A new security model for collaborative environments

Prevalent authentication and authorization models for distributed systems provide for the protection of computer systems and resources from unauthorized use. The rules and policies that drive the access decisions in such systems are typically configured up front and require trust establishment before the systems can be used. This approach does not work well for computer software that moderates human-to-human interaction. This work proposes a new model for trust establishment and management in computer systems supporting collaborative work. The model supports the dynamic addition of new users to a collaboration with very little initial trust placed into their identity and supports the incremental building of trust relationships through endorsements from established collaborators. It also recognizes the strength of a users authentication when making trust decisions. By mimicking the way humans build trust naturally the model can support a wide variety of usage scenarios. Its particular strength lies in the support for ad-hoc and dynamic collaborations and the ubiquitous access to a Computer Supported Collaboration Workspace (CSCW) system from locations with varying levels of trust and security.

[1]  Steve Marsh,et al.  Human-computer-human interaction: trust in CSCW , 1997, SGCH.

[2]  Ian T. Foster,et al.  A security architecture for computational grids , 1998, CCS '98.

[3]  Russ Housley,et al.  Internet X.509 Public Key Infrastructure Certificate and CRL Profile , 1999, RFC.

[4]  Sirkka L. Jarvenpaa,et al.  Communication and Trust in Global Virtual Teams , 1999 .

[5]  Aviel D. Rubin,et al.  Risks of the Passport single signon protocol , 2000, Comput. Networks.

[6]  John Linn,et al.  Generic Security Service Application Program Interface Version 2, Update 1 , 2000, RFC.

[7]  Josh Boyd,et al.  In Community We Trust: Online Security Communication at eBay , 2006, J. Comput. Mediat. Commun..

[8]  Ian T. Foster,et al.  A community authorization service for group collaboration , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.

[9]  Dennis G. Kafura,et al.  Supporting Secure Ad-hoc User Collaboration in Grid Environments , 2002, GRID.

[10]  Srilekha Mudumbai,et al.  Certificate-based authorization policy in a PKI environment , 2003, TSEC.

[11]  William A. Wallace,et al.  Trust in electronic environments , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[12]  David Antoniucci,et al.  The Technical Perspective , 2004 .