Skip to main content
Log in

Zugriffskontrolle in Groupware — Ein nutzerorientierter Ansatz

Wirtschaftsinformatik

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Literatur

  1. Coulouns, G.; Dollimore, J.: Re-quirements for security in cooperative work: two case studies. Technical Report 671, Department of Computer Science, Queen Mary and Westfield College, University of London, 1994 (http://www.dcs.qmw.ac.uk/research/distrib/).

    Google Scholar 

  2. Coulouns, G.; Dollimore, J.: Protection of shared objects for cooperative work. Technical Report 703, Department of Computer Science, Queen Mary and Westfield College, University of London, 1995 (http://www.dcs.qmw.ac.uk/research/distrib/).

    Google Scholar 

  3. Cremers, A. B.; Kahler, H.; Pfeifer, A.; Stiemerling, O.; Wulf, V.: PoliTeam — Kokons-truktive und evolutionäre Entwicklung einer Groupware. In: Informatik Spektrum, Vol. 21, 1998, S. 194–202.

    Google Scholar 

  4. Rannenberg, K.; Pfitzmann, A.; Müller, G.: Sicherheit, insbesondere mehrseitige IT-Sicherheit. In: Pfitzmann, G.; Müller, A. (Hrsg.): Mehrseitige Sicherheit in der Kommunikationstechnik. Addison-Wesley-Longman, Bonn 1997, S. 21–29.

    Google Scholar 

  5. Voydock, V. L.; Kent, S. T.: Security Mechanisms in High-Level Network Protocols. In: ACM Computing Surveys, Vol. 15, No. 2, 1983, S. 135–170.

    Google Scholar 

  6. Digital Equipment: LinkWorks 3.0 Administration Guide. DEC 1995.

    Google Scholar 

  7. Dewan, P.; Shen, H.: Flexible Meta Access-Control for Collaborative Applications. Proceedings of CSCW’98, ACM Press, New York 1998, S. 247–256.

    Google Scholar 

  8. Ellis, C.; Gibbs, S.J.; Rein, G.L.: Groupware: Some Issues, Some Experiences. In: Communications of the ACM, Vol. 44, No. 1, 1991, S. 39–58.

    Google Scholar 

  9. Fernandez, E. B.; Summers, R. C.; Wood, C.: Database Security and Integrity. Addison Wesley, 1981, S. 65 ff.

    Google Scholar 

  10. Greif I.; Sarin, S.: Data Sharing in Group Work. Proceedings of CSCW ’86, ACM Press, New York 1986, S. 175–183.

    Chapter  Google Scholar 

  11. Klöckner, K.; Mambrey, P.; Sohlenkamp, M.; Prinz, W.; Fuchs, L.; Kolvenbach, S.; Pan-koke-Babatz, U.; Syri, A.: POLITeam — Bridging the Gap between Bonn and Berlin for and with the Users. Proceedings of ECSCW ’95, Kluwer, 1995, S. 17–32.

    Google Scholar 

  12. Lampson, B.W.: Protection. In: ACM Operating System Review, Vol. 8, 1974, S. 18–24.

    Google Scholar 

  13. Microsoft Corporation: Microsoft Windows NT Server Version 4.0 — Die technische Referenz. Microsoft Press, 1997.

    Google Scholar 

  14. Minsky, N. H.: A Law-Governed Protection Mechanism for Distributed Systems. Technical Report, Rutgers University, LCSR, 1996 (http://www.cs.rutgers.edu/∼minsky/public-papers/).

    Google Scholar 

  15. Nemeth, E.: Unix Systemverwaltung. Prentice-Hall, 1997.

    Google Scholar 

  16. Nielsen, J.: Usability Engineering. AP Professional, New York 1993.

    Google Scholar 

  17. Pipek, V.; Wulf V.: POLITeam — Konzepte zur Einführung von Groupware. In: Kubicek, H et al. (Hrsg.): Multimedia@Verwal-tung-Jahrbuch, Telekommunikation und Gesellschaft. Hüthig, Heidelberg 1999, S.389–390.

    Google Scholar 

  18. Pfeifer, A.; Wulf, V.: Negotiating Conflicts in Active Databases. In: Proceedings of the 4th International Conference on Concurrent Engineering (CE ’97), 20.-22.8.97, Oakland University, Rochester, ML, Technomic Publishing, Lancaster 1997.

    Google Scholar 

  19. Rohde, M.; Pfeifer, A.; Wulf V.: Konfliktmanagement bei Vorgangsbearbeitungssystemen. In: Wirtschaftsinformatik, Nr. 2, 1996, S. 199–208.

    Google Scholar 

  20. Satyanaranayan, M.: Scalable, secure and highly available distributed file access. In: IEEE Computer 23(5), 1990, S. 9–22.

    Google Scholar 

  21. Shen, H; Dewan, P.: Access Control for Collaborative Environments. In: Computer-Supported Cooperated Work ’92, Sharing Perspectives, Proceedings of the Conference on Computer Supported Cooperative Work, ACM Press, New York 1992, S. 51–58.

    Google Scholar 

  22. Sikkel, K.: A Group-based Authorization Model for Cooperative Systems. In: Proceedings of ECSCW ’97, Lancaster, Kluwer, 1997, S. 345–360.

    Google Scholar 

  23. Sikkel, K.; Stiemerling, O.: User-Oriented Authorization in Collaborative Environments. In: Proceedings of COOP ’98, 26.-29.5.98, Cannes, France, 1998, S. 175–183.

    Google Scholar 

  24. Stiemerling, O.: Anpassbarkeit in Groupware — ein regelbasierter Ansatz. Diplomarbeit, Institut für Informatik III, Universität Bonn, http://www.informatik.uni-bonn. de/∼os/Publications/MasterThesis.ps, 1996.

    Google Scholar 

  25. Stiemerling, O.; Kahler, H.; Wulf, V.: How to Make Software Softer — Designing Tai-lorable Applications. In: Proceedings of 2nd Conference on the Design of Interactive Systems, Amsterdam (NL), ACM Press, 1997, S. 365–376.

    Google Scholar 

  26. Stiemerling, O.; Wulf V.: Beyond ‚Yes or No’ — Extending Access Control in Groupware with Negotiation and Awareness. In: Proceedings of COOP ’98, 26.-29.5.98, Cannes, France, 1998, S. 111–120.

    Google Scholar 

  27. Wulf V.; Stiemerlmg, O.; Pfeifer, A.: Tailoring Groupware for Different Scopes of Validity. In: Behaviour & Information, 1999.

    Google Scholar 

  28. Wulf, W.; Cohen, E.; Corwin, W.; Jones, A.; Levin, R.; Pierson, C.; Pollack, F.: HYDRA: The kernel of a multiprocessor operating system. In: Communication of the ACM 17(6), 1974, S. 337–345.

    Google Scholar 

  29. Wulf V.: Organisatorischer Wandel bei Einführung von Groupware. In: Proceedings der dritten internationalen Tagung „Wirtschaftsinformatik ’97” am 26.2.-28.2.97, Berlin, 1997, S. 167–182.

    Google Scholar 

  30. Wulf, Volker: Konfliktmanagement bei Groupware. Vieweg, Braunschweig und Wiesbaden 1997.

    Google Scholar 

  31. Wulf, V: On Conflicts and Negotiation in Multiuser Application. In: Kent, A.; Williams, J. G. (eds.): Encyclopedia of Microcomputers. Dekker, New York 1999.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Oliver Stiemerling.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Stiemerling, O., Won, M. & Wulf, V. Zugriffskontrolle in Groupware — Ein nutzerorientierter Ansatz. Wirtschaftsinf 42, 318–328 (2000). https://doi.org/10.1007/BF03250748

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF03250748

Navigation