Www.isrc.umbc.edu Enhanced Access Control for Collaborative Documents Jeffrey D. Campbell Interactive Systems Research Center Information Systems Department.

Slides:



Advertisements
Similar presentations
Presentation. Contemporary Communication Fast – connects us quickly without delays Reliable – works always Global – connects us with the whole world Low.
Advertisements

What’s New in WatchGuard Dimension v1.2
An e-learning program can be discussed in terms of various components and features that can be conducive to learning environments.
Hacking Capture Save and Playback User Session Screens.
Traditional Approach to Design
DESCRIBING INPUT DEVICES
IT Project Management, Third Edition Appendix A1 Appendix A: Guide to Using Microsoft Project 2002.
Chapter 1: The Database Environment
Sizing Up the Best White Board Apps Kim Boyd and Kay Cole FBISD Digital Learning Department.
V.S. Subrahmanian University of Maryland 1 IMPACT: Future Directions (years 3 and 4)
Design of Web-based Systems IS Development: lecture 10.
1 Fostering Asynchronous Collaborative Visualization Francis T. Marchese and Natasha Brajkovska Pace University New York, NY 10038
Electrical and Computer Engineering PeopleFinder Vitaly Gordievsky Alex Trefonas Scott Richard Matt Beckford Midway Design Review.
Groupware Howell Istance. SOFT Interactive Systems Groupware n Software designed to support group working, not just to facilitate communication.
CMPUT 301: Lecture 35 Computer Assisted Collaboration Martin Jagersand Department of Computing Science University of Alberta Based on notes from Pierre.
Managing Master Data with MDS and Microsoft Excel
Rye City School District  Using Google Docs allows you to create documents, presentations, spreadsheets, forms and drawings to share, collaborate.
Visualization By: Simon Luangsisombath. Canonical Visualization  Architectural modeling notations are ways to organize information  Canonical notation.
Android Core Logging Application Keith Schneider Introduction The Core Logging application is part of a software suite that is designed to enable geologic.
New “Collaborate” Button Integrate UI directly into the browser. Preferred target: Firefox Easiest browser to extend in terms of UI.
Automated Integrations An End-to-End Solution August 15, 2008.
IT – DBMS Concepts Relational Database Theory.
ArcGIS Workflow Manager An Introduction
Internal and Confidential COGNOS 8 - Implementing Security Cognos CoE.
Regulatory Affairs Domain
HOLMES 2 System Administration Through HOLMES 2 System Administration, an incident can be configured such that access is restricted to: – specified users.
Chapter 16 The World Wide Web. 2 The Web An infrastructure of information combined and the network software used to access it Web page A document that.
ND GIS Users Conference October 26, 2006 Introduction to ArcPad: Mobile GIS Gregory Vandeberg, Ph.D. Department of Geography.
Class Instructor Name Date. Classroom Tips Class Roster – Please Sign In Class Roster – Please Sign In Internet Usage Internet Usage –Breaks and Lunch.
Groupware: Facilitation, Cooperation, & Collaboration Kristin Davis i385q/KMS November 10, 2005.
1 Web Basics Section 1.1 Compare the Internet and the Web Compare Web sites and Web pages Identify Web browser components Describe types of Web sites Section.
Microsoft SharePoint Document Libraries & Management 1.
Advanced Web Forms with Databases Programming Right from the Start with Visual Basic.NET 1/e 13.
MIS 385/MBA 664 Systems Implementation with DBMS/ Database Management Dave Salisbury ( )
14-1 © Prentice Hall, 2004 Chapter 14: OOSAD Implementation and Operation Object-Oriented Systems Analysis and Design Joey F. George, Dinesh Batra, Joseph.
Honeypot and Intrusion Detection System
Requirements Review – July 21, Requirements for CMS Patricia McBride July 21, 2005.
E.Bertino, L.Matino Object-Oriented Database Systems 1 Chapter.1 Introduction Seoul National University Department. of Computer Engineering OOPSLA Lab.
DELMIA DPM Assembly This is the Master “Presentation title” page. Type the title of your presentation in the "Presentation title” field. Cette page est.
University “Politehnica” of Bucharest I-TRACE PROJECT 2nd Partners Meeting, Potsdam, June 8-9, 2006 Artificial Intelligence and Multi-Agent Systems Laboratory.
Lemonade Requirements for Server to Client Notifications draft-ietf-lemonade-server-to-client-notifications-00.txt S. H. Maes C. Wilson Lemonade Intermediate.
Access Project 3 Notes. Introduction Maintaining the Database  Modifying the data to keep it up-to-date Restructure the Database  To change the database.
PlaceWare PlaceWare Conference Center 2000 and Meeting Center 2000 Hasan Bulut Florida State University CSIT (School of Computational Science and Information.
Copyright © 2013 Curt Hill UML Unified Modeling Language.
Slide 1 Product Line Studio TM Features used for “Customization of Documents”
Introduction to the Semantic Web and Linked Data
Computer supported cooperative work -Basic concepts
A Digital Workbook Tool to Support Asynchronous Collaboration Luis A. Guerrero (1), Cesar Collazos (2) (1) Department of Computer Science, Universidad.
Software Requirements Specification (SRS)
Electronic Student Notebook Albert Huang, Thomas Doeppner, Larry Rudolph,
Wikis Collaborative tool for building documents Anjesh Tuladhar.
Introduction Training. Training contents Introduction What is LXRMTK? How can LXRMTK be used? Where can LXRMTK be used? Who can use LXRMTK? History of.
By Mashael AlDayel Introduction to UML. What is UML? UML (Unified Modeling Language) is a graphical language that is suit-able to express software or.
Principles of Information Technology Presentation Software Copyright © Texas Education Agency, All rights reserved.
INTEGRATED SERVICES DIGITAL NETWORK
UK CropNet Software Development. UK CropNet Software Development Goals z Improve user access to data via user- friendly graphical displays. z Development.
Semantic Concurrency Control for Real-Time Diagramming
An Introduction to database system
The Database Environment
Location Information Services
Lec 3: Object-Oriented Data Modeling
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
Senior Project Spring 2018 Virtual Roll Call 4.0 Problem Solution
Process flow Kindly note: This presentation is automated – please do not click any of your mouse buttons or keyboard keys.
Dr. Jiacun Wang Department of Software Engineering Monmouth University
CAATs Design, Implementation and Documentation
Writing for Cloud Tools, Process, & D
MIS 385/MBA 664 Systems Implementation with DBMS/ Database Management
Evaluate the integral {image}
Presentation transcript:

Enhanced Access Control for Collaborative Documents Jeffrey D. Campbell Interactive Systems Research Center Information Systems Department UMBC

u Introduction Computer Supported Cooperative Work (CSCW) Security Applications Discussion

u CSCW Collaborative Development of Documents –Text or Diagrams –Real-time What You See Is What I See

u CSCW Problem Multiple people interacting with the same document can make conflicting changes Violate social protocols Need system support to help coordinate people –Roughly analogous to concurrency control in a database

u New Approach for Diagrams System notifies users when someone acts on a shape someone else is still using –Notification can have varied results “Still Using” determined by: –Incomplete syntax –Time, number, area, distance

u Asynchronous Support Maintain list of shapes acted upon and compare divergent versions –Also supports wireless application Particularly for syntactic rules, “in use” spans work sessions

u Example

Security Applications Confidentiality –Diagrams –Images Integrity

u Confidentiality - Diagram Use meaningful connections between shapes to supplement or replace traditional access control lists for the data represented by the shapes Various levels are supported

u Confidentiality - Diagram Full Diagram View

u Confidentiality - Diagram Direct Connection to document A1

u Confidentiality - Diagram Only people

u Confidentiality - Diagram Only people and connections

u Confidentiality - Diagram Add A4 and see other items connected to same shape (P1) (with people and connections)

u Confidentiality - Diagram Add A4 and see other items directly connected to same shape (P1)

u Confidentiality - Diagram Add A4 and see other items connected to same shape (P1) and 1 connection

u Confidentiality - Diagram Add A4 and see other items connected to same shape (P1) and 2 connections

u Confidentiality - Image Visible and hidden features on map Annotations –Hidden annotations on image –Become visible after annotating same object –Could notify even if hidden

u Integrity Coordination control can maintain history of actions taken – audit trail Explicit or implicit interest areas –Notification of shared interest –Notification of intrusion (trip wire)

u Future Directions Graphical evaluation of minimally different queries? Other realistic examples?