An Access Control Framework for Multi-User Collaborative Environments
Fulltext URI
Document type
Additional Information
Date
Authors
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
A vital component of any application or environment is security, and yet this is often one of the lower priorities, losing out to performance and functionality issues, if it is considered at all. This paper considers a spatial approach to enabling, understanding and managing access control that is generally applicable across a range of collaborative environments and applications. Access control is governed according to the space within which subjects and objects reside, and the ability to traverse space to get close to an object. We present a framework that enables the SPACE access model [4], previously presented as an access model solely for collaborative virtual environments, to be applied across a number of collaborative systems. This framework is exemplified through mappings of the model to 3D and 2D collaborative environments, namely Spline [1], TeamRooms [19] and Orbit [16]. One particularly interesting feature of the model is the way in which it handles group access by considering how group credentials are determined. These credentials are presented to the model in the usual manner. We conclude by presenting some limitations of our approach, and workarounds.
Description
Keywords
Citation
URI
Collections
Endorsement
Review
Supplemented By
Referenced By
Number of citations to item: 29
- Chunhua Gu, Xueqin Zhang (2009): A Virtual Enterprise Oriented Access Control Mechanism, In: 2009 Second International Symposium on Electronic Commerce and Security, doi:10.1109/isecs.2009.78
- Patrice Godefroid, James D. Herbsleb, Lalita Jategaonkar Jagadeesany, Du Li (2000): Ensuring privacy in presence awareness, In: Proceedings of the 2000 ACM conference on Computer supported cooperative work, doi:10.1145/358916.358963
- Ernesto J. Sallés, James Bret Michael, Michael Capps, Don McGregor, Andrzej Kapolka (2002): Security of runtime extensible virtual environments, In: Proceedings of the 4th international conference on Collaborative virtual environments, doi:10.1145/571878.571894
- Meredith Ringel, Kathy Ryall, Chia Shen, Clifton Forlines, Frederic Vernier (2004): Release, relocate, reorient, resize, In: CHI '04 Extended Abstracts on Human Factors in Computing Systems, doi:10.1145/985921.986085
- Mario Anzures-García, Luz A. Sánchez-Gálvez, Miguel J. Hornos, Patricia Paderewski (2009): Service-Based Layered Architectural Model for Building Collaborative Applications in Heterogeneous Environments, In: 2009 Mexican International Conference on Computer Science, doi:10.1109/enc.2009.37
- Benjamin Aziz (2023): Analysing potential data security losses in organisations based on subsequent users logins, In: PLOS ONE 8(18), doi:10.1371/journal.pone.0286856
- Marcel Heupel, Mohamed Bourimi, Philipp Schwarte, Dogan Kesdogan, Thomas Barth, Pedro G. Villanueva (2013): Enhancing the Security and Usability of Dui Based Collaboration with Proof Based Access Control, In: Human–Computer Interaction Series, doi:10.1007/978-1-4471-5499-0_8
- Jian Zhu, Waleed W. Smari (2008): Attribute Based Access Control and Security for Collaboration Environments, In: 2008 IEEE National Aerospace and Electronics Conference, doi:10.1109/naecon.2008.4806511
- Maria B. Line, Inger Anne Tøndel, Erlend Andreas Gjære (2011): A Risk-Based Evaluation of Group Access Control Approaches in a Healthcare Setting, In: Lecture Notes in Computer Science, doi:10.1007/978-3-642-23300-5_3
- Joerg M. Haake, Anja Haake, Till Schümmer, Mohamed Bourimi, Britta Landgraf (2004): End-user controlled group formation and access rights management in a shared workspace system, In: Proceedings of the 2004 ACM conference on Computer supported cooperative work, doi:10.1145/1031607.1031702
- You Chen, Bradley Malin (2011): Detection of anomalous insiders in collaborative environments via relational analysis of access logs, In: Proceedings of the first ACM conference on Data and application security and privacy, doi:10.1145/1943513.1943524
- W.J. Tolone, R.A. Gandhi, Gail-Joon Ahn (2000): Locale-based access control: placing collaborative authorization decisions in context, In: SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483), doi:10.1109/icsmc.2003.1245632
- Adam Wójtowicz, Wojciech Cellary (2010): Representing User Privileges in Object-Oriented Virtual Reality Systems, In: IFIP Advances in Information and Communication Technology, doi:10.1007/978-3-642-11628-5_6
- Arno Appenzeller, Erik Krempel, Pascal Birnstill, Jürgen Beyerer (2020): Multi-user authorization for simultaneous collaborative situation analysis workspaces using XACML, In: Counterterrorism, Crime Fighting, Forensics, and Surveillance Technologies IV, doi:10.1117/12.2570824
- Till Schümmer, Jörg M. Haake, Anja Haake (2005): A Metaphor and User Interface for Managing Access Permissions in Shared Workspace Systems, In: Lecture Notes in Computer Science, doi:10.1007/978-3-540-31842-2_25
- Rabie Barhoun, Maryam Ed-daibouni, Abdelwahed Namir (2022): An Extended Attribute-Based Access Control (ABAC) Model for Distributed Collaborative Healthcare System, In: Research Anthology on Securing Medical Systems and Records, doi:10.4018/978-1-6684-6311-6.ch046
- Jassim Happa, Mashhuda Glencross, Anthony Steed (2019): Cyber Security Threats and Challenges in Collaborative Mixed-Reality, In: Frontiers in ICT, doi:10.3389/fict.2019.00005
- Maurice H. ter Beek, Clarence A. Ellis, Jetty Kleijn, Grzegorz Rozenberg (2001): Team Automata for Spatial Access Control, In: ECSCW 2001, doi:10.1007/0-306-48019-0_4
- Yuan Zhang, Moon Jung Chung, Hyun Kim (2004): Layer-Based Access Control Model in the Manufacturing Infrastructure and Design Automation System, In: Lecture Notes in Computer Science, doi:10.1007/978-3-540-24691-6_16
- Liang Kong, John Hale, David Greer (2012): Spatial identity awareness: Towards secure collaborative environments, In: 2012 International Conference on Collaboration Technologies and Systems (CTS), doi:10.1109/cts.2012.6261093
- José L. Vivas, Carmen Fernández-Gago, Javier Lopez, Andrés Benjumea (2010): A security framework for a workflow-based grid development platform, In: Computer Standards & Interfaces 5-6(32), doi:10.1016/j.csi.2009.04.001
- X.T. Cai, S. Wang, X. Lu, W.D. Li (2016): Parametric Encryption of CAD models in Cloud manufacturing environment, In: 2016 IEEE 20th International Conference on Computer Supported Cooperative Work in Design (CSCWD), doi:10.1109/cscwd.2016.7566049
- Rabie Barhoun, Maryam Ed-daibouni, Abdelwahed Namir (2019): An Extended Attribute-Based Access Control (ABAC) Model for Distributed Collaborative Healthcare System, In: International Journal of Service Science, Management, Engineering, and Technology 4(10), doi:10.4018/ijssmet.2019100105
- Asma Cherif, Abdessamad Imine, Michaël Rusinowitch (2011): Optimistic access control for distributed collaborative editors, In: Proceedings of the 2011 ACM Symposium on Applied Computing, doi:10.1145/1982185.1982374
- Thorsten Hampel (2005): Access Rights – The Keys to Cooperative Work/Learning, In: Lecture Notes in Computer Science, doi:10.1007/11518358_2
- William Tolone, Gail-Joon Ahn, Tanusree Pai, Seng-Phil Hong (2005): Access control in collaborative systems, In: ACM Computing Surveys 1(37), doi:10.1145/1057977.1057979
- X.T Cai, F.Z He, W.D Li, X.X Li, Y.Q Wu (2013): Multi-granularity partial encryption method of CAD model, In: Proceedings of the 2013 IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD), doi:10.1109/cscwd.2013.6580934
- Quan Pham, Adrian McCullagh, Ed Dawson (2000): Consistency of User Attribute in Federated Systems, In: Lecture Notes in Computer Science, doi:10.1007/978-3-540-74409-2_19
- Federica Paci, Anna Squicciarini, Nicola Zannone (2018): Survey on Access Control for Community-Centered Collaborative Systems, In: ACM Computing Surveys 1(51), doi:10.1145/3146025