Specification of secure distributed collaboration systems

Anand R Tripathi, T. Ahmed, R. Kumar

Research output: Chapter in Book/Report/Conference proceedingConference contribution

16 Scopus citations

Abstract

The focus of this paper is on a specification model for defining security and coordination policies for distributed collaboration and workflow systems. This work is motivated by the objective to build distributed collaboration systems from their high level specifications. We identify here unique requirements for secure collaboration, specifically role admission and activation constraints, separation of duties, dynamic access control, and a model for multiuser participation in a role. We present a role-based model for specifying coordination and dynamic security requirements in collaboration systems. It also supports hierarchical structuring of a large collaboration environment using the concept of activities, which define a naming scope and a protection domain to specify security and coordination policies. We have implemented this specification model in XML and used it to construct the runtime environments for distributed collaboration systems using a policy based middleware.

Original languageEnglish (US)
Title of host publicationProceedings - ISADS 2003
Subtitle of host publication6th International Symposium on Autonomous Decentralized Systems
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages149-156
Number of pages8
ISBN (Electronic)0769518761, 9780769518763
DOIs
StatePublished - Jan 1 2008
Event6th International Symposium on Autonomous Decentralized Systems, ISADS 2003 - Pisa, Italy
Duration: Apr 9 2003Apr 11 2003

Publication series

NameProceedings - ISADS 2003: 6th International Symposium on Autonomous Decentralized Systems

Other

Other6th International Symposium on Autonomous Decentralized Systems, ISADS 2003
CountryItaly
CityPisa
Period4/9/034/11/03

Keywords

  • Access control
  • Authorization
  • Collaboration
  • Collaborative work
  • Control systems
  • Middleware
  • Protection
  • Runtime environment
  • Security
  • XML

Fingerprint Dive into the research topics of 'Specification of secure distributed collaboration systems'. Together they form a unique fingerprint.

Cite this