1 / 20

Enhanced Access Control for Collaborative Documents

Enhance access control in collaborative document creation to prevent conflicting changes, support text and diagrams in real-time, and ensure confidentiality and integrity. Implement novel approaches for notification, asynchronous support, and security applications. Explore future directions in graphical evaluation of shared documents. Contact: jcampbel@umbc.edu

lsanchez
Download Presentation

Enhanced Access Control for Collaborative Documents

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Enhanced Access Control for Collaborative Documents Jeffrey D. CampbellInteractive Systems Research Center Information Systems Department UMBC jcampbel@umbc.edu

  2. Introduction • Computer Supported Cooperative Work (CSCW) • Security Applications • Discussion

  3. CSCW • Collaborative Development of Documents • Text or Diagrams • Real-time What You See Is What I See

  4. CSCW Problem • Multiple people interacting with the same document can make conflicting changes • Violate social protocols • Need system support to help coordinate people • Roughly analogous to concurrency control in a database

  5. New Approach for Diagrams • System notifies users when someone acts on a shape someone else is still using • Notification can have varied results • “Still Using” determined by: • Incomplete syntax • Time, number, area, distance

  6. Asynchronous Support • Maintain list of shapes acted upon and compare divergent versions • Also supports wireless application • Particularly for syntactic rules, “in use” spans work sessions

  7. Example

  8. Security Applications • Confidentiality • Diagrams • Images • Integrity

  9. Confidentiality - Diagram • Use meaningful connections between shapes to supplement or replace traditional access control lists for the data represented by the shapes • Various levels are supported

  10. Confidentiality - Diagram Full Diagram View

  11. Confidentiality - Diagram Direct Connection to document A1

  12. Confidentiality - Diagram Only people

  13. Confidentiality - Diagram Only people and connections

  14. Confidentiality - Diagram Add A4 and see other items connected to same shape (P1) (with people and connections)

  15. Confidentiality - Diagram Add A4 and see other items directly connected to same shape (P1)

  16. Confidentiality - Diagram Add A4 and see other items connected to same shape (P1) and 1 connection

  17. Confidentiality - Diagram Add A4 and see other items connected to same shape (P1) and 2 connections

  18. Confidentiality - Image • Visible and hidden features on map • Annotations • Hidden annotations on image • Become visible after annotating same object • Could notify even if hidden

  19. Integrity • Coordination control can maintain history of actions taken • audit trail • Explicit or implicit interest areas • Notification of shared interest • Notification of intrusion (trip wire)

  20. Future Directions • Graphical evaluation of minimally different queries? • Other realistic examples? jcampbel@umbc.edu

More Related