Abstract
Requirements for access control in CSCW systems have often been stated, but groupware in use today does not meet most of these requirements. There are practical reasons for this, but one of the problems is the inherent complexity of sophisticated access control models. We propose a general authorization model that emphasizes conceptual simplicity and show that several issues—in particular negative access rights and delegation of rights—can be solved elegantly in this model.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bentley, R., Appelt W., Busbach U., Hinrichts E., Kerr, D., Sikkel, K., Trevor, J. and Woetzel, G. (1997): “Basic Support for Cooperative Work on the World Wide Web.” International Journal of Human-Computer Interaction,special issue on novel applications of the World Wide Web, 1997 (in press).
Bentley, R., Horstmann, T., Sikkel, K., and Trevor, J. (1995): “Supporting collaborative information sharing with the World Wide Web: The BSCW Shared Workspace system.” 4th International WWW Conference, Boston, December 1995, pp. 63–74.
Coulouris, G. and Dollimore, J. (1994a): “Requirements for security in cooperative work: two case studies” Technical Report 671, Dept. of Computer Science, Queen Mary and Westfield College, University of London.
Coulouris, G. and Dollimore, J. (1994b): “A security model for cooperative work.” Technical Report 674, Dept. of Computer Science, Queen Mary and Westfield College, University of London.
Dewan, P., Choudhary, R. and Shen, H. (1994): “An Editing-Based Characterization of the Design Space of Collaborative Applications.” Journal of Organizational Computing, Vol. 4, pp. 219–239.
Edwards, W.K. (1996): “Policies and Roles in Collaborative Applications.” ACM Conference on Computer-Supported Cooperative Work (CSCW’96), Cambridge, Mass., pp. 11–20.
Ellis, C.A., Gibbs, S.J. and Rein, G.L. (1991): Groupware: Some Issues and Experiences. Communications of the ACM, Vol. 34, No. 1, January 1991, pp. 38–58.
Greif, I. and San, S. (1986): Data Sharing in Group Work. ACM Conference on Computer-Supported Cooperative Work, Austin, Texas, 1986.
An extended version appeared in ACM Transactions on Office Information Systems,Vol. 5 (1987), pp. 187–211.
Härtig, H., Kowalski, O., Kiihnhauser, W. (1993): “The BirliX Security Architecture.” Journal of Computer Security, Vol. 2, pp. 5–21.
Kanawati, R. and Riveill M. (1995): “Access Control Model for Groupware Applications.” In Allen, G., Wilkinson, J., and Wright, P. (Eds), HCI’95: People and Computers. School of Computing and Mathematics, University of Huddersfield, UK, pp. 66–71.
Lampson, B.W. (1974): Protection. ACM Operating Systems Review, Vol. 8, pp. 18–24.
Lampson, B., Abadi, M., Burrows, M. and Wobber E. (1992): “Authentication in Distributed Systems: Theory and Practice.” ACM Transactions on Computer Systems, Vol. 10, No. 4.
Mambrey, P. and Robinson, M (1995): “Preparing a speech for the minister: Notes towards understanding the role of artefacts in a flow of work.” Unpublished manuscript, GMD-FIT, Sankt Augustin, Germany.
Paterson, J.F., Hill, R.D., Rohall, S.L. and Meeks, W.S. (1990): “Rendezvous: An Architecture for Synchronous Multi-User Applications.” ACM Conference on Computer-Supported Cooperative Work (CSCW’90), pp. 317–328.
Sandhu, R.S., Coyne, E.J., Feinstein, H.L. and Yourman, C.E. (1996): “Role-Based Access Control Models.” IEEE Computer, February 1996, pp. 38–47.
Salzer, J.H. (1974): “Protection and Control of Information Sharing in Multics.” Communications of the ACM, Vol. 17, pp. 388–402.
Satyanarayanan, M. (1989): “Intergrating Security in a Large Distributed System.” ACM Transactions on Computer Systems, Vol. 7, pp. 247–280.
Sikkel, K. (1997): “A Group-based Authorization Model for Computer-Supported Cooperative Work.” Arbeitspapiere der GMD 1055, GMD, Sankt Augustin, Germany.
Shen, H. and Dewan P. (1992): “Access Control for Collaborative Environments.” ACM Conference on Computer-Supported Cooperative Work (CSCW’92), Toronto, Canada, pp. 51–58.
Trevor, J., Koch, T. and Woetzel, G. (1997): “MetaWeb: Bridging the Gap between Synchronous Groupware and the WWW.” European Conference on Computer-Supported Cooperative Work (ECSCW’97), Lancaster, UK (these proceedings).
Trevor, J., Rodden, T., and Mariani, J. (1994): “The Use of Adapters to Support Cooperative Sharing.” ACM Conference on Computer-Supported Cooperative Work (CSCW’94), Chapel Hill, North Carolina, pp. 219–230.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 1997 Springer Science+Business Media Dordrecht
About this chapter
Cite this chapter
Sikkel, K. (1997). A Group-based Authorization Model for Cooperative Systems. In: Proceedings of the Fifth European Conference on Computer Supported Cooperative Work. Springer, Dordrecht. https://doi.org/10.1007/978-94-015-7372-6_23
Download citation
DOI: https://doi.org/10.1007/978-94-015-7372-6_23
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-015-7374-0
Online ISBN: 978-94-015-7372-6
eBook Packages: Springer Book Archive