, Volume 42, Issue 4, pp 318–328 | Cite as

Zugriffskontrolle in Groupware — Ein nutzerorientierter Ansatz

  • Oliver Stiemerling
  • Markus Won
  • Volker Wulf
WI — Aufsatz


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [CoDo94]
    Coulouns, G.; Dollimore, J.: Re-quirements for security in cooperative work: two case studies. Technical Report 671, Department of Computer Science, Queen Mary and Westfield College, University of London, 1994 ( Scholar
  2. [CoDo95]
    Coulouns, G.; Dollimore, J.: Protection of shared objects for cooperative work. Technical Report 703, Department of Computer Science, Queen Mary and Westfield College, University of London, 1995 ( Scholar
  3. [Crem98]
    Cremers, A. B.; Kahler, H.; Pfeifer, A.; Stiemerling, O.; Wulf, V.: PoliTeam — Kokons-truktive und evolutionäre Entwicklung einer Groupware. In: Informatik Spektrum, Vol. 21, 1998, S. 194–202.Google Scholar
  4. [Rann97]
    Rannenberg, K.; Pfitzmann, A.; Müller, G.: Sicherheit, insbesondere mehrseitige IT-Sicherheit. In: Pfitzmann, G.; Müller, A. (Hrsg.): Mehrseitige Sicherheit in der Kommunikationstechnik. Addison-Wesley-Longman, Bonn 1997, S. 21–29.Google Scholar
  5. [VoKe83]
    Voydock, V. L.; Kent, S. T.: Security Mechanisms in High-Level Network Protocols. In: ACM Computing Surveys, Vol. 15, No. 2, 1983, S. 135–170.Google Scholar
  6. [DEC95]
    Digital Equipment: LinkWorks 3.0 Administration Guide. DEC 1995.Google Scholar
  7. [DeSh98]
    Dewan, P.; Shen, H.: Flexible Meta Access-Control for Collaborative Applications. Proceedings of CSCW’98, ACM Press, New York 1998, S. 247–256.Google Scholar
  8. [Elli91]
    Ellis, C.; Gibbs, S.J.; Rein, G.L.: Groupware: Some Issues, Some Experiences. In: Communications of the ACM, Vol. 44, No. 1, 1991, S. 39–58.Google Scholar
  9. [FSW81]
    Fernandez, E. B.; Summers, R. C.; Wood, C.: Database Security and Integrity. Addison Wesley, 1981, S. 65 ff.Google Scholar
  10. [GrSa86]
    Greif I.; Sarin, S.: Data Sharing in Group Work. Proceedings of CSCW ’86, ACM Press, New York 1986, S. 175–183.CrossRefGoogle Scholar
  11. [Kloe95]
    Klöckner, K.; Mambrey, P.; Sohlenkamp, M.; Prinz, W.; Fuchs, L.; Kolvenbach, S.; Pan-koke-Babatz, U.; Syri, A.: POLITeam — Bridging the Gap between Bonn and Berlin for and with the Users. Proceedings of ECSCW ’95, Kluwer, 1995, S. 17–32.Google Scholar
  12. [Lamp74]
    Lampson, B.W.: Protection. In: ACM Operating System Review, Vol. 8, 1974, S. 18–24.Google Scholar
  13. [Micr97]
    Microsoft Corporation: Microsoft Windows NT Server Version 4.0 — Die technische Referenz. Microsoft Press, 1997.Google Scholar
  14. [Mins93]
    Minsky, N. H.: A Law-Governed Protection Mechanism for Distributed Systems. Technical Report, Rutgers University, LCSR, 1996 (∼minsky/public-papers/).Google Scholar
  15. [Neme97]
    Nemeth, E.: Unix Systemverwaltung. Prentice-Hall, 1997.Google Scholar
  16. [Niel93]
    Nielsen, J.: Usability Engineering. AP Professional, New York 1993.Google Scholar
  17. [PiWu99]
    Pipek, V.; Wulf V.: POLITeam — Konzepte zur Einführung von Groupware. In: Kubicek, H et al. (Hrsg.): Multimedia@Verwal-tung-Jahrbuch, Telekommunikation und Gesellschaft. Hüthig, Heidelberg 1999, S.389–390.Google Scholar
  18. [PfWu97]
    Pfeifer, A.; Wulf, V.: Negotiating Conflicts in Active Databases. In: Proceedings of the 4th International Conference on Concurrent Engineering (CE ’97), 20.-22.8.97, Oakland University, Rochester, ML, Technomic Publishing, Lancaster 1997.Google Scholar
  19. [Rohd96]
    Rohde, M.; Pfeifer, A.; Wulf V.: Konfliktmanagement bei Vorgangsbearbeitungssystemen. In: Wirtschaftsinformatik, Nr. 2, 1996, S. 199–208.Google Scholar
  20. [Saty90]
    Satyanaranayan, M.: Scalable, secure and highly available distributed file access. In: IEEE Computer 23(5), 1990, S. 9–22.Google Scholar
  21. [ShDe92]
    Shen, H; Dewan, P.: Access Control for Collaborative Environments. In: Computer-Supported Cooperated Work ’92, Sharing Perspectives, Proceedings of the Conference on Computer Supported Cooperative Work, ACM Press, New York 1992, S. 51–58.Google Scholar
  22. [Sikk97]
    Sikkel, K.: A Group-based Authorization Model for Cooperative Systems. In: Proceedings of ECSCW ’97, Lancaster, Kluwer, 1997, S. 345–360.Google Scholar
  23. [SiSt98]
    Sikkel, K.; Stiemerling, O.: User-Oriented Authorization in Collaborative Environments. In: Proceedings of COOP ’98, 26.-29.5.98, Cannes, France, 1998, S. 175–183.Google Scholar
  24. [Stie96]
    Stiemerling, O.: Anpassbarkeit in Groupware — ein regelbasierter Ansatz. Diplomarbeit, Institut für Informatik III, Universität Bonn, http://www.informatik.uni-bonn. de/∼os/Publications/, 1996.Google Scholar
  25. [Stie97]
    Stiemerling, O.; Kahler, H.; Wulf, V.: How to Make Software Softer — Designing Tai-lorable Applications. In: Proceedings of 2nd Conference on the Design of Interactive Systems, Amsterdam (NL), ACM Press, 1997, S. 365–376.Google Scholar
  26. [StWu98]
    Stiemerling, O.; Wulf V.: Beyond ‚Yes or No’ — Extending Access Control in Groupware with Negotiation and Awareness. In: Proceedings of COOP ’98, 26.-29.5.98, Cannes, France, 1998, S. 111–120.Google Scholar
  27. [WSP99]
    Wulf V.; Stiemerlmg, O.; Pfeifer, A.: Tailoring Groupware for Different Scopes of Validity. In: Behaviour & Information, 1999.Google Scholar
  28. [Wulf74]
    Wulf, W.; Cohen, E.; Corwin, W.; Jones, A.; Levin, R.; Pierson, C.; Pollack, F.: HYDRA: The kernel of a multiprocessor operating system. In: Communication of the ACM 17(6), 1974, S. 337–345.Google Scholar
  29. [Wulf97]
    Wulf V.: Organisatorischer Wandel bei Einführung von Groupware. In: Proceedings der dritten internationalen Tagung „Wirtschaftsinformatik ’97” am 26.2.-28.2.97, Berlin, 1997, S. 167–182.Google Scholar
  30. [Wulf97a]
    Wulf, Volker: Konfliktmanagement bei Groupware. Vieweg, Braunschweig und Wiesbaden 1997.Google Scholar
  31. [Wulf98]
    Wulf, V: On Conflicts and Negotiation in Multiuser Application. In: Kent, A.; Williams, J. G. (eds.): Encyclopedia of Microcomputers. Dekker, New York 1999.Google Scholar

Copyright information

© Springer Fachmedien Wiesbaden GmbH 2000

Authors and Affiliations

  1. 1.ProSEC — Institut für Informatik IIIUniversität BonnBonnDeutschland

Personalised recommendations