The access control in the perception of archivist professionals: a matter of security from institutional information

被引:0
|
作者
Sfreddo, Josiane Ayres [1 ]
Flores, Daniel [1 ]
机构
[1] Univ Fed Santa Maria, Dept Documentacao, Santa Maria, RS, Brazil
来源
PERSPECTIVAS EM CIENCIA DA INFORMACAO | 2009年 / 14卷 / 02期
关键词
Access control; Informational security; Archivist norms; Models requirements;
D O I
10.1590/S1413-99362009000200009
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
This article presents the result of a scientific investigation based on the rules used in archivist institutions for the control access, avoiding future problems. The theoretical reference of this work based on the archivist norms ISAD(G), ISO 15489, Nobrade and of the models requirements MoReq and e-ARQ. The data were collected at the Public Archives of Rio Grande do Sul State and at the Historical Archives of Porto Alegre Moyses Vellinho, both in Porto Alegre, RS.
引用
收藏
页码:121 / 140
页数:20
相关论文
共 50 条
  • [1] Access Control and Information Flow Control for Web Services Security
    Kedjar, Saadia
    Tari, Abdelkamel
    Bertok, Peter
    [J]. INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2016, 11 (01) : 44 - 76
  • [2] Health professionals' perception related to communication technologies for access to information about crack
    Novais, Maykon A. P.
    De Liberal, Marcia M. C.
    Nappo, Solange A.
    Zucchi, Paola
    [J]. INTERNATIONAL JOURNAL OF PREVENTIVE MEDICINE, 2020, 11 (01)
  • [3] Comparison and Evaluation of Information Security Models for Access Control
    Anton, Nicolae
    Nedelcu, Anisor
    [J]. ENGINEERING SOLUTIONS AND TECHNOLOGIES IN MANUFACTURING, 2014, 657 : 708 - 712
  • [4] Turnover on Information Security Professionals: Findings from Korea
    Yoo, HyeWon
    Kim, TaeSung
    [J]. PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON OPERATIONS AND SUPPLY CHAIN MANAGEMENT (ICOSCM 2010), 2010, 4 : 169 - 174
  • [5] Quantum Information-Flow Security: Noninterference and Access Control
    Ying, Mingsheng
    Feng, Yuan
    Yu, Nengkun
    [J]. 2013 IEEE 26TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2013, : 130 - 144
  • [6] A mandatory access control policy model for information security requirements
    Leiwo, J
    Gamage, C
    Zheng, YL
    [J]. PROCEEDINGS OF THE 21ST AUSTRALASIAN COMPUTER SCIENCE CONFERENCE, ACSC'98, 1998, 20 (01): : 527 - 538
  • [7] Security of archival information: the access control in state public files
    Sfreddo, Josiane Ayres
    Flores, Daniel
    [J]. PERSPECTIVAS EM CIENCIA DA INFORMACAO, 2012, 17 (02): : 158 - 178
  • [8] Access control coherence of information systems based on security constraints
    Poniszewska-Maranda, Aneta
    [J]. COMPUTER SAFETY, RELIABILTIY, AND SECURITY, PROCEEDINGS, 2006, 4166 : 412 - 425
  • [9] The hybrid model for web services security Access control and information flow control
    Kedjar, Saadia
    Tari, Abdelkamel
    [J]. 2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 194 - +
  • [10] Security constraints in access control of information system using UML language
    Poniszewska-Maranda, Aneta
    [J]. 15TH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2006, : 332 - +