Skip to main content
Log in

Beyond "Yes or No" - Extending Access Control in Groupware with Awareness and Negotiation

  • Published:
Group Decision and Negotiation Aims and scope Submit manuscript

Abstract

We present three scenarios concerning access to documents in three real world fields of application, which have in common that they are very difficult to support with classical anticipative access control systems. We show, how - based on a highly configurable notification and negotiation service, which is tightly integrated with a classical access control system - the common permission and denial options can be extended with awareness and negotiation and how this approach supports the three initial access scenarios. We also introduce our implementation of the notification and negotiation service in the PoliTeam project.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Coulouris, G., and J. Dollimore. (1995). “Protection of shared objects for cooperative work,” Technical Report 703, Department of Computer Science, Queen Mary and Westfield College, University of London, 1995 (http://www.dcs.qmw. ac.uk/research/distrib/).

  • Ellis, C. A., S. J. Gibbs, and G. L. Rein. (1991). “Groupware. Some Issues and Experiences,” Communications of the ACM, Vol. 34, No. 1., 39–58.

    Google Scholar 

  • Greif, I., and S. Sarin. (1986). “Data Sharing in group work,” in: Proceedings of the First Conference on Computer-Supported Cooperative Work, (ACM Press, New York), 175–183.

    Google Scholar 

  • Kahler, H. (1996). “Developing Groupware with Evolution and Participation-A Case Study”, in: Proceedings of the Participatory Design Conference 1996, Cambridge, MA, November 1996, 173-182.

  • Klöckner, K., P. Mambrey, M. Sohlenkamp, W. Prinz, L. Fuchs, S. Kolvenbach, U. Pankoke-Babatz, A. Syri. (1995). “POLITeam-Bridging the Gap between Bonn and Berlin for and with the Users,” In H. Marmolin, Y. Sundblad, K. Schmidt (eds.), Proceedings of the Second European Conference on Computer Supported Cooperative Work, Kluwer, Dordrecht, 1995, 17–32.

    Google Scholar 

  • Malone, T. W., K. R. Grant, K.-Y. Lai, R. Rao, D. Rosenblitt. (1988). “Semistructured Messages are Surprisingly Useful for Computer-Supported Coordination,” In I. Greif (ed.), CSCW: A Book of Readings, Morgan-Kaufmann Publisher, San Mateo, California, 1988, 311–334.

    Google Scholar 

  • Pfeifer, A., V. Wulf. (1997). “Negotiating Conflicts in Active Databases,” in: Proceedings of the 4th International Conference on Concurrent Engineering (CE 97), Aug. 20-22 1997, Oakland University, Rochester, MI., Technomic Publishing, Lancaster, Basel 1997, 443–450

    Google Scholar 

  • Shen, H., and P. Dewan. (1992). “Access Control for Collaborative Environments,” in: Computer-Supported Cooperated Work '92, Sharing Perspectives. Proceedings of the Conference on Computer-Supported Cooperative Work, (ACM Press, New York), 51–58.

    Google Scholar 

  • Sikkel, K. (1997). “A Group-based Authorization Model for Cooperative Systems,” in: Proceedings ECSCW '97, Lancaster, Kluwer Academic Publishers, 345–360.

    Google Scholar 

  • Stiemerling, Oliver, and Armin B. Cremers. (1997). “A user-centered approach to access control in collaborative environments,” in: Proceedings of The Second International Workshop on CSCW in Design, Nov 26-28, 1997 Bangkok, Thailand (to appear).

  • Rohde, M., V. Wulf. (1996). “An Early Evaluation of Technical Mechanisms Supporting Negotiations in Groupware,” in: Proceedings of the Second International Conference on the Design of Cooperative Systems (COOP'96), 12.-14.6.1996 in Juan les Pins, INRIA, Sophia Antipolis, 281–297.

    Google Scholar 

  • Winograd, T. (1988). “A Language/Action Perspective on the Design of Cooperative Work,” In I. Greif (ed.), CSCW: A Book of Readings, Morgan-Kaufmann Publisher, San Mateo, California, 311–334.

    Google Scholar 

  • Wulf, V. (1997). “Storing and Retrieving Documents in a Shared Workspace: Experiences from the Political Administration,” In S. Howard, J. Hammond, G. Lindgaard (eds.), Human Computer Interaction: INTERACT 97, Chapman and Hall, 469-476.

  • Wulf, V. (1999a). “On Conflicts and Negotiation in Multiuser Application,” In A. Kent, and J. G. Williams (eds.), Encyclopedia of Microcomputers, Dekker, New York, 63–88.

    Google Scholar 

  • Wulf, V. (1999b). “Evolving Cooperation when Introducing Groupware: A Self-Organization Perspective, Cybernetics and Human Knowing, 6, 55–73.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Stiemerling, O., Wulf, V. Beyond "Yes or No" - Extending Access Control in Groupware with Awareness and Negotiation. Group Decision and Negotiation 9, 221–235 (2000). https://doi.org/10.1023/A:1008787208430

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1008787208430

Navigation