An Access Control Framework for Multi-User Collaborative Environments

dc.contributor.authorBullock, Adrian
dc.contributor.authorBenford, Steve
dc.date.accessioned2023-06-08T11:41:46Z
dc.date.available2023-06-08T11:41:46Z
dc.date.issued1999
dc.description.abstractA vital component of any application or environment is security, and yet this is often one of the lower priorities, losing out to performance and functionality issues, if it is considered at all. This paper considers a spatial approach to enabling, understanding and managing access control that is generally applicable across a range of collaborative environments and applications. Access control is governed according to the space within which subjects and objects reside, and the ability to traverse space to get close to an object. We present a framework that enables the SPACE access model [4], previously presented as an access model solely for collaborative virtual environments, to be applied across a number of collaborative systems. This framework is exemplified through mappings of the model to 3D and 2D collaborative environments, namely Spline [1], TeamRooms [19] and Orbit [16]. One particularly interesting feature of the model is the way in which it handles group access by considering how group credentials are determined. These credentials are presented to the model in the usual manner. We conclude by presenting some limitations of our approach, and workarounds.en
dc.identifier.doi10.1145/320297.320313
dc.identifier.urihttps://dl.eusset.eu/handle/20.500.12015/4743
dc.language.isoen
dc.publisherAssociation for Computing Machinery
dc.relation.ispartofProceedings of the 1999 ACM International Conference on Supporting Group Work
dc.subjectaccess control
dc.subjectsecurity
dc.subjectcollaborative systems
dc.titleAn Access Control Framework for Multi-User Collaborative Environmentsen
gi.citation.publisherPlaceNew York, NY, USA
gi.citation.startPage140–149
gi.citations.count29
gi.citations.elementYou Chen, Bradley Malin (2011): Detection of anomalous insiders in collaborative environments via relational analysis of access logs, In: Proceedings of the first ACM conference on Data and application security and privacy, doi:10.1145/1943513.1943524
gi.citations.elementJosé L. Vivas, Carmen Fernández-Gago, Javier Lopez, Andrés Benjumea (2010): A security framework for a workflow-based grid development platform, In: Computer Standards & Interfaces 5-6(32), doi:10.1016/j.csi.2009.04.001
gi.citations.elementAdam Wójtowicz, Wojciech Cellary (2010): Representing User Privileges in Object-Oriented Virtual Reality Systems, In: IFIP Advances in Information and Communication Technology, doi:10.1007/978-3-642-11628-5_6
gi.citations.elementWilliam Tolone, Gail-Joon Ahn, Tanusree Pai, Seng-Phil Hong (2005): Access control in collaborative systems, In: ACM Computing Surveys 1(37), doi:10.1145/1057977.1057979
gi.citations.elementX.T. Cai, S. Wang, X. Lu, W.D. Li (2016): Parametric Encryption of CAD models in Cloud manufacturing environment, In: 2016 IEEE 20th International Conference on Computer Supported Cooperative Work in Design (CSCWD), doi:10.1109/cscwd.2016.7566049
gi.citations.elementPatrice Godefroid, James D. Herbsleb, Lalita Jategaonkar Jagadeesany, Du Li (2000): Ensuring privacy in presence awareness, In: Proceedings of the 2000 ACM conference on Computer supported cooperative work, doi:10.1145/358916.358963
gi.citations.elementLiang Kong, John Hale, David Greer (2012): Spatial identity awareness: Towards secure collaborative environments, In: 2012 International Conference on Collaboration Technologies and Systems (CTS), doi:10.1109/cts.2012.6261093
gi.citations.elementQuan Pham, Adrian McCullagh, Ed Dawson (2000): Consistency of User Attribute in Federated Systems, In: Lecture Notes in Computer Science, doi:10.1007/978-3-540-74409-2_19
gi.citations.elementThorsten Hampel (2005): Access Rights – The Keys to Cooperative Work/Learning, In: Lecture Notes in Computer Science, doi:10.1007/11518358_2
gi.citations.elementJoerg M. Haake, Anja Haake, Till Schümmer, Mohamed Bourimi, Britta Landgraf (2004): End-user controlled group formation and access rights management in a shared workspace system, In: Proceedings of the 2004 ACM conference on Computer supported cooperative work, doi:10.1145/1031607.1031702
gi.citations.elementMeredith Ringel, Kathy Ryall, Chia Shen, Clifton Forlines, Frederic Vernier (2004): Release, relocate, reorient, resize, In: CHI '04 Extended Abstracts on Human Factors in Computing Systems, doi:10.1145/985921.986085
gi.citations.elementTill Schümmer, Jörg M. Haake, Anja Haake (2005): A Metaphor and User Interface for Managing Access Permissions in Shared Workspace Systems, In: Lecture Notes in Computer Science, doi:10.1007/978-3-540-31842-2_25
gi.citations.elementMarcel Heupel, Mohamed Bourimi, Philipp Schwarte, Dogan Kesdogan, Thomas Barth, Pedro G. Villanueva (2013): Enhancing the Security and Usability of Dui Based Collaboration with Proof Based Access Control, In: Human–Computer Interaction Series, doi:10.1007/978-1-4471-5499-0_8
gi.citations.elementFederica Paci, Anna Squicciarini, Nicola Zannone (2018): Survey on Access Control for Community-Centered Collaborative Systems, In: ACM Computing Surveys 1(51), doi:10.1145/3146025
gi.citations.elementChunhua Gu, Xueqin Zhang (2009): A Virtual Enterprise Oriented Access Control Mechanism, In: 2009 Second International Symposium on Electronic Commerce and Security, doi:10.1109/isecs.2009.78
gi.citations.elementJassim Happa, Mashhuda Glencross, Anthony Steed (2019): Cyber Security Threats and Challenges in Collaborative Mixed-Reality, In: Frontiers in ICT, doi:10.3389/fict.2019.00005
gi.citations.elementJian Zhu, Waleed W. Smari (2008): Attribute Based Access Control and Security for Collaboration Environments, In: 2008 IEEE National Aerospace and Electronics Conference, doi:10.1109/naecon.2008.4806511
gi.citations.elementX.T Cai, F.Z He, W.D Li, X.X Li, Y.Q Wu (2013): Multi-granularity partial encryption method of CAD model, In: Proceedings of the 2013 IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD), doi:10.1109/cscwd.2013.6580934
gi.citations.elementMaurice H. ter Beek, Clarence A. Ellis, Jetty Kleijn, Grzegorz Rozenberg (2001): Team Automata for Spatial Access Control, In: ECSCW 2001, doi:10.1007/0-306-48019-0_4
gi.citations.elementErnesto J. Sallés, James Bret Michael, Michael Capps, Don McGregor, Andrzej Kapolka (2002): Security of runtime extensible virtual environments, In: Proceedings of the 4th international conference on Collaborative virtual environments, doi:10.1145/571878.571894
gi.citations.elementArno Appenzeller, Erik Krempel, Pascal Birnstill, Jürgen Beyerer (2020): Multi-user authorization for simultaneous collaborative situation analysis workspaces using XACML, In: Counterterrorism, Crime Fighting, Forensics, and Surveillance Technologies IV, doi:10.1117/12.2570824
gi.citations.elementAsma Cherif, Abdessamad Imine, Michaël Rusinowitch (2011): Optimistic access control for distributed collaborative editors, In: Proceedings of the 2011 ACM Symposium on Applied Computing, doi:10.1145/1982185.1982374
gi.citations.elementYuan Zhang, Moon Jung Chung, Hyun Kim (2004): Layer-Based Access Control Model in the Manufacturing Infrastructure and Design Automation System, In: Lecture Notes in Computer Science, doi:10.1007/978-3-540-24691-6_16
gi.citations.elementMaria B. Line, Inger Anne Tøndel, Erlend Andreas Gjære (2011): A Risk-Based Evaluation of Group Access Control Approaches in a Healthcare Setting, In: Lecture Notes in Computer Science, doi:10.1007/978-3-642-23300-5_3
gi.citations.elementMario Anzures-García, Luz A. Sánchez-Gálvez, Miguel J. Hornos, Patricia Paderewski (2009): Service-Based Layered Architectural Model for Building Collaborative Applications in Heterogeneous Environments, In: 2009 Mexican International Conference on Computer Science, doi:10.1109/enc.2009.37
gi.citations.elementRabie Barhoun, Maryam Ed-daibouni, Abdelwahed Namir (2022): An Extended Attribute-Based Access Control (ABAC) Model for Distributed Collaborative Healthcare System, In: Research Anthology on Securing Medical Systems and Records, doi:10.4018/978-1-6684-6311-6.ch046
gi.citations.elementBenjamin Aziz (2023): Analysing potential data security losses in organisations based on subsequent users logins, In: PLOS ONE 8(18), doi:10.1371/journal.pone.0286856
gi.citations.elementW.J. Tolone, R.A. Gandhi, Gail-Joon Ahn (2000): Locale-based access control: placing collaborative authorization decisions in context, In: SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483), doi:10.1109/icsmc.2003.1245632
gi.citations.elementRabie Barhoun, Maryam Ed-daibouni, Abdelwahed Namir (2019): An Extended Attribute-Based Access Control (ABAC) Model for Distributed Collaborative Healthcare System, In: International Journal of Service Science, Management, Engineering, and Technology 4(10), doi:10.4018/ijssmet.2019100105
gi.conference.locationPhoenix, Arizona, USA

Files

Collections