Advertisement

Information security concepts in Computer Supported Cooperative Work

  • S. Teufel
  • J. H. P. Eloff
  • K. Bauknecht
  • D. Karagiannis
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 978)

Abstract

With this paper we introduce information security aspects and concepts to the field of Computer Supported Cooperative Work (CSCW). Starting from a functional view of CSCW technology and the definition of the relevant security areas we outline a catalogue of security criteria which should be fulfilled by CSCW applications in order to increase the acceptance and reliability of such systems. Classical information security criteria such as confidentiality are adapted to the specific security requirements of CSCW applications and new security criteria being specific to CSCW applications are presented. Furthermore, we propose how to map CSCW artefacts (such as collaborative writing) onto security criteria.

Keywords

Information security Computer Supported Cooperative Work (CSCW) security requirements security areas artefact areas CSCW applications 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    L.J. Bannon, K. Schmidt: CSCW: Four characters in search of a context. Proc. European Conference on Computer Supported Cooperative Work, Slough, 1989.Google Scholar
  2. [2]
    K. Bauknecht, J. Eloff, S. Teufel: Security Management in Computer Supported Cooperative Work. Internal project report, Department of Computer Science, University of Zurich, 1995.Google Scholar
  3. [3]
    R. Bentley, T. Rodden, P. Sawyer, I. Sommerville: Architectural Support for Cooperative Multiuser Interfaces. Computer, Vol. 27, No. 5, 1994.Google Scholar
  4. [4]
    Canadian Information Security Standards. Toronto, 1992.Google Scholar
  5. [5]
    C. Cresson Wood: Principles of secure information systems design with groupware examples. Computers & Security, No. 12, 1993.Google Scholar
  6. [6]
    B. D'Hauwers, et al.: Cooperative work in organisations. The Potential of Computer Supported Cooperative Work. Power, R.J.D., Springer, Berlin, 1993.Google Scholar
  7. [7]
    R. Holbein, S. Teufel: A Context Authentication Service for Role Based Access Control in Distributed Systems — CARDS. Proc. 11th International TC-11 Conference on Information Security IFIP/SEC95, Cape Town, 1995.Google Scholar
  8. [8]
    Information Technology Security Evaluation Criteria (ITSEC). Harmonised Criteria of France, Germany, the Netherlands, the United Kingdom, 1990.Google Scholar
  9. [9]
    K. M. Jackson, J. Hruska: Computer Security Reference Handbook. Butterworth-Heinermann, Oxford, 1992.Google Scholar
  10. [10]
    D. Karagiannis, F. J. Radermacher, B. Teufel, B. E. Wynne: Towards CSCW: Metalevel Environments for Enhanced Group and Organization Effectiveness. Journal of Organizational Computing, Vol. 4, No. 4, 1994.Google Scholar
  11. [11]
    T.-P-Liang, H. Lai, N.-S. Chen: When Client/Server Isn't Enough: Coordinating Multiple Distributed Tasks. Computer, Vol. 27, No. 5, 1994.Google Scholar
  12. [12]
    R. Medina-Mora, et al.: The Action Workflow Approach to Workflow Management Technology. Proc. ACM Conference on Computer Supported Cooperative Work, Toronto, 1992.Google Scholar
  13. [13]
    C. Ryan: Workgroup Applications. In: C. R. McLain (ed.): Network & Connectivity. Academic Press, 1994.Google Scholar
  14. [14]
    Trusted Computer System Evaluation Criteria. DOD 5200.28.STD, Department of Defense, 1985.Google Scholar
  15. [15]
    S. Teufel, C. Sauter, T. Mühlherr, K. Bauknecht: Computerunterstützung für die Gruppenarbeit. Addison-Wesley, Bonn, to be published, 1995.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1995

Authors and Affiliations

  • S. Teufel
    • 1
  • J. H. P. Eloff
    • 2
  • K. Bauknecht
    • 1
  • D. Karagiannis
    • 3
  1. 1.Department of Computer ScienceUniversity of ZurichZurichSwitzerland
  2. 2.Department of Computer ScienceRand Afrikaans UniversityAuckland ParkSouth Africa
  3. 3.Institute for Applied Computer Sciences and Information SystemsUniversity of ViennaViennaAustria

Personalised recommendations