A new security model for collaborative environments

作者: Mary Thompson , Marcia Perry , Deborah Agarwal , Markus Lorch

DOI:

关键词: AuthenticationWorkspaceIdentity (object-oriented programming)Computer security modelWork (electrical)Computer securityComputer-supported cooperative workComputer scienceVariety (cybernetics)Computational trust

摘要: Prevalent authentication and authorization models for distributed systems provide the protection of computer resources from unauthorized use. The rules policies that drive access decisions in such are typically configured up front require trust establishment before can be used. This approach does not work well software moderates human-to-human interaction. proposes a new model management supporting collaborative work. supports dynamic addition users to collaboration with very little initial placed into their identity incremental building relationships through endorsements established collaborators. It also recognizes strength when making decisions. By mimicking way humans build naturally support wide variety usage scenarios. Its particular lies ad-hoc collaborations ubiquitous Computer Supported Collaboration Workspace (CSCW) system locations varying levels security.

参考文章(11)
Markus Lorch, Dennis Kafura, Supporting Secure Ad-hoc User Collaboration in Grid Environments grid computing. pp. 181- 193 ,(2002) , 10.1007/3-540-36133-2_16
Sirkka L. Jarvenpaa, Dorothy E. Leidner, Communication and Trust in Global Virtual Teams Journal of Computer-Mediated Communication. ,vol. 3, pp. 0- 0 ,(2006) , 10.1111/J.1083-6101.1998.TB00080.X
Josh Boyd, In Community We Trust: Online Security Communication at eBay Journal of Computer-Mediated Communication. ,vol. 7, pp. 0- 0 ,(2006) , 10.1111/J.1083-6101.2002.TB00147.X
Abdelilah Essiari, Srilekha Mudumbai, Mary R. Thompson, Certificate-based authorization policy in a PKI environment ACM Transactions on Information and System Security. ,vol. 6, pp. 566- 588 ,(2003) , 10.1145/950191.950196
Steve Jones, Steve Marsh, Human-computer-human interaction: trust in CSCW ACM Sigchi Bulletin. ,vol. 29, pp. 36- 40 ,(1997) , 10.1145/264853.264872
David P Kormann, Aviel D Rubin, Risks of the passport single signon protocol the web conference. ,vol. 33, pp. 51- 58 ,(2000) , 10.1016/S1389-1286(00)00048-7
D. Solo, R. Housley, W. Ford, W. Polk, Internet X.509 Public Key Infrastructure Certificate and CRL Profile RFC. ,vol. 2459, pp. 1- 129 ,(1999)
L. Pearlman, V. Welch, I. Foster, C. Kesselman, S. Tuecke, A community authorization service for group collaboration policies for distributed systems and networks. pp. 50- 59 ,(2002) , 10.1109/POLICY.2002.1011293
K. Chopra, W.A. Wallace, Trust in electronic environments hawaii international conference on system sciences. pp. 331- ,(2003) , 10.1109/HICSS.2003.1174902