operates normally.
Keywords
MS-word; Access Control; Access Permission; Modified Data Field; Experiment;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 J. H. Youn, "Methods for investigating of edit history about MS PowerPoint files that using the OOXML formats," M.S thesis, Department of Information Management, Korea University, 2013.
2 J. H. Youn, J. H. Park, and S. J. Lee, "Methods for Investigating of Edit History about MS," Journal C of Korea Information Processing System, vol. 19, no. C, pp. 215-224, Aug. 2012.
3 W. Vugt, "Open XML The markup explained," Microsoft, Oct. 2007.
4 Y. M. Lee, H. J. Chung, and S. J. Lee, "A Study on Edit Order of Text Cells on the MS Excel Files," Journal of The Korea Institute of Information Security & Cryptology, vol. 24, no. 2, pp. 319-325, Apr. 2014.   DOI
5 H. B. Chang, S. S. Yeo, G. C. Park, and C. H. Lee, "The Study on Development of Document Security Components," Journal of Security Engineering, vol. 5. no 2, pp. 123-132, Apr. 2008.
6 Digital Forensics Wikipedia [Internet]. Available: http://forensic.korea.ac.kr/DFWIKI/index.php/%EB%AC%B8%EC%84%9C%ED%8C%8C%EC%9D%BC_%EB%82%B4%EC%9A%A9_%EB%B0%8F_%EB%82%B4%EB%B6%80_%EA%B5%AC%EC%A1%B0_%ED%99%95%EC%9D%B8_%EC%9C%A0%ED%8B%B8%EB%A6%AC%ED%8B%B0.
7 Object Linking Embedding [Internet]. Available: https://en.wikipedia.org/wiki/Object_Linking_and_Embedding.
8 S. J. Jang, "Implementation of the Access Control System for Hangul Document System," Journal of the Korea Institute of Information and Communication Engineering, vol.22, no.2, pp. 323-329, Feb. 2018.   DOI
9 Y. M. Lee, "A Study for Forensic Methods of MS Excel Files," M.S thesis, Department of Information Management, Korea University, 2014.
10 A. Ziad, A. H. Bagci, T. Zaitoun, and A. Asad, "Towards the Memory Forensics of MS Word Documents," Advances in Intelligent Systems and Computing, vol. 558, pp 179-185, July 2017.
11 S. Park, and K. Jang, "Cases Analysis and Implications of Personal Information Leaking in focusing on precedent cases," Journal of Security Engineering, vol.13, no.3, pp. 249-260, Jun. 2016.   DOI