Security policies in distributed CSCW and workflow systems

Tanvir Ahmed, Anand R. Tripathi

Research output: Contribution to journalArticlepeer-review

20 Scopus citations

Abstract

In this paper, multiuser collaboration systems are categorized into two groupscomputer-supported cooperative work (CSCW) and workflow systemsbased on a historic perspective of their introduction and on their emphasis on user- or process-centric interactions. The goal of the survey is to identify distinct security requirementsrelated to availability, integrity, confidentiality and privacy, and access leakageof these systems. Existing role-based security models and their limitations to express security policies in distributed CSCW and workflow systems are presented. Last, we present an overview of a framework that we have developed to specify, verify, and enforce security policies in distributed CSCW systems.

Original languageEnglish (US)
Article number5464271
Pages (from-to)1220-1231
Number of pages12
JournalIEEE Transactions on Systems, Man, and Cybernetics Part A:Systems and Humans
Volume40
Issue number6
DOIs
StatePublished - Nov 2010

Bibliographical note

Funding Information:
Manuscript received August 12, 2008; revised June 8, 2009. Date of publication May 18, 2010; date of current version October 15, 2010. This work was supported by the National Science Foundation under Grants 0082215 and 0411961. This work was part of Tanvir Ahmed’s doctoral dissertation [1]. This paper was recommended by Associate Editor M. P. Fanti.

Keywords

  • Computer-supported cooperative work (CSCW)
  • Web services
  • groupware
  • role-based access control (RBAC)
  • security models
  • security-policy specification and verification
  • workflow

Fingerprint

Dive into the research topics of 'Security policies in distributed CSCW and workflow systems'. Together they form a unique fingerprint.

Cite this