skip to main content
article

Access control in collaborative systems

Authors Info & Claims
Published:01 March 2005Publication History
Skip Abstract Section

Abstract

Balancing the competing goals of collaboration and security is a difficult, multidimensional problem. Collaborative systems often focus on building useful connections among people, tools, and information while security seeks to ensure the availability, confidentiality, and integrity of these same elements. In this article, we focus on one important dimension of this problem---access control. The article examines existing access control models as applied to collaboration, highlighting not only the benefits, but also the weaknesses of these models.

References

  1. Ahn, G.-J. and Sandhu, R. 2000. Role-based authorization constraints specification. ACM Trans. Inf. Syst. Secur. 3, 4 (Nov.). Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Ahn, G.-J., Sandhu, R., Kang, M., and Park, J. 2000. Injecting RBAC to secure a Web-based workflow system. In Proceedings of 5th ACM Workshop on Role-Based Access Control. Berlin, Germany. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Ahn, G.-J., Shin, D., and Zhang, L. 2004. Role-based privilege management using attribute certificates and delegation. In International Conference on Trust and Privacy in Digital Business. Lecture Notes in Computer Science. Springer-Verlag.Google ScholarGoogle Scholar
  4. Ahn, G.-J., Zhang, L., Shin, D., and Chu, B. 2003. Authorization management for role-based collaboration. In IEEE International Conference on System, Man and Cybernetic. Washington, DC. 4128--4214.Google ScholarGoogle Scholar
  5. Bertino, E., Ferrari, E., and Atluri, V. 1999. Specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Secur. 2, 1 (Feb.). Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Bertino, E., Ferrari, E., and Bonatti, P. A. 2000. TRBAC: A temporal role-based access control model. In Proceedings of 5th ACM Workshop on Role-Based Access Control. Berlin, Germany. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Brothers, L., Sembugamoorthy, V., and Muller, M. 1990. Icicle: Groupware for code inspection. In ACM Conference on Computer-Supported Cooperative Work. Los Angeles, CA. 169--181. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Bullock, A. 1998. SPACE: Spatial access control for collaborative virtual environments. PhD. thesis, University of Notingham.Google ScholarGoogle Scholar
  9. Bullock, A. and Benford, S. 1999. An access control framework for multi-user collaborative environments. In ACM GROUP. Phoenix, AZ. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Coulouris, G., Dollimore, J., and B., R. 1998. Role and task-based access control in the perdis groupware platform. In Proceedings of 3rd ACM Workshop on Role-Based Access Control. Fairfax, VA. 115--121. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Covington, M., Long, W., Srinivasan, S., Dey, A., Ahamad, M., and Abowd, G. D. 2001. Securing context-aware applications using environment roles. In ACM Symposium on Access Control Model and Technology. Chantilly, VA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Dewan, P. and Shen, H. 1998. Flexible meta-access control for collaborative applications. In ACM Conference on Computer-Supported Cooperative Work. Seattle, WA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Edwards, W. K. 1996. Policies and roles in collaborative applications. In ACM Conference on Computer-Supported Cooperative Work. Cambridge, MA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Ellis, C. A., Gibbs, S. J., and Rein, G. L. 1989. Design and use of a group editor. In International Federation for Information Processing Working Group 2.7, Working Conference on Engineering for Human-Computer Interaction. 13--28.Google ScholarGoogle Scholar
  15. Ferraiolo, D. and Barkley, J. 1997. Specifying and managing role-based access control within a corporate intranet. In Proceedings of 2nd ACM Workshop on Role-Based Access Control. Fairfax, VA. 77--82. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Ferraiolo, D. F., Barkley, J. F., and Kuhn, D. R. 1999. A role based access control model and reference implementation within a corporate intranet. ACM Trans. Inf. Syst. Secur. 2, 1 (Feb.). Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Georgiadis, C. K., Mavridis, I., Pangalos, G., and Thomas, R. 2001. Flexible team-based access control using contexts. In ACM Symposium on Access Control Model and Technology. Chantilly, VA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Grief, I. and Sarin, S. 1987. Data sharing in group work. ACM Trans. Inf. Syst. 5, 2 (April), 187--211. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Jaeger, T. 1999. On the increasing importance of constraints. In Proceedings of 4th ACM Workshop on Role-Based Access Control. Fairfax, VA. 33--42. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Jaeger, T. and Prakash, A. 1996. Requirements of role-based access control for collaborative systems. In ACM Role-based Access Control Workshop. Gaithersburg, MD. 53--64. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Kang, M. H., Park, J. S., and Froscher, J. N. 2001. Access control mechanisms for inter-organizational workflow. In ACM Symposium on Access Control Model and Technology. Chantilly, VA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Kaplan, S., Tolone, W., D.P., B., and Bignoli, C. 1992. Flexible active support for collaborative work with conversation builder. In ACM Conference on Computer-Supported Cooperative Work. Toronto, Ontario, Canada. 378--385. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Lampson, B. 1971. Protection. In 5th Princeton Symposium on Information Science and Systems. 437--443. Reprinted in ACM Operat. Syst. Rev. 8,1, 18--24, 1974. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Neuwirth, C. M., Kaufer, D. S., Chandhok, R., and Morris, J. H. 1990. Issues in the design of computer support for co-authoring and commenting. In ACM Conference on Computer-Supported Cooperative Work. Los Angeles, CA. 183--195. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Park, J., Sandhu, R., and Ahn, G.-J. 2001. Role-based access control on the web. ACM Trans. Inf. Syst. Secur. 4, 1 (Feb.). Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Sandhu, R. and Samarati, P. 1994. Access control: Principles and practice. IEEE Communications 32, 9, 40--48.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Sandhu, R. S., Coyne, E. J., Feinstein, H. L., and Youman, C. E. 1996. Role-based access control models. IEEE Computer 29, 2 (Feb.), 38--47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Shen, H. and Dewan, P. 1992. Access control for collaborative environments. In ACM Conference on Computer-Supported Cooperative Work. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Shin, D., Ahn, G.-J., and Cho, S. 2002. Role-based EAM using x.509 attribute certificate. In Proceedings of 16th Annual International Federation for Information Processing Working Group 11.3, Working Conference on Data and Application Security. Cambridge, UK.Google ScholarGoogle Scholar
  30. Sikkel, K. 1997. A group-based authorization model for cooperative systems. In ACM Conference on Computer-Supported Cooperative Work. 345--360. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Sohlenkamp, M. and Chwelos, G. 1994. Integrating communication, cooperation, and awareness: The diva virtual office environment. In ACM Conference on Computer Supported Cooperative Work. Chapel Hill, NC. 331--343. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Thomas, R. 1997. Team-based access control (TMAC). In Proceedings of 2nd ACM Workshop on Role-Based Access Control. Fairfax, VA. 13--19. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Thomas, R. and Sandhu, R. 1997. Task-based authorization controls (TBAC): Models for active and enterprise-oriented authorization management. In Database Security XI: Status and Prospects, T. Y. Lin and X. Qian, Eds. North-Holland. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Thomas, R. and Sandhu, R. S. 1994. Conceptual foundations for a model of task-based authorizations. In Proceedings of 7th IEEE Computer Security Foundations Workshop. Franconia, NH. 66--79.Google ScholarGoogle Scholar
  35. Wang, W. 1999. Team-and-role-based organizational context and access control for cooperative hypermedia environments. In ACM Hypertext. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Yao, W., Moody, K., and Bacon, J. 2001. A model of oasis role-based access control and its support for active security. In ACM Symposium on Access Control Model and Technology. ACM. Chantilly, VA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Zhang, L., Ahn, G.-J., and Chu, B. 2001. A rule-based framework for role-based delegation. In ACM Symposium on Access Control Model and Technology. Chantilly, VA. 153--162. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Zhang, L., Ahn, G.-J., and Chu, B. 2003. A rule-based framework for role-based delegation and revocation. ACM Trans. Inf. Syst. Secur. 6, 3 (Aug.). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Access control in collaborative systems

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Computing Surveys
        ACM Computing Surveys  Volume 37, Issue 1
        March 2005
        81 pages
        ISSN:0360-0300
        EISSN:1557-7341
        DOI:10.1145/1057977
        Issue’s Table of Contents

        Copyright © 2005 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 March 2005
        Published in csur Volume 37, Issue 1

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader