Abstract
Groupware toolkits let developers build applications for synchronous and distributed computer-based conferencing. Duplicated object systems1 (or DoS), on the other hand, manage distributed objects over the Internet and, since they include high-level features such as communication facilities, load balancing, fault tolerance, and hierarchical messaging, may be leveraged as building blocks for rapidly developing groupware toolkits. This paper describes how we built such a groupware starting from a particular DoS. The system contains a run-time architecture that automatically manages the creation, interconnection, and communications of the distributed processes involved in the working sessions, a set of groupware facilities allowing users to collaborate, to take action on state changes, and to share relevant data, and a session management and user control mechanisms accommodating the group’s working style.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
D.F. Ferraiolo, J.F. Barkley, and D.R. Kuhn. A role based access control model and reference implementation within a corporate intranet. ACM Transactions on Information Systems Security, 1, February 1999.
D.F. Ferraiolo, J. Cugini, and D.R. Kuhn. Role based access control: Features and motivations. 1995.
S. Greenberg and D. Marwood. Real time groupware as a distributed system: Concurrency control and its effect on the interface. In Proceedings of the ACM CSCW 94 Conference on Computer Supported Cooperative Work, pages 207–217, October 1994.
A. Karsenty and M. Beaudoin-Lafon. Slice: a logical model for shared editors. In RealTime Group Drawing and Writing Tools, pages 156–173, McGraw-Hill, New York, 1995.
D.R. Kuhn. Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems. In Second ACM Workshop on Role-Based Access Control, 1997.
L. Lamport. Time, clocks and the ordering of events in a distributed system. Communications of the ACM, pages 558–565, july 1978.
R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman. Role-based access control models. IEEE Computer, 29(2):38–47, 1996.
T. Urnes and R. Nejabi. Tools for implementing groupware: Survey and evaluation. Technical Report No. CS-94-03, York University, 1994.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Khlifi, H., Desbiens, J., Cheriet, M. (2002). Building Groupwares over Duplicated Object Systems. In: Haake, J.M., Pino, J.A. (eds) Groupware: Design, Implementation, and Use. CRIWG 2002. Lecture Notes in Computer Science, vol 2440. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46124-8_17
Download citation
DOI: https://doi.org/10.1007/3-540-46124-8_17
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44112-0
Online ISBN: 978-3-540-46124-1
eBook Packages: Springer Book Archive