{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T19:31:16Z","timestamp":1777491076890,"version":"3.51.4"},"reference-count":19,"publisher":"SAGE Publications","issue":"1","license":[{"start":{"date-parts":[[2013,11,24]],"date-time":"2013-11-24T00:00:00Z","timestamp":1385251200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Concurrent Engineering"],"published-print":{"date-parts":[[2014,3]]},"abstract":"<jats:p>A design file can grow in size as the complexity of the target object increases. A large design file can reside in a large parallel computing system, such as a cloud computing system, and many designers can work concurrently on the same file. In such a case, it is obvious that we need some kind of protection mechanism allowing each user to access only the area of the file they are permitted to access. We take the encryption approach to ensure the safety of a file, even in the public domain such as on a cloud system, and in this article, we suggest a multi-level encryption scheme allowing each user to access a file only at the level the user has legitimate right to access. Each level of the file is encrypted with a different key, and the keys are shown only to those who have the right access permission. This article describes the necessary file format used to achieve this goal and discusses the file manipulation functions used to handle this new file format.<\/jats:p>","DOI":"10.1177\/1063293x13510010","type":"journal-article","created":{"date-parts":[[2013,11,25]],"date-time":"2013-11-25T21:48:56Z","timestamp":1385416136000},"page":"29-37","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":8,"title":["Collaborative design by sharing multiple-level encryption files"],"prefix":"10.1177","volume":"22","author":[{"given":"Ki Chang","family":"Kim","sequence":"first","affiliation":[{"name":"College of Information Technology, Inha University, Incheon, Korea"}]},{"given":"Sang Bong","family":"Yoo","sequence":"additional","affiliation":[{"name":"College of Information Technology, Inha University, Incheon, Korea"}]}],"member":"179","published-online":{"date-parts":[[2013,11,24]]},"reference":[{"key":"bibr1-1063293X13510010","unstructured":"Ausanka-Crues (2005) R Methods for access control: advances and limitations. Available at: http:\/\/www.cs.hmc.edu\/~mike\/public_html\/courses\/security\/s06\/projects\/ryan.pdf"},{"key":"bibr2-1063293X13510010","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2010.83"},{"key":"bibr3-1063293X13510010","doi-asserted-by":"publisher","DOI":"10.1016\/j.cad.2003.09.014"},{"key":"bibr4-1063293X13510010","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-739X(02)00153-X"},{"key":"bibr5-1063293X13510010","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2008.01.001"},{"key":"bibr6-1063293X13510010","doi-asserted-by":"publisher","DOI":"10.1145\/1966895.1966900"},{"key":"bibr7-1063293X13510010","unstructured":"Halcrow MA (2005) eCryptfs: an enterprise-class cryptographic filesystem for Linux. Halcrow MA. Available at: http:\/\/ecryptfs.sourceforge.net\/ecryptfs.pdf"},{"key":"bibr8-1063293X13510010","doi-asserted-by":"publisher","DOI":"10.1145\/277044.277242"},{"key":"bibr9-1063293X13510010","volume-title":"Proceedings of 7th international conference on new trends in information science and service science","author":"Kim KC","year":"2013"},{"key":"bibr10-1063293X13510010","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.155"},{"key":"bibr11-1063293X13510010","unstructured":"LKSoftWare GmbH (n.d.). Available at: http:\/\/www.lksoft.com"},{"key":"bibr12-1063293X13510010","unstructured":"SCRA (2006) STEP Application Handbook: ISO 10303. North Charleston, SC: SCRA. Available at: http:\/\/www.engen.org.au\/index_htm_files\/STEP_application_hdbk_63006_BF.pdf"},{"key":"bibr13-1063293X13510010","unstructured":"STEP Tools, Inc. (n.d.) Available at: http:\/\/www.steptools.com\/demos\/"},{"key":"bibr14-1063293X13510010","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.05.006"},{"key":"bibr15-1063293X13510010","doi-asserted-by":"publisher","DOI":"10.1115\/1.2190235"},{"key":"bibr16-1063293X13510010","volume-title":"Proceedings of the fourth IASTED international conference","author":"Wong A","year":"2007"},{"key":"bibr17-1063293X13510010","doi-asserted-by":"publisher","DOI":"10.1177\/1063293X9900700303"},{"key":"bibr18-1063293X13510010","doi-asserted-by":"publisher","DOI":"10.1177\/1063293X11435345"},{"key":"bibr19-1063293X13510010","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2012.05.001"}],"container-title":["Concurrent Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1063293X13510010","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1063293X13510010","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1063293X13510010","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T14:48:43Z","timestamp":1777387723000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/1063293X13510010"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,24]]},"references-count":19,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,3]]}},"alternative-id":["10.1177\/1063293X13510010"],"URL":"https:\/\/doi.org\/10.1177\/1063293x13510010","relation":{},"ISSN":["1063-293X","1531-2003"],"issn-type":[{"value":"1063-293X","type":"print"},{"value":"1531-2003","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,11,24]]}}}