Advertisement

Building Groupwares over Duplicated Object Systems

  • Hechmi Khlifi
  • Jocelyn Desbiens
  • Mohamed Cheriet
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2440)

Abstract

Groupware toolkits let developers build applications for synchronous and distributed computer-based conferencing. Duplicated object systems1 (or DoS), on the other hand, manage distributed objects over the Internet and, since they include high-level features such as communication facilities, load balancing, fault tolerance, and hierarchical messaging, may be leveraged as building blocks for rapidly developing groupware toolkits. This paper describes how we built such a groupware starting from a particular DoS. The system contains a run-time architecture that automatically manages the creation, interconnection, and communications of the distributed processes involved in the working sessions, a set of groupware facilities allowing users to collaborate, to take action on state changes, and to share relevant data, and a session management and user control mechanisms accommodating the group’s working style.

Keywords

Load Balance Collaborative Work Access Control Model Execution State Computer Support Cooperative Work 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    D.F. Ferraiolo, J.F. Barkley, and D.R. Kuhn. A role based access control model and reference implementation within a corporate intranet. ACM Transactions on Information Systems Security, 1, February 1999.Google Scholar
  2. [2]
    D.F. Ferraiolo, J. Cugini, and D.R. Kuhn. Role based access control: Features and motivations. 1995.Google Scholar
  3. [3]
    S. Greenberg and D. Marwood. Real time groupware as a distributed system: Concurrency control and its effect on the interface. In Proceedings of the ACM CSCW 94 Conference on Computer Supported Cooperative Work, pages 207–217, October 1994.Google Scholar
  4. [4]
    A. Karsenty and M. Beaudoin-Lafon. Slice: a logical model for shared editors. In RealTime Group Drawing and Writing Tools, pages 156–173, McGraw-Hill, New York, 1995.Google Scholar
  5. [5]
    D.R. Kuhn. Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems. In Second ACM Workshop on Role-Based Access Control, 1997.Google Scholar
  6. [6]
    L. Lamport. Time, clocks and the ordering of events in a distributed system. Communications of the ACM, pages 558–565, july 1978.Google Scholar
  7. [8]
    R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman. Role-based access control models. IEEE Computer, 29(2):38–47, 1996.Google Scholar
  8. [9]
    T. Urnes and R. Nejabi. Tools for implementing groupware: Survey and evaluation. Technical Report No. CS-94-03, York University, 1994.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2002

Authors and Affiliations

  • Hechmi Khlifi
    • 1
  • Jocelyn Desbiens
    • 1
  • Mohamed Cheriet
    • 2
  1. 1.INRS-TélécommunicationsUniversité du QuébecMontréalCanada
  2. 2.École de Technologie SupérieureUniversité du QuébecMontréalCanada

Personalised recommendations