Building Groupwares over Duplicated Object Systems
Groupware toolkits let developers build applications for synchronous and distributed computer-based conferencing. Duplicated object systems1 (or DoS), on the other hand, manage distributed objects over the Internet and, since they include high-level features such as communication facilities, load balancing, fault tolerance, and hierarchical messaging, may be leveraged as building blocks for rapidly developing groupware toolkits. This paper describes how we built such a groupware starting from a particular DoS. The system contains a run-time architecture that automatically manages the creation, interconnection, and communications of the distributed processes involved in the working sessions, a set of groupware facilities allowing users to collaborate, to take action on state changes, and to share relevant data, and a session management and user control mechanisms accommodating the group’s working style.
KeywordsLoad Balance Collaborative Work Access Control Model Execution State Computer Support Cooperative Work
Unable to display preview. Download preview PDF.
- D.F. Ferraiolo, J.F. Barkley, and D.R. Kuhn. A role based access control model and reference implementation within a corporate intranet. ACM Transactions on Information Systems Security, 1, February 1999.Google Scholar
- D.F. Ferraiolo, J. Cugini, and D.R. Kuhn. Role based access control: Features and motivations. 1995.Google Scholar
- S. Greenberg and D. Marwood. Real time groupware as a distributed system: Concurrency control and its effect on the interface. In Proceedings of the ACM CSCW 94 Conference on Computer Supported Cooperative Work, pages 207–217, October 1994.Google Scholar
- A. Karsenty and M. Beaudoin-Lafon. Slice: a logical model for shared editors. In RealTime Group Drawing and Writing Tools, pages 156–173, McGraw-Hill, New York, 1995.Google Scholar
- D.R. Kuhn. Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems. In Second ACM Workshop on Role-Based Access Control, 1997.Google Scholar
- L. Lamport. Time, clocks and the ordering of events in a distributed system. Communications of the ACM, pages 558–565, july 1978.Google Scholar
- R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman. Role-based access control models. IEEE Computer, 29(2):38–47, 1996.Google Scholar
- T. Urnes and R. Nejabi. Tools for implementing groupware: Survey and evaluation. Technical Report No. CS-94-03, York University, 1994.Google Scholar