In this paper, we present a specification model and a verification methodology for security policies in distributed CSCW systems. To express security and coordination requirements in decentralized CSCW systems, a role-based specification model is developed. We show how dynamic security requirements in collaboration environments are expressed in this specification model. Given global security requirements, verification of a specification ensures correctness and consistency of the specification. The goal of our methodology is to ensure that sensitive security requirements cannot be violated in decentralized management of a collaboration involving multiple security domains where all the participating users in the collaboration may not...
Ensuring secure and authorized access to remote services and information resources in a dynamic coll...
A large extent of today's computer programs is distributed. For instance, services for backups, fil...
Today's computer systems and applications are based on a globally internet worked infrastructure, co...
CSCW systems provide computer support to facilitate cooperation between users. This paper proposes a...
Abstract. Provable security guarantees for software systems are highly desirable. Our work aims at i...
Abstract. Although security has been recognized as an increasingly important and critical issue for ...
In a distributed component based system, it is important to model and specify the QoS (quality of se...
This report proposes a security model designed to support cooperative tasks in which the security of...
Prevalent authentication and authorization models for distributed systems provide for the protectio...
Modern distributed systems require collaborations between individual organizations. The collaboratio...
In this paper, we discuss security issues of Web based CSCW systems and describe a conceptual model ...
In this paper, we discuss security issues of Web based CSCW systems and describe a conceptual model ...
There is a growing need to support secure interaction among autonomous domains/systems for developin...
Authorization plays an essential role to ensure the security of a wide variety of computing and IT s...
In trust negotiation and other forms of distributed proving, networked entities cooperate to form pr...
Ensuring secure and authorized access to remote services and information resources in a dynamic coll...
A large extent of today's computer programs is distributed. For instance, services for backups, fil...
Today's computer systems and applications are based on a globally internet worked infrastructure, co...
CSCW systems provide computer support to facilitate cooperation between users. This paper proposes a...
Abstract. Provable security guarantees for software systems are highly desirable. Our work aims at i...
Abstract. Although security has been recognized as an increasingly important and critical issue for ...
In a distributed component based system, it is important to model and specify the QoS (quality of se...
This report proposes a security model designed to support cooperative tasks in which the security of...
Prevalent authentication and authorization models for distributed systems provide for the protectio...
Modern distributed systems require collaborations between individual organizations. The collaboratio...
In this paper, we discuss security issues of Web based CSCW systems and describe a conceptual model ...
In this paper, we discuss security issues of Web based CSCW systems and describe a conceptual model ...
There is a growing need to support secure interaction among autonomous domains/systems for developin...
Authorization plays an essential role to ensure the security of a wide variety of computing and IT s...
In trust negotiation and other forms of distributed proving, networked entities cooperate to form pr...
Ensuring secure and authorized access to remote services and information resources in a dynamic coll...
A large extent of today's computer programs is distributed. For instance, services for backups, fil...
Today's computer systems and applications are based on a globally internet worked infrastructure, co...