A graph-based formalism for RBAC
ACM Transactions on Information and System Security (TISSEC)
Collaborative Virtual Environments: Digital Places and Spaces for Interaction
Collaborative Virtual Environments: Digital Places and Spaces for Interaction
A Community Authorization Service for Group Collaboration
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
A protection scheme for collaborative environments
Proceedings of the 2003 ACM symposium on Applied computing
Communications of the ACM - Multimodal interfaces that flex, adapt, and persist
Two experiences designing for effective security
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
The TLC-PP framework for delivering a Privacy Augmented Collaborative Environment (PACE)
COLCOM '07 Proceedings of the 2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing
COLCOM '07 Proceedings of the 2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing
Securing electronic medical records using biometric authentication
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Hi-index | 0.00 |
The uptake and utility of digital collaboration's continues to grow as organizaions are realizing the diverse range of benefits they provide to not only their organization as a whole but also to individual employees. However, like many information and communication technologies the implementation push often overshadows a proper evaluation of data security and information privacy risks that may be inherent with the technology. This paper details our ongoing research for addressing a number of authentication and personal entity identification issues encountered in digital collaborative architectures. We propose an authentication framework that uniquely combines both traditional and biometric methods of authentication with an additional novel audiovisual method of authentication. Further, the CASE (Combined Authentication Scheme Encapsulation) methodology provides an intuitive privacy protecting visual representation of a member entity's authentication methods, which is accessible by other member entities for help in assessing the risk of sharing 'sensitive' data with other collaboration entities.