Supporting Distributed Decision Making Using Secure Distributed User Interfaces

  • Thomas Barth
  • Thomas Fielenbach
  • Mohamed Bourimi
  • Dogan Kesdogan
  • Pedro G. Villanueva
Chapter
Part of the Human-Computer Interaction Series book series (HCIS)

Abstract

In disaster situations people with different roles are cooperating to solve emerging problems. Cooperative systems providing enhanced interaction facilities in the user interface (e.g. direct manipulation techniques) could substantially support decision making especially for geographically distributed cooperating teams. Thereby, sensitive information has to be shared in a common workspace requiring different handling procedures according to the different roles involved in the process. In this paper, we propose the use of a common multilaterally secure distributed user interface to support the decision making in geographically distributed groups of professionals. The system combines a collaborative multi-pointer system with an anonymous credential security system to provide users with an easy way to share and access information in a secure way ensuring the privacy.

Keywords

CSCW HCI Distributed User Interfaces Security and Privacy ReSCUeIT WallShare 

Notes

Acknowledgments

Parts of the presented work are funded within the project ReSCUe IT supported by the German Federal Ministry of Education and Research (BMBF) and the French L’Agence nationale de la recherche (ANR) under grant #13N10964. This research has also been partially supported by the Spanish CDTI research project CENIT-2008-1019, the CICYT TIN2008-06596-C02-0 project and the regional projects with reference PPII10-0300-4174 and PII2C09-0185-1030.

References

  1. 1.
    ReSCUeIT: Robust and secure supply chain supporting IT. http://www.sichere-warenketten.de/. Accessed 7 June 2011
  2. 2.
    Villanueva, P.G., Tesoriero, R., Gallud, J.A.: Multi-pointer and collaborative system for mobile devices. In: Proceeding of Mobile HCI’10, pp. 435–438. ACM, NY, USA (2010)Google Scholar
  3. 3.
    Camenisch, J., Van Herreweghen, E.: Design and implementation of the idemix anonymous credential system. In: CCS’02: Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC, pp. 21–30 (2002)Google Scholar
  4. 4.
    Maybury, M., Wahlster, W.: Readings in Intelligent User Interfaces (Interactive Technologies). Morgan Kaufmann, San Francisco (1998)Google Scholar
  5. 5.
    Lukosch, S., Bourimi, M.: Towards an enhanced adaptability and usability of web-based collaborative systems. Int. J. Coop. Inf. Syst. 17(4), 467–494 (2008)CrossRefGoogle Scholar
  6. 6.
    Appelt, W., Mambrey, P.: Experiences with the BSCW shared workspace system as the backbone of a virtual learning environment for students. In: Proceedings of ED-MEDIA99, Seattle (1999)Google Scholar
  7. 7.
    Bourimi, M., Heupel, M., Kesdogan, D., Fielenbach, T.: Enhancing usability of privacy-respecting authentication and authorization in mobile social settings by using idemix. Research paper in the context of the EU FP7 project di.me. 2011. urn:nbn:de:hbz:467–4839. http://dokumentix.ub.uni-siegen.de/opus/volltexte/2011/483/index.html (2011). Accessed 7 June 2011
  8. 8.
    Bourimi, M., Barth, T., Haake, J.M., Ueberschär, B., Kesdogan, D.: AFFINE for enforcing earlier consideration of NFRs and human factors when building socio-technical systems following agile methodologies. In: Proceeding of the 3rd Conference on Human-Centred Software Engineering (HCSE), Berlin/Heidelberg (2010)Google Scholar

Copyright information

© Springer-Verlag London Limited 2011

Authors and Affiliations

  • Thomas Barth
    • 1
  • Thomas Fielenbach
    • 1
  • Mohamed Bourimi
    • 1
  • Dogan Kesdogan
    • 1
  • Pedro G. Villanueva
    • 2
  1. 1.Information Systems Institute – IT Security GroupUniversity of SiegenSiegenGermany
  2. 2.ISE Research group, Computing Systems DepartmentUniversity of Castilla-La ManchaAlbaceteSpain

Personalised recommendations