ABSTRACT
Data sharing is fundamental to computer-supported cooperative work: 'people share information through explicit communication channels and through their coordinated use of shared databases. Database support tools are therefore critical to the effective implementation of software for group work. This paper surveys data sharing requirements for group work, highlighting new database technologies that are especially likely to affect our ability to build computer systems supporting group work.
- Atkinson, M.P., and R.Morrison. "Procedures as Persistent Data Objects". ACM Trans. on Programming Lang. and Systems 4, 7 (Oct. 1985), 539--559.]] Google ScholarDigital Library
- Carey, M. J., D. J. DeWitt, J. E. Richardson, and E. J. Shekita. Object and File Management in the EXODUS Extensible Database System. Proc. Int Conf. Very Large Data Bases, Aug., 1986, pp. 91--100.]] Google ScholarDigital Library
- Davison, J. W., and S. B. Zdonik. A Visual Interface for a Database with Version Management. Conference on Office Information Systems, ACM, Providence, RI, October, 1986.]]Google ScholarDigital Library
- Donahue, J., and J. Widom. "Whiteboards: A Graphical Database Tool". ACM Trans. on Office Information Systems 4, 1 (January 1986), 24--41.]] Google ScholarDigital Library
- Elliott, W. D., W. A. Potas, and A. van Dam. Computer Assisted Tracing of Text Evolution. Proc. Fall Joint Computing Conference, 1971, pp. 533--540.]]Google ScholarDigital Library
- Engelbart, D. C. Authorship Provisions in Augmer IEEE COMPCON Digest of Papers, IEEE, February, 1984.]]Google Scholar
- Gifford, D. K. "Violet, an Experimental Decentralized System". Computer Networks 5, 6 (Dec 1981), 423--433. Also available as Xerox PARC technical report CSL-79--12.]]Google Scholar
- Gifford, D. K., and J. E. Donahue. Coordinating Independent Atomic Actions. IEEE COMPCON Diges of Papers, IEEE, February, 1985, pp. 92--94.]]Google Scholar
- Greif, I., R. Seliger, and W. Weihl. Atomic Data Abstractions in a Distributed Collaborative Editing System. Proceedings of the ACM Symposium on Principles of Programming Languages, St. Petersburg Florida, January, 1986.]] Google ScholarDigital Library
- Heimbigner, D., and D. McLeod. "A Federated Architecture for Information Management". ACM Trans. on Office Information Systems 3, 3 (July 1985), 253--278.]] Google ScholarDigital Library
- Katz, R. H., M. Anwarrudin, and E. Chang. A Version Server for Computer-Aided-Design Data. Prod 23rd ACM/IEEE Design Automation Conference, 1986 pp. 27--33.]] Google ScholarDigital Library
- Liskov, B., and R. Scheifler. "Guardians and Actions: Linguistic Support for Robust, Distributed Programs". ACM Trans. on Programming Lang. and Systems 5, 3 (July 1983), 381--404.]] Google ScholarDigital Library
- Liskov. B., R. Atkinson, T. Bloom, E. Moss, J. C. Schaffert, R. Scheifler, and A. Snyder. CLU Reference Manual. Lecture Notes on Computer Science Volume 114, Springer-Verlag, 1981.]] Google ScholarDigital Library
- Maier, D., and J. Stein. indexing in an Object-Oriented DBMS. Proc. Int. Workshop on Object-Oriented Database Systems, Sept., 1986 pp. 171--182.]] Google ScholarDigital Library
- Malone, T. W., K. R. Grant, and F. A. Turbak. The Information Lens: An Intelligent System for Information Sharing in Organizations. Proc. CHI'86 Conf. Human Factors in Computing Systems, April, 1986, pp. 1--8.]] Google ScholarDigital Library
- Norman, A., and M. Anderton. EMPACT: A Distributed Database Application. Proc. National Computer Conference, 1983, pp. 203--217.]]Google Scholar
- O'Brien, P.,B. Bullis, and C. Schaffert. Persistent and Shared Objects in Trellis/Owl. Proc.Int. Workshop on Object-Oriented Database Systems, Sept., 1986, pp. 113--123.]] Google ScholarDigital Library
- Reiss, S.P. "PECAN: Program Development Systems that Support Multiple Views". IEEE Trans. on Software Engineering SE-11, 3 (March 1985), 276--285.]] Google ScholarDigital Library
- Rosenthal, A., S. Heiler, U. Dayal, and F. Manola. Traversal Recursion: A Practical Approach to Supporting Recursive Applications. Proc. SIGMOD Int. Conf. Management of Data, May, 1986, pp. 166--176.]] Google ScholarDigital Library
- Sarin, S., and I. Greif. "Computer-Based Real-Time Conferences". IEEE Computer 18, 10(October 1985), 33--45. Special issue on Computer Based Multimedia Communications.]] Google ScholarDigital Library
- Seliger, R. The Design and Implementation of a Distributed Program for Collaborative Editing. Master Th., Massachusetts Institute of Technology, Sept. 1985. Also available as Laboratory for Computer Science Technical Report TR-350.]] Google ScholarDigital Library
- Skarra, A.H., S.B. Zdonik, and S.P. Reiss. An Object Server for an Object-Oriented Database System. Proc. Int. Workshop on Object-Oriented Database Systems, Sept., 1986, pp. 196--204.]] Google ScholarDigital Library
- Stefik, M., G. Foster, S. Lanning, and D. Tatar. WYSIWIS Reconsidered: Early Experiences with Multi-User Interfaces. Proc. Conf. Computer-Supported Cooperative Work, Dec., 1986.]] Google ScholarDigital Library
- Stonebraker, M., and L. A. Rowe. The Design of POSTGRES. Proc. SIGMOD Int. Conf. Management of Data, May, 1986, pp. 340--355.]] Google ScholarDigital Library
- Trigg, R. H., and M. Weiser. "TEXTNET: A Network-Based Approach to Text Handling". ACM Trans. on Office Information Systems 4,1 (January 1986), 1--23.]] Google ScholarDigital Library
- Yankelovich, N., N. Meyrowitz, and A. van Dam. "Reading and Writing the Electronic Book". IEEE Computer 18, 10 (October 1985), 15--30. Special issue on Computer-Based Multimedia Communications.]] Google ScholarDigital Library
- Data sharing in group work
Recommendations
Data sharing in group work
Data sharing is fundamental to computer-supported cooperative work: People share information through explicit communication channels and through their coordinated use of shared databases. This paper examines the data management requirements of group ...
Revisiting group oriented secret sharing schemes
AbstractIn a ( t , n ) threshold scheme any t or more shares can reconstruct the secret s, but less than t shares reveal no information about s. However, an unauthenticated adversary can pretend to be the shareholder at the reconstruction stage. If there ...
Cross-group Secret Sharing for Secure Cloud Storage Service
IMCOM '16: Proceedings of the 10th International Conference on Ubiquitous Information Management and CommunicationWith the spread of the Internet, many mobile devices are used in our daily lives, such as tablets and mobile phones. Then, personal data are often saved on data servers of the storage providers such as Amazon, Google, Yahoo, Baidu and others. In this ...
Comments