ACM Transactions on Information Systems (TOIS)
ICICLE: groupware for code inspection
CSCW '90 Proceedings of the 1990 ACM conference on Computer-supported cooperative work
Issues in the design of computer support for co-authoring and commenting
CSCW '90 Proceedings of the 1990 ACM conference on Computer-supported cooperative work
Access control for collaborative environments
CSCW '92 Proceedings of the 1992 ACM conference on Computer-supported cooperative work
Flexible, active support for collaborative work with ConversationBuilder
CSCW '92 Proceedings of the 1992 ACM conference on Computer-supported cooperative work
Integrating communication, cooperation, and awareness: the DIVA virtual office environment
CSCW '94 Proceedings of the 1994 ACM conference on Computer supported cooperative work
Role-Based Access Control Models
Computer
Policies and roles in collaborative applications
CSCW '96 Proceedings of the 1996 ACM conference on Computer supported cooperative work
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Specifying and managing role-based access control within a corporate intranet
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Requirements of role-based access control for collaborative systems
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
Role and task-based access control in the PerDiS groupware platform
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
Flexible meta access-control for collaborative applications
CSCW '98 Proceedings of the 1998 ACM conference on Computer supported cooperative work
Proceedings of the tenth ACM Conference on Hypertext and hypermedia : returning to our diverse roots: returning to our diverse roots
A role-based access control model and reference implementation within a corporate intranet
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
The specification and enforcement of authorization constraints in workflow management systems
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
On the increasing importance of constraints
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
An access control framework for multi-user collaborative environments
GROUP '99 Proceedings of the international ACM SIGGROUP conference on Supporting group work
Injecting RBAC to secure a Web-based workflow system
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
TRBAC: a temporal role-based access control model
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Securing context-aware applications using environment roles
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Flexible team-based access control using contexts
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Access control mechanisms for inter-organizational workflow
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
A rule-based framework for role based delegation
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
A model of OASIS role-based access control and its support for active security
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Role-based authorization constraints specification
ACM Transactions on Information and System Security (TISSEC)
Role-based access control on the web
ACM Transactions on Information and System Security (TISSEC)
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects
ACM SIGOPS Operating Systems Review
A rule-based framework for role-based delegation and revocation
ACM Transactions on Information and System Security (TISSEC)
A group-based authorization model for cooperative systems
ECSCW'97 Proceedings of the fifth conference on European Conference on Computer-Supported Cooperative Work
Role-based control of shared application views
Proceedings of the 18th annual ACM symposium on User interface software and technology
Delegation in the role graph model
Proceedings of the eleventh ACM symposium on Access control models and technologies
A usage-based authorization framework for collaborative computing systems
Proceedings of the eleventh ACM symposium on Access control models and technologies
Science of Computer Programming
Evaluating distributed xacml policies
Proceedings of the 2007 ACM workshop on Secure web services
Automaton segmentation: a new approach to preserve privacy in xml information brokering
Proceedings of the 14th ACM conference on Computer and communications security
Toward a Usage-Based Security Framework for Collaborative Computing Systems
ACM Transactions on Information and System Security (TISSEC)
Secure content access and replication in pure P2P networks
Computer Communications
Collaboration support for bibliographic data
International Journal of Web Based Communities
Secure collaborations over message boards
International Journal of Security and Networks
Access control by action control
Proceedings of the 13th ACM symposium on Access control models and technologies
Commitment issues in delegation process
AISC '08 Proceedings of the sixth Australasian conference on Information security - Volume 81
BPEL4RBAC: An Authorisation Specification for WS-BPEL
WISE '08 Proceedings of the 9th international conference on Web Information Systems Engineering
An Annotation-Based Access Control Model and Tools for Collaborative Information Spaces
WSKS '08 Proceedings of the 1st world summit on The Knowledge Society: Emerging Technologies and Information Systems for the Knowledge Society
Uncle-Share: Annotation-Based Access Control for Cooperative and Social Systems
OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part II on On the Move to Meaningful Internet Systems
Engineering of Software-Intensive Systems: State of the Art and Research Challenges
Software-Intensive Systems and New Computing Paradigms
Supporting dynamic administration of RBAC in web-based collaborative applications during run-time
International Journal of Information and Computer Security
Level-4 SaaS applications for healthcare industry
Proceedings of the 2nd Bangalore Annual Compute Conference
Task-activity based access control for process collaboration environments
Computers in Industry
Emerging Trends in Health Care Delivery: Towards Collaborative Security for NIST RBAC
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
A Flexible Access Control Model for Distributed Collaborative Editors
SDM '09 Proceedings of the 6th VLDB Workshop on Secure Data Management
Role based access control for a medical database
SEA '07 Proceedings of the 11th IASTED International Conference on Software Engineering and Applications
A trusted decentralized access control framework for the client/server architecture
Journal of Network and Computer Applications
Fine-grained sticky provenance architecture for office documents
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
A role and attribute based access control system using semantic web technologies
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems - Volume Part II
Deriving XACML policies from business process models
WISE'07 Proceedings of the 2007 international conference on Web information systems engineering
Context RBAC/MAC access control for ubiquitous environment
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
A formal framework for adaptive access control models
Journal on data semantics IX
Trust and privacy in attribute based access control for collaboration environments
Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services
Authorization control in collaborative healthcare systems
Journal of Theoretical and Applied Electronic Commerce Research
An intelligent information sharing control system for dynamic collaborations
Proceedings of the 8th International Conference on Frontiers of Information Technology
Integrating constraints to support legally flexible business processes
Information Systems Frontiers
An approach for implementation of RBAC models with context constraint to business process systems
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
Dynamic access control administration for collaborative applications
ICCOMP'06 Proceedings of the 10th WSEAS international conference on Computers
Optimistic access control for distributed collaborative editors
Proceedings of the 2011 ACM Symposium on Applied Computing
Annotation-based access control for collaborative information spaces
Computers in Human Behavior
Role-based secure inter-operation and resource usage management in mobile grid systems
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
Architecturing conflict handling of pervasive computing resources
Proceedings of the 11th IFIP WG 6.1 international conference on Distributed applications and interoperable systems
Contextualizing security for digital long-term preservation
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
Wiki grows up: arbitrary data models, access control, and beyond
Proceedings of the 7th International Symposium on Wikis and Open Collaboration
Model of community-build system for knowledge development
ICCCI'11 Proceedings of the Third international conference on Computational collective intelligence: technologies and applications - Volume Part II
An efficient access control based on role attributes in service oriented environments
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication
Using ontology-based methods for implementing role-based access control in cooperative systems
Proceedings of the 27th Annual ACM Symposium on Applied Computing
On the Prevention of Fraud and Privacy Exposure in Process Information Flow
INFORMS Journal on Computing
Access control for semantic data federations in industrial product-lifecycle management
Computers in Industry
Securely accessing shared resources with concurrent constraint programming
SEFM'12 Proceedings of the 10th international conference on Software Engineering and Formal Methods
Information Systems and e-Business Management
Nephele: Scalable Access Control for Federated File Services
Journal of Grid Computing
An information flow control meta-model
Proceedings of the 18th ACM symposium on Access control models and technologies
Proceedings of the 2013 International Conference on Information Systems and Design of Communication
How to prevent reinventing the wheel?: design principles for project knowledge management systems
DESRIST'13 Proceedings of the 8th international conference on Design Science at the Intersection of Physical and Virtual Design
Association-Based Active Access Control models with balanced scalability and flexibility
Computers in Industry
Future Generation Computer Systems
Hi-index | 0.00 |
Balancing the competing goals of collaboration and security is a difficult, multidimensional problem. Collaborative systems often focus on building useful connections among people, tools, and information while security seeks to ensure the availability, confidentiality, and integrity of these same elements. In this article, we focus on one important dimension of this problem---access control. The article examines existing access control models as applied to collaboration, highlighting not only the benefits, but also the weaknesses of these models.