skip to main content
10.1145/3342558.3345408acmconferencesArticle/Chapter ViewAbstractPublication PagesdocengConference Proceedingsconference-collections
short-paper

Enhanced Automated Policy Enforcement eXchange framework (eAPEX)

Published: 23 September 2019 Publication History

Abstract

In this paper, we describe an enhancement of the Automated Policy Enforcement eXchange framework (APEX) called eAPEX. eAPEX uses version-control information as the basis for a more incremental approach to scanning document text to determine if security policies are being followed. Where APEX requires a full or deep scan of the document each time an exposure operation is invoked, eAPEX usually requires only a scan of changed elements (deltas). A new scanning approach was designed and implemented. eAPEX works by combining version-aware document technology with a policy database that functions as a cache of security policy results.
eAPEX is evaluated by testing an application that was created to simulate the behavior of the proposed scannning approaches. This evaluation suggests that an incremental approach to checking document security should yield noticeable performance benefits.

References

[1]
Helen Balinsky and Steven J Simske. Secure document engineering. In Proceedings of the 11th ACM symposium on Document engineering, pages 269--272. ACM, 2011.
[2]
Steven J Simske and Helen Balinsky. Apex: Automated policy enforcement exchange. In Proceedings of the 10th ACM symposium on Document engineering, pages 139--142. ACM, 2010.
[3]
Helen Balinsky, David Subiros Perez, and Steven J Simske. System call interception framework for data leak prevention. In Enterprise Distributed Object Computing Conference (EDOC), 2011 15th IEEE International, pages 139--148. IEEE, 2011.
[4]
Cheng Thao and Ethan V Munson. Version-aware xml documents. In Proceedings of the 11th ACM symposium on Document engineering, pages 97--100. ACM, 2011.
[5]
Meenu Pandey and Ethan V Munson. Version aware libreoffice documents. In Proceedings of the 2013 ACM symposium on Document Engineering, pages 57--60. ACM, 2013.
[6]
Ahmed Shatnawi, Ethan V Munson, and Cheng Thao. Maintaining integrity and non-repudiation in secure offline documents. In Proceedings of the 2017 ACM Symposium on Document Engineering, pages 59--62. ACM, 2017.
[7]
Ding Yixiang, Peng Tao, and Jiang Minghua. Secure multiple xml documents publishing without information leakage. In Convergence Information Technology, 2007. International Conference on, pages 2114--2119. IEEE, 2007.
[8]
Elisa Bertino, Silvana Castano, and Elena Ferrari. Securing xml documents with author-x. Internet Computing, IEEE, 5:21--31, 06 2001.
[9]
Alfred V Aho and Margaret J Corasick. Efficient string matching: an aid to bibliographic search. Communications of the ACM, 18(6):333--340, 1975.
[10]
A. V. de Azevedo Filho, E. V. Munson, and Cheng Thao. Improving version-aware Word documents. In Proceedings of the 2017 ACM Symposium on Document Engineering, pages 129--132, August 2017.
[11]
Ahmed Saleh Shatnawi. Enhanced version control for unconventional applications. 2017.

Cited By

View all
  • (2022)Ransomware-Resilient Self-Healing XML DocumentsFuture Internet10.3390/fi1404011514:4(115)Online publication date: 7-Apr-2022

Index Terms

  1. Enhanced Automated Policy Enforcement eXchange framework (eAPEX)

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    DocEng '19: Proceedings of the ACM Symposium on Document Engineering 2019
    September 2019
    254 pages
    ISBN:9781450368872
    DOI:10.1145/3342558
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 23 September 2019

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Information leakage
    2. Secure document engineering
    3. Version control

    Qualifiers

    • Short-paper
    • Research
    • Refereed limited

    Conference

    DocEng '19
    Sponsor:
    DocEng '19: ACM Symposium on Document Engineering 2019
    September 23 - 26, 2019
    Berlin, Germany

    Acceptance Rates

    DocEng '19 Paper Acceptance Rate 30 of 77 submissions, 39%;
    Overall Acceptance Rate 194 of 564 submissions, 34%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 03 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Ransomware-Resilient Self-Healing XML DocumentsFuture Internet10.3390/fi1404011514:4(115)Online publication date: 7-Apr-2022

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media