Affiliation:
1. Univ. of North Carolina at Chapel Hill, Chapel Hill
2. IBM Santa Teresa Lab, San Jose, CA
Abstract
Traditionally, access control has been studied in the areas of operating systems and database management systems. With the advent of multiuser interfaces, there is a need to provide access control in the user interface. We have developed a general framework for supporting access control in multiuser interfaces. It is based on the classical notion of an access matrix, a generalized editing-based model of user-application interaction, and a flexible model of user-user coupling. It has been designed to support flexible control of all significant shared operations, high-level specification of access control policies, and automatic and efficcent implementation of access control in a multiuser interface. It supports several new kinds of protected objects including sessions, windows, and hierarchical active variables; a large set of rights including not only the traditional semantic rights but also interaction and coupling rights; a set of inference rules for deriving default permissions; and a programming interface for implementing access control in multiuser interfaces. We have implemented the framework as part of a system called Suite. This article describes and motivates the framework using the concrete example of Suite, identifies some of the difficult issues we faced in its design, describes our preliminary experience with it, and suggests directions for future work.
Publisher
Association for Computing Machinery (ACM)
Subject
Human-Computer Interaction
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Cultivating a Green Future: Augmented Reality Veggie and Fruit Explorer App Empowering Indian Curriculum with Agricultural Knowledge and Healthy Habits;2023 International Conference on Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication Engineering (RMKMATE);2023-11-01
2. Systems Development: Object-Oriented Security Model;Encyclopedia of Information Assurance;2010-12-20
3. Security Policies in Distributed CSCW and Workflow Systems;IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans;2010-11
4. Computer-supported access control;ACM Transactions on Computer-Human Interaction;2009-09
5. Extending WebDAV With Multiple-Granularity Locking;IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans;2008-07