An Extended Role-Based Access Control Model for CSCW Systems

Article Preview

Abstract:

Due to the increasing threat of network attacks, network and information security is an upmost concern for CSCW. Traditional Role-Based Access made focus on the typical roles divided according to organizational roles in CSCW. It is insufficient to have role permissions based on object types for collaborative environments. An extended role-based access control model is proposed in this article to expand role to construct the hierarchy of security domain for CSCW. The total CSCW system was called security domain. Subdomain roles inherit security domain roles. Atomic domain roles inherit subdomain roles under role constrains. All extended role and role constraint are partial ordering and are used to restrict the range of access control for all CSCW participants.

You might also be interested in these eBooks

Info:

Periodical:

Key Engineering Materials (Volumes 431-432)

Pages:

577-582

Citation:

Online since:

March 2010

Authors:

Keywords:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2010 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] H.B. Zhu and M.C. Zhou: Role-Based Collaboration and Its Kernel Mechanisms, Vol. 36 NO. 4, July (2006).

Google Scholar

[2] W. Wang: In ACM Hypertext. 1999, pp.37-46.

Google Scholar

[3] R. Sandhu, V. Bhamidipati, E. Coyne and et al.: Proceedings of the Second ACM Workshop on Role-based Access Contro1, 1997, pp.41-50.

Google Scholar

[4] D.F. Ferraiolo, R. Sandhu and S. Gavrila: ACM Trans. on Information and Systems Security (TISSEC), 2001, 4 (3), pp.224-274.

Google Scholar

[5] H. Shen and P. Dewan: In Proceedings of ACM CSCW'92, (1992).

Google Scholar

[6] W.K. Edwards: Policies and Roles in Collaborative Applications, Proceedings of CSCW'96, 1l-20, (1996).

Google Scholar

[7] K. Sikke1: Proceedings of ECSCW '97, Sept., 1997, pp.345-360.

Google Scholar

[8] W. Wang and M.J. Haake: Flexible Coordination with Cooperative Hypermedia, Proceedings of ACM Hypertext'98, June, 1998, pp.245-255.

Google Scholar

[9] C. Lin, F.J. Feng and J.H. Li: Journal of Software, 2007, 18 (4), pp.955-966.

Google Scholar