Quaestor has several ways to protect and encrypt knowledge based systems. This protection can be divided into:
Click here to download an Excel sheet presenting a matrix of possibilities and limitations for the different user levels.
Without any specific action, user rights of any knowledge based system is based on your user type/level. In short: an End-User and Domain Expert are only able to open (protected or unprotected) projects and will never be able to open a knowledge base. Furthermore, an End-User cannot see detailed information about relations (knowledge). A Knowledge Engineer can do anything with a protected or unprotected knowledge base and project (if the appropriate password is available).
After saving and reopening, every knowledge base is by default protected against removing frames. You always have to remove protection (either the password protection or the default protection) by selecting Unprotect file in the File menu.
Please note that a user of the demo/reader version of Quaestor (which can be downloaded for free...) is Knowledge Engineer and thus can see knowledge and modify a knowledge base in unprotected knowledge bases with the only limitation that this knowledge base should be smaller than 100 frames. Thus with a reader version any knowledge base smaller than 100 frames without any specific password protection can be modified and all its relations etc. can be seen. When a reader version opens a knowledge base larger than 100 frames, all knowledge can be viewed and modified but this knowledge base cannot be saved. Realise this when sharing important/proprietary knowledge bases...
...
To limit the user type/level for a specific knowledge base, a Knowledge Engineer can protect the knowledge base with a password. This enables the downgrade of user type/level for users (and Knowledge Engineers working in a project).
...
When you want to make sure that (in addition to the protection above...) only specific users can start the knowledge base, you can encrypt the knowledge base file itself. When protected, only users with the correct decryption key are able to open the knowledge base.
...
...
Every project can be protected in two ways:
...