[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Access control in collaborative systems

Published: 01 March 2005 Publication History

Abstract

Balancing the competing goals of collaboration and security is a difficult, multidimensional problem. Collaborative systems often focus on building useful connections among people, tools, and information while security seeks to ensure the availability, confidentiality, and integrity of these same elements. In this article, we focus on one important dimension of this problem---access control. The article examines existing access control models as applied to collaboration, highlighting not only the benefits, but also the weaknesses of these models.

References

[1]
Ahn, G.-J. and Sandhu, R. 2000. Role-based authorization constraints specification. ACM Trans. Inf. Syst. Secur. 3, 4 (Nov.).
[2]
Ahn, G.-J., Sandhu, R., Kang, M., and Park, J. 2000. Injecting RBAC to secure a Web-based workflow system. In Proceedings of 5th ACM Workshop on Role-Based Access Control. Berlin, Germany.
[3]
Ahn, G.-J., Shin, D., and Zhang, L. 2004. Role-based privilege management using attribute certificates and delegation. In International Conference on Trust and Privacy in Digital Business. Lecture Notes in Computer Science. Springer-Verlag.
[4]
Ahn, G.-J., Zhang, L., Shin, D., and Chu, B. 2003. Authorization management for role-based collaboration. In IEEE International Conference on System, Man and Cybernetic. Washington, DC. 4128--4214.
[5]
Bertino, E., Ferrari, E., and Atluri, V. 1999. Specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Secur. 2, 1 (Feb.).
[6]
Bertino, E., Ferrari, E., and Bonatti, P. A. 2000. TRBAC: A temporal role-based access control model. In Proceedings of 5th ACM Workshop on Role-Based Access Control. Berlin, Germany.
[7]
Brothers, L., Sembugamoorthy, V., and Muller, M. 1990. Icicle: Groupware for code inspection. In ACM Conference on Computer-Supported Cooperative Work. Los Angeles, CA. 169--181.
[8]
Bullock, A. 1998. SPACE: Spatial access control for collaborative virtual environments. PhD. thesis, University of Notingham.
[9]
Bullock, A. and Benford, S. 1999. An access control framework for multi-user collaborative environments. In ACM GROUP. Phoenix, AZ.
[10]
Coulouris, G., Dollimore, J., and B., R. 1998. Role and task-based access control in the perdis groupware platform. In Proceedings of 3rd ACM Workshop on Role-Based Access Control. Fairfax, VA. 115--121.
[11]
Covington, M., Long, W., Srinivasan, S., Dey, A., Ahamad, M., and Abowd, G. D. 2001. Securing context-aware applications using environment roles. In ACM Symposium on Access Control Model and Technology. Chantilly, VA.
[12]
Dewan, P. and Shen, H. 1998. Flexible meta-access control for collaborative applications. In ACM Conference on Computer-Supported Cooperative Work. Seattle, WA.
[13]
Edwards, W. K. 1996. Policies and roles in collaborative applications. In ACM Conference on Computer-Supported Cooperative Work. Cambridge, MA.
[14]
Ellis, C. A., Gibbs, S. J., and Rein, G. L. 1989. Design and use of a group editor. In International Federation for Information Processing Working Group 2.7, Working Conference on Engineering for Human-Computer Interaction. 13--28.
[15]
Ferraiolo, D. and Barkley, J. 1997. Specifying and managing role-based access control within a corporate intranet. In Proceedings of 2nd ACM Workshop on Role-Based Access Control. Fairfax, VA. 77--82.
[16]
Ferraiolo, D. F., Barkley, J. F., and Kuhn, D. R. 1999. A role based access control model and reference implementation within a corporate intranet. ACM Trans. Inf. Syst. Secur. 2, 1 (Feb.).
[17]
Georgiadis, C. K., Mavridis, I., Pangalos, G., and Thomas, R. 2001. Flexible team-based access control using contexts. In ACM Symposium on Access Control Model and Technology. Chantilly, VA.
[18]
Grief, I. and Sarin, S. 1987. Data sharing in group work. ACM Trans. Inf. Syst. 5, 2 (April), 187--211.
[19]
Jaeger, T. 1999. On the increasing importance of constraints. In Proceedings of 4th ACM Workshop on Role-Based Access Control. Fairfax, VA. 33--42.
[20]
Jaeger, T. and Prakash, A. 1996. Requirements of role-based access control for collaborative systems. In ACM Role-based Access Control Workshop. Gaithersburg, MD. 53--64.
[21]
Kang, M. H., Park, J. S., and Froscher, J. N. 2001. Access control mechanisms for inter-organizational workflow. In ACM Symposium on Access Control Model and Technology. Chantilly, VA.
[22]
Kaplan, S., Tolone, W., D.P., B., and Bignoli, C. 1992. Flexible active support for collaborative work with conversation builder. In ACM Conference on Computer-Supported Cooperative Work. Toronto, Ontario, Canada. 378--385.
[23]
Lampson, B. 1971. Protection. In 5th Princeton Symposium on Information Science and Systems. 437--443. Reprinted in ACM Operat. Syst. Rev. 8,1, 18--24, 1974.
[24]
Neuwirth, C. M., Kaufer, D. S., Chandhok, R., and Morris, J. H. 1990. Issues in the design of computer support for co-authoring and commenting. In ACM Conference on Computer-Supported Cooperative Work. Los Angeles, CA. 183--195.
[25]
Park, J., Sandhu, R., and Ahn, G.-J. 2001. Role-based access control on the web. ACM Trans. Inf. Syst. Secur. 4, 1 (Feb.).
[26]
Sandhu, R. and Samarati, P. 1994. Access control: Principles and practice. IEEE Communications 32, 9, 40--48.
[27]
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., and Youman, C. E. 1996. Role-based access control models. IEEE Computer 29, 2 (Feb.), 38--47.
[28]
Shen, H. and Dewan, P. 1992. Access control for collaborative environments. In ACM Conference on Computer-Supported Cooperative Work.
[29]
Shin, D., Ahn, G.-J., and Cho, S. 2002. Role-based EAM using x.509 attribute certificate. In Proceedings of 16th Annual International Federation for Information Processing Working Group 11.3, Working Conference on Data and Application Security. Cambridge, UK.
[30]
Sikkel, K. 1997. A group-based authorization model for cooperative systems. In ACM Conference on Computer-Supported Cooperative Work. 345--360.
[31]
Sohlenkamp, M. and Chwelos, G. 1994. Integrating communication, cooperation, and awareness: The diva virtual office environment. In ACM Conference on Computer Supported Cooperative Work. Chapel Hill, NC. 331--343.
[32]
Thomas, R. 1997. Team-based access control (TMAC). In Proceedings of 2nd ACM Workshop on Role-Based Access Control. Fairfax, VA. 13--19.
[33]
Thomas, R. and Sandhu, R. 1997. Task-based authorization controls (TBAC): Models for active and enterprise-oriented authorization management. In Database Security XI: Status and Prospects, T. Y. Lin and X. Qian, Eds. North-Holland.
[34]
Thomas, R. and Sandhu, R. S. 1994. Conceptual foundations for a model of task-based authorizations. In Proceedings of 7th IEEE Computer Security Foundations Workshop. Franconia, NH. 66--79.
[35]
Wang, W. 1999. Team-and-role-based organizational context and access control for cooperative hypermedia environments. In ACM Hypertext.
[36]
Yao, W., Moody, K., and Bacon, J. 2001. A model of oasis role-based access control and its support for active security. In ACM Symposium on Access Control Model and Technology. ACM. Chantilly, VA.
[37]
Zhang, L., Ahn, G.-J., and Chu, B. 2001. A rule-based framework for role-based delegation. In ACM Symposium on Access Control Model and Technology. Chantilly, VA. 153--162.
[38]
Zhang, L., Ahn, G.-J., and Chu, B. 2003. A rule-based framework for role-based delegation and revocation. ACM Trans. Inf. Syst. Secur. 6, 3 (Aug.).

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Computing Surveys
ACM Computing Surveys  Volume 37, Issue 1
March 2005
81 pages
ISSN:0360-0300
EISSN:1557-7341
DOI:10.1145/1057977
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 March 2005
Published in CSUR Volume 37, Issue 1

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Access control
  2. collaboration
  3. security models

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)87
  • Downloads (Last 6 weeks)10
Reflects downloads up to 14 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Utilising blockchain technology to implement a security control method for node access to the Internet of ThingsIntelligent Decision Technologies10.3233/IDT-23013618:2(953-963)Online publication date: 1-Jan-2024
  • (2024)Transport CybersecurityWorld of Transport and Transportation10.30932/1992-3252-2023-21-6-1221:6(103-109)Online publication date: 16-Aug-2024
  • (2023)Analysing potential data security losses in organisations based on subsequent users loginsPLOS ONE10.1371/journal.pone.028685618:8(e0286856)Online publication date: 24-Aug-2023
  • (2023)A Framework for Privacy-Preserving White-Box Anomaly Detection using a Lattice-Based Access ControlProceedings of the 28th ACM Symposium on Access Control Models and Technologies10.1145/3589608.3593831(7-18)Online publication date: 24-May-2023
  • (2023)Designing secure business processes for blockchains with SecBPMN2BCFuture Generation Computer Systems10.1016/j.future.2022.11.013141:C(382-398)Online publication date: 15-Feb-2023
  • (2023)UCAT: The Uniform Categorization for Access ControlFoundations and Practice of Security10.1007/978-3-031-57540-2_1(3-14)Online publication date: 11-Dec-2023
  • (2023)Securing Collaborative Networks: Requirements of Supporting Secured Collaborative ProcessesCollaborative Networks in Digitalization and Society 5.010.1007/978-3-031-42622-3_13(177-189)Online publication date: 19-Sep-2023
  • (2022)Blockchain-Based Access Control in a Globalized Healthcare Provisioning EcosystemElectronics10.3390/electronics1117265211:17(2652)Online publication date: 25-Aug-2022
  • (2022)Access Control using Blockchain: A Taxonomy and ReviewProceedings of the 6th International Conference on Information System and Data Mining10.1145/3546157.3546165(46-54)Online publication date: 27-May-2022
  • (2022)A Security Framework for Scientific Workflow Provenance Access Control PoliciesIEEE Transactions on Services Computing10.1109/TSC.2019.292158615:1(97-109)Online publication date: 1-Jan-2022
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media