AccessControlInCollaborativeSystems

AccessControlInCollaborativeSystems - Access Control in...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Access Control in Collaborative Systems WILLIAM TOLONE, GAIL-JOON AHN, AND TANUSREE PAI University of North Carolina at Charlotte AND SENG-PHIL HONG Information and Communications University Balancing the competing goals of collaboration and security is a difficult, multidimensional problem. Collaborative systems often focus on building useful connections among people, tools, and information while security seeks to ensure the availability, confidentiality, and integrity of these same elements. In this article, we focus on one important dimension of this problem—access control. The article examines existing access control models as applied to collaboration, highlighting not only the benefits, but also the weaknesses of these models. Categories and Subject Descriptors: K.6.5 [ Management of Computing and Information System ]: Security and Protection General Terms: Management, Security Additional Key Words and Phrases: Access control, collaboration, security models 1. INTRODUCTION Collaborative systems, groupware, or multi-user applications allow groups of users to communicate and cooperate on common tasks. Example systems include a wide range of applications such as audio/video conferencing, collaborative document sharing/editing, distance learn- ing, workflow management systems, and The work of Gail-J. Ahn was partially supported by the grants from National Science Foundation (NSF-IIS- 0242393) and Department of Energy Early Career Principal Investigator Award (DE-FG02-03ER25565). Authors’ address: Department of Software and Information Systems, College of Information Technology, University of North Carolina at Charlotte, 9201 University City Blvd., Charlotte, NC 28223-0001; email: { wjtolone,gahn,tpai } @uncc.edu; url: www.sis.uncc.edu/LIISP; S.-P. Hong, Information and Communications University, Taejon, Korea; email: [email protected] Corresponding author: Dr. Gail-J. Ahn, [email protected] . Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or direct commercial advantage and that copies show this notice on the first page or initial screen of a display along with the full citation. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers, to redistribute to lists, or to use any component of this work in other works requires prior specific permission and/or a fee. Permissions may be requested from Publications Dept., ACM, Inc., 1515 Broadway, New York, NY 10036 USA, fax: + 1 (212) 869-0481, or [email protected]
View Full Document

{[ snackBarMessage ]}

Page1 / 13

AccessControlInCollaborativeSystems - Access Control in...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online