Skip to main content

A Group-based Authorization Model for Cooperative Systems

  • Chapter

Abstract

Requirements for access control in CSCW systems have often been stated, but groupware in use today does not meet most of these requirements. There are practical reasons for this, but one of the problems is the inherent complexity of sophisticated access control models. We propose a general authorization model that emphasizes conceptual simplicity and show that several issues—in particular negative access rights and delegation of rights—can be solved elegantly in this model.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Bentley, R., Appelt W., Busbach U., Hinrichts E., Kerr, D., Sikkel, K., Trevor, J. and Woetzel, G. (1997): “Basic Support for Cooperative Work on the World Wide Web.” International Journal of Human-Computer Interaction,special issue on novel applications of the World Wide Web, 1997 (in press).

    Google Scholar 

  • Bentley, R., Horstmann, T., Sikkel, K., and Trevor, J. (1995): “Supporting collaborative information sharing with the World Wide Web: The BSCW Shared Workspace system.” 4th International WWW Conference, Boston, December 1995, pp. 63–74.

    Google Scholar 

  • Coulouris, G. and Dollimore, J. (1994a): “Requirements for security in cooperative work: two case studies” Technical Report 671, Dept. of Computer Science, Queen Mary and Westfield College, University of London.

    Google Scholar 

  • Coulouris, G. and Dollimore, J. (1994b): “A security model for cooperative work.” Technical Report 674, Dept. of Computer Science, Queen Mary and Westfield College, University of London.

    Google Scholar 

  • Dewan, P., Choudhary, R. and Shen, H. (1994): “An Editing-Based Characterization of the Design Space of Collaborative Applications.” Journal of Organizational Computing, Vol. 4, pp. 219–239.

    Article  Google Scholar 

  • Edwards, W.K. (1996): “Policies and Roles in Collaborative Applications.” ACM Conference on Computer-Supported Cooperative Work (CSCW’96), Cambridge, Mass., pp. 11–20.

    Google Scholar 

  • Ellis, C.A., Gibbs, S.J. and Rein, G.L. (1991): Groupware: Some Issues and Experiences. Communications of the ACM, Vol. 34, No. 1, January 1991, pp. 38–58.

    Article  Google Scholar 

  • Greif, I. and San, S. (1986): Data Sharing in Group Work. ACM Conference on Computer-Supported Cooperative Work, Austin, Texas, 1986.

    Google Scholar 

  • An extended version appeared in ACM Transactions on Office Information Systems,Vol. 5 (1987), pp. 187–211.

    Google Scholar 

  • Härtig, H., Kowalski, O., Kiihnhauser, W. (1993): “The BirliX Security Architecture.” Journal of Computer Security, Vol. 2, pp. 5–21.

    Google Scholar 

  • Kanawati, R. and Riveill M. (1995): “Access Control Model for Groupware Applications.” In Allen, G., Wilkinson, J., and Wright, P. (Eds), HCI’95: People and Computers. School of Computing and Mathematics, University of Huddersfield, UK, pp. 66–71.

    Google Scholar 

  • Lampson, B.W. (1974): Protection. ACM Operating Systems Review, Vol. 8, pp. 18–24.

    Article  Google Scholar 

  • Lampson, B., Abadi, M., Burrows, M. and Wobber E. (1992): “Authentication in Distributed Systems: Theory and Practice.” ACM Transactions on Computer Systems, Vol. 10, No. 4.

    Google Scholar 

  • Mambrey, P. and Robinson, M (1995): “Preparing a speech for the minister: Notes towards understanding the role of artefacts in a flow of work.” Unpublished manuscript, GMD-FIT, Sankt Augustin, Germany.

    Google Scholar 

  • Paterson, J.F., Hill, R.D., Rohall, S.L. and Meeks, W.S. (1990): “Rendezvous: An Architecture for Synchronous Multi-User Applications.” ACM Conference on Computer-Supported Cooperative Work (CSCW’90), pp. 317–328.

    Google Scholar 

  • Sandhu, R.S., Coyne, E.J., Feinstein, H.L. and Yourman, C.E. (1996): “Role-Based Access Control Models.” IEEE Computer, February 1996, pp. 38–47.

    Google Scholar 

  • Salzer, J.H. (1974): “Protection and Control of Information Sharing in Multics.” Communications of the ACM, Vol. 17, pp. 388–402.

    Article  Google Scholar 

  • Satyanarayanan, M. (1989): “Intergrating Security in a Large Distributed System.” ACM Transactions on Computer Systems, Vol. 7, pp. 247–280.

    Article  Google Scholar 

  • Sikkel, K. (1997): “A Group-based Authorization Model for Computer-Supported Cooperative Work.” Arbeitspapiere der GMD 1055, GMD, Sankt Augustin, Germany.

    Google Scholar 

  • Shen, H. and Dewan P. (1992): “Access Control for Collaborative Environments.” ACM Conference on Computer-Supported Cooperative Work (CSCW’92), Toronto, Canada, pp. 51–58.

    Google Scholar 

  • Trevor, J., Koch, T. and Woetzel, G. (1997): “MetaWeb: Bridging the Gap between Synchronous Groupware and the WWW.” European Conference on Computer-Supported Cooperative Work (ECSCW’97), Lancaster, UK (these proceedings).

    Google Scholar 

  • Trevor, J., Rodden, T., and Mariani, J. (1994): “The Use of Adapters to Support Cooperative Sharing.” ACM Conference on Computer-Supported Cooperative Work (CSCW’94), Chapel Hill, North Carolina, pp. 219–230.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer Science+Business Media Dordrecht

About this chapter

Cite this chapter

Sikkel, K. (1997). A Group-based Authorization Model for Cooperative Systems. In: Proceedings of the Fifth European Conference on Computer Supported Cooperative Work. Springer, Dordrecht. https://doi.org/10.1007/978-94-015-7372-6_23

Download citation

  • DOI: https://doi.org/10.1007/978-94-015-7372-6_23

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-015-7374-0

  • Online ISBN: 978-94-015-7372-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics