Abstract
Group applications provide ways for computer users to work together on common tasks. They are distinguished by their support for co-operative work and the provision of techniques and mechanisms for sharing and collaboration. The proliferation of group applications, which treat information as a shared entity, leads to a re-assessment of the way in which security is provided. In this paper the provision of security in group applications is addressed, and Lotus Notes — a commercial groupware product in wide use — is examined as a case study in terms of proposed security requirements for group applications.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
J. Udell. One Thumb Up, One Thumb Down. BYTE, pages 161–168, July 1993.
R. Johansen. Leading Business Teams. Addison-Wesley, 1991.
ISO7498–2. Information Processing Systems, OSI Reference Model Part 2: Security Architecture. IS07498–2, 1988.
Lotus Development Corporation. Lotus Notes: Site Planning Guide. Lotus, 1991.
Lotus Development Corporation. Notes Internals: Security (on-line documentation). Lotus, 1993.
R.L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21 (2): 120–126, February 1978.
M. Reiter, K. Birman, and L. Gong. Integrating security in a group oriented distributed system. In 1992 IEEE Computer Society Symposium on Research in Security and Privacy, May 1992.
M.K. Reiter. A Security Architecture for Fault-Tolerant Systems. Ph.D Thesis, Cornell University (TR93–1367), 1993.
O. Behrens and M. Yin. Konzepte fur das security management in groupware umgebungen. In Proceedings Workgroup Computing ‘82 Computer Supported Cooperative Work, 1992.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1995 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Hutchison, A. (1995). Security in group applications: Lotus Notes as case study. In: Eloff, J.H.P., von Solms, S.H. (eds) Information Security — the Next Decade. IFIP Advances in Information and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-34873-5_16
Download citation
DOI: https://doi.org/10.1007/978-0-387-34873-5_16
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-5041-2910-7
Online ISBN: 978-0-387-34873-5
eBook Packages: Springer Book Archive