Abstract
With this paper we introduce information security aspects and concepts to the field of Computer Supported Cooperative Work (CSCW). Starting from a functional view of CSCW technology and the definition of the relevant security areas we outline a catalogue of security criteria which should be fulfilled by CSCW applications in order to increase the acceptance and reliability of such systems. Classical information security criteria such as confidentiality are adapted to the specific security requirements of CSCW applications and new security criteria being specific to CSCW applications are presented. Furthermore, we propose how to map CSCW artefacts (such as collaborative writing) onto security criteria.
Preview
Unable to display preview. Download preview PDF.
References
L.J. Bannon, K. Schmidt: CSCW: Four characters in search of a context. Proc. European Conference on Computer Supported Cooperative Work, Slough, 1989.
K. Bauknecht, J. Eloff, S. Teufel: Security Management in Computer Supported Cooperative Work. Internal project report, Department of Computer Science, University of Zurich, 1995.
R. Bentley, T. Rodden, P. Sawyer, I. Sommerville: Architectural Support for Cooperative Multiuser Interfaces. Computer, Vol. 27, No. 5, 1994.
Canadian Information Security Standards. Toronto, 1992.
C. Cresson Wood: Principles of secure information systems design with groupware examples. Computers & Security, No. 12, 1993.
B. D'Hauwers, et al.: Cooperative work in organisations. The Potential of Computer Supported Cooperative Work. Power, R.J.D., Springer, Berlin, 1993.
R. Holbein, S. Teufel: A Context Authentication Service for Role Based Access Control in Distributed Systems — CARDS. Proc. 11th International TC-11 Conference on Information Security IFIP/SEC95, Cape Town, 1995.
Information Technology Security Evaluation Criteria (ITSEC). Harmonised Criteria of France, Germany, the Netherlands, the United Kingdom, 1990.
K. M. Jackson, J. Hruska: Computer Security Reference Handbook. Butterworth-Heinermann, Oxford, 1992.
D. Karagiannis, F. J. Radermacher, B. Teufel, B. E. Wynne: Towards CSCW: Metalevel Environments for Enhanced Group and Organization Effectiveness. Journal of Organizational Computing, Vol. 4, No. 4, 1994.
T.-P-Liang, H. Lai, N.-S. Chen: When Client/Server Isn't Enough: Coordinating Multiple Distributed Tasks. Computer, Vol. 27, No. 5, 1994.
R. Medina-Mora, et al.: The Action Workflow Approach to Workflow Management Technology. Proc. ACM Conference on Computer Supported Cooperative Work, Toronto, 1992.
C. Ryan: Workgroup Applications. In: C. R. McLain (ed.): Network & Connectivity. Academic Press, 1994.
Trusted Computer System Evaluation Criteria. DOD 5200.28.STD, Department of Defense, 1985.
S. Teufel, C. Sauter, T. Mühlherr, K. Bauknecht: Computerunterstützung für die Gruppenarbeit. Addison-Wesley, Bonn, to be published, 1995.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1995 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Teufel, S., Eloff, J.H.P., Bauknecht, K., Karagiannis, D. (1995). Information security concepts in Computer Supported Cooperative Work. In: Revell, N., Tjoa, A.M. (eds) Database and Expert Systems Applications. DEXA 1995. Lecture Notes in Computer Science, vol 978. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0049159
Download citation
DOI: https://doi.org/10.1007/BFb0049159
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-60303-0
Online ISBN: 978-3-540-44790-0
eBook Packages: Springer Book Archive