The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capab...
Data protection requirements often impede collaborations. A typical security plan requires a stand...
Abstract—The rapid expansion of the Internet means that users increasingly want to interact with eac...
As collaborative applications become more and more popular the need for appropriate security mechani...
We have developed a security model that facilitates control of resources by autonomous peers who ac...
We have developed a security model that facilitates control of resources by autonomous peers who act...
We have developed a security model that facilitates control of resources by autonomous peers who act...
In order for collaboration tools to be productive in an operational setting, an information base tha...
Abstract—The feature of collaborative applications is to utilize various resources distributed over ...
In complex, ad hoc constituted situations, people with different intentions, experiences, and expert...
In complex, ad hoc constituted situations, people with different intentions, experiences, and expert...
Prevalent authentication and authorization models for distributed systems provide for the protectio...
In this paper, we discuss security issues of Web based CSCW systems and describe a conceptual model ...
Security problems in collaboration work are less well understood than those in the business and defe...
The internet and related technologies have made multidomain collaborations a reality. Collaboration ...
In this paper, we discuss security issues of Web based CSCW systems and describe a conceptual model ...
Data protection requirements often impede collaborations. A typical security plan requires a stand...
Abstract—The rapid expansion of the Internet means that users increasingly want to interact with eac...
As collaborative applications become more and more popular the need for appropriate security mechani...
We have developed a security model that facilitates control of resources by autonomous peers who ac...
We have developed a security model that facilitates control of resources by autonomous peers who act...
We have developed a security model that facilitates control of resources by autonomous peers who act...
In order for collaboration tools to be productive in an operational setting, an information base tha...
Abstract—The feature of collaborative applications is to utilize various resources distributed over ...
In complex, ad hoc constituted situations, people with different intentions, experiences, and expert...
In complex, ad hoc constituted situations, people with different intentions, experiences, and expert...
Prevalent authentication and authorization models for distributed systems provide for the protectio...
In this paper, we discuss security issues of Web based CSCW systems and describe a conceptual model ...
Security problems in collaboration work are less well understood than those in the business and defe...
The internet and related technologies have made multidomain collaborations a reality. Collaboration ...
In this paper, we discuss security issues of Web based CSCW systems and describe a conceptual model ...
Data protection requirements often impede collaborations. A typical security plan requires a stand...
Abstract—The rapid expansion of the Internet means that users increasingly want to interact with eac...
As collaborative applications become more and more popular the need for appropriate security mechani...