5th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing

Research Article

Enhanced security management for flexible and dynamic cooperative environments

Download506 downloads
  • @INPROCEEDINGS{10.4108/ICST.COLLABORATECOM2009.8377 ,
        author={Jonas Schulte and Ingo D\o{}pke and Reinhard Keil and Konrad Stark and Johann Eder},
        title={Enhanced security management for flexible and dynamic cooperative environments},
        proceedings={5th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing},
        proceedings_a={COLLABORATECOM},
        year={2009},
        month={12},
        keywords={Application software Authorization Collaborative work Containers Engineering management Environmental management Internet Knowledge engineering Knowledge management Security},
        doi={10.4108/ICST.COLLABORATECOM2009.8377 }
    }
    
  • Jonas Schulte
    Ingo Döpke
    Reinhard Keil
    Konrad Stark
    Johann Eder
    Year: 2009
    Enhanced security management for flexible and dynamic cooperative environments
    COLLABORATECOM
    ICST
    DOI: 10.4108/ICST.COLLABORATECOM2009.8377
Jonas Schulte1,*, Ingo Döpke1, Reinhard Keil1,*, Konrad Stark2,*, Johann Eder3,*
  • 1: University of Paderborn, Heinz-Nixdorf-Institute, 33102 Paderborn, Germany
  • 2: University of Vienna, Department of Knowledge and Business Engineering, 1010 Vienna, Austria
  • 3: University of Klagenfurt, Department of Informatics Systems, 9020 Klagenfurt, Austria
*Contact email: schulte@uni-paderborn.de, Reinhard.Keil@uni-paderborn.de, konrad.stark@univie.ac.at, eder@isys.uni-klu.ac.at

Abstract

This paper deals with the challenge to create an authorization and authentication infrastructure for virtual knowledge spaces. Virtual knowledge spaces are a concept to build up flexible and adjustable environments for cooperative work and learning processes. When developing authorization concepts for virtual knowledge spaces, different boundary conditions have to be considered. Basically, we identify the specific requirements for the creation of coherent and intuitive rules to reduce the administrative complexity to a minimum and prevent mistakes. Furthermore we turn attention to flexibility of the authorization infrastructure as well as performance issues. The rights management described in this paper ought to fulfill these requirements.