Skip to main content

Information security concepts in Computer Supported Cooperative Work

  • Conference paper
  • First Online:
Database and Expert Systems Applications (DEXA 1995)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 978))

Included in the following conference series:

Abstract

With this paper we introduce information security aspects and concepts to the field of Computer Supported Cooperative Work (CSCW). Starting from a functional view of CSCW technology and the definition of the relevant security areas we outline a catalogue of security criteria which should be fulfilled by CSCW applications in order to increase the acceptance and reliability of such systems. Classical information security criteria such as confidentiality are adapted to the specific security requirements of CSCW applications and new security criteria being specific to CSCW applications are presented. Furthermore, we propose how to map CSCW artefacts (such as collaborative writing) onto security criteria.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. L.J. Bannon, K. Schmidt: CSCW: Four characters in search of a context. Proc. European Conference on Computer Supported Cooperative Work, Slough, 1989.

    Google Scholar 

  2. K. Bauknecht, J. Eloff, S. Teufel: Security Management in Computer Supported Cooperative Work. Internal project report, Department of Computer Science, University of Zurich, 1995.

    Google Scholar 

  3. R. Bentley, T. Rodden, P. Sawyer, I. Sommerville: Architectural Support for Cooperative Multiuser Interfaces. Computer, Vol. 27, No. 5, 1994.

    Google Scholar 

  4. Canadian Information Security Standards. Toronto, 1992.

    Google Scholar 

  5. C. Cresson Wood: Principles of secure information systems design with groupware examples. Computers & Security, No. 12, 1993.

    Google Scholar 

  6. B. D'Hauwers, et al.: Cooperative work in organisations. The Potential of Computer Supported Cooperative Work. Power, R.J.D., Springer, Berlin, 1993.

    Google Scholar 

  7. R. Holbein, S. Teufel: A Context Authentication Service for Role Based Access Control in Distributed Systems — CARDS. Proc. 11th International TC-11 Conference on Information Security IFIP/SEC95, Cape Town, 1995.

    Google Scholar 

  8. Information Technology Security Evaluation Criteria (ITSEC). Harmonised Criteria of France, Germany, the Netherlands, the United Kingdom, 1990.

    Google Scholar 

  9. K. M. Jackson, J. Hruska: Computer Security Reference Handbook. Butterworth-Heinermann, Oxford, 1992.

    Google Scholar 

  10. D. Karagiannis, F. J. Radermacher, B. Teufel, B. E. Wynne: Towards CSCW: Metalevel Environments for Enhanced Group and Organization Effectiveness. Journal of Organizational Computing, Vol. 4, No. 4, 1994.

    Google Scholar 

  11. T.-P-Liang, H. Lai, N.-S. Chen: When Client/Server Isn't Enough: Coordinating Multiple Distributed Tasks. Computer, Vol. 27, No. 5, 1994.

    Google Scholar 

  12. R. Medina-Mora, et al.: The Action Workflow Approach to Workflow Management Technology. Proc. ACM Conference on Computer Supported Cooperative Work, Toronto, 1992.

    Google Scholar 

  13. C. Ryan: Workgroup Applications. In: C. R. McLain (ed.): Network & Connectivity. Academic Press, 1994.

    Google Scholar 

  14. Trusted Computer System Evaluation Criteria. DOD 5200.28.STD, Department of Defense, 1985.

    Google Scholar 

  15. S. Teufel, C. Sauter, T. Mühlherr, K. Bauknecht: Computerunterstützung für die Gruppenarbeit. Addison-Wesley, Bonn, to be published, 1995.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Norman Revell A Min Tjoa

Rights and permissions

Reprints and permissions

Copyright information

© 1995 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Teufel, S., Eloff, J.H.P., Bauknecht, K., Karagiannis, D. (1995). Information security concepts in Computer Supported Cooperative Work. In: Revell, N., Tjoa, A.M. (eds) Database and Expert Systems Applications. DEXA 1995. Lecture Notes in Computer Science, vol 978. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0049159

Download citation

  • DOI: https://doi.org/10.1007/BFb0049159

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-60303-0

  • Online ISBN: 978-3-540-44790-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics