A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Role-based viewing envelopes for information protection in collaborative modeling
2004
Computer-Aided Design
Information security and assurance are new frontiers for collaborative design. ...
Role-based viewing is achieved through integration of multi-resolution geometry and with the security model. ...
Role-based View A role-based view is a tailored 3D model which is customized for a specific user based on the roles defining the user's access permissions on the model. ...
doi:10.1016/s0010-4485(03)00203-3
fatcat:uxlhe6dj4jgktoi4nlr2wwc6uq
Role-based viewing envelopes for information protection in collaborative modeling
2004
Computer-Aided Design
Information security and assurance are new frontiers for collaborative design. ...
Role-based viewing is achieved through integration of multi-resolution geometry and with the security model. ...
Role-based View A role-based view is a tailored 3D model which is customized for a specific user based on the roles defining the user's access permissions on the model. ...
doi:10.1016/j.cad.2003.09.014
fatcat:fu7ugfvd6vcbpcg3ocsypetghi
Toward sensitive information redaction in a collaborative, multilevel security environment
2010
Proceedings of the 6th International Symposium on Wikis and Open Collaboration - WikiSym '10
The model allows for each page to be viewed at appropriate levels of classification transparently included or excluded based on the user's access level. ...
Wikis have proven to be an invaluable tool for collaboration. The most prominent is, of course, Wikipedia. ...
Se-cureWiki constitutes a step toward a more truly collaborative model for high-security environments by integrating multiple security levels into dynamic, per-user views. ...
doi:10.1145/1832772.1832793
dblp:conf/wikis/GehresSLH10
fatcat:v7sztboqlban7cornpppa4gzfi
Multi-resolution Modeling in Collaborative Design
[chapter]
2003
Lecture Notes in Computer Science
This paper provides a framework for information assurance within collaborative design, based on a technique we call role-based viewing. ...
Such rolebased viewing is achieved through integration of multi-resolution geometry and security models. 3D models are geometrically partitioned, and the partitioning is used to create multi-resolution ...
Conclusions This paper has presented a new technique, role-based viewing, for collaborative 3D assembly design. ...
doi:10.1007/978-3-540-39737-3_50
fatcat:dgctu7b3kzh37idbgkt4llgmpm
Advanced Techniques and Tools for Secure Collaborative Modeling
2017
ACM/IEEE International Conference on Model Driven Engineering Languages and Systems
Unfortunately, traditional approaches for managing concurrent code development do not naturally extend to collaborative modeling which implies novel challenges. ...
and incremental maintenance of view models to provide specific focus of the designers by abstracting from unnecessary details of the underlying system model. ...
ACKNOWLEDGEMENT I would like to thank my advisor, Daniel Varro for his guidance during my research. ...
dblp:conf/models/Debreceni17
fatcat:nfamcsaxsvb73kdhv52w5bnxvu
The MONDO collaboration framework: secure collaborative modeling over existing version control systems
2017
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering - ESEC/FSE 2017
In this paper, we introduce the MONDO Collaboration Framework, which provides rule-based fine-grained model-level secure access control, property-based locking and automated model merge integrated over ...
Model-based systems engineering of critical cyber-physical systems necessitates effective collaboration between different stakeholders while still providing secure protection of intellectual properties ...
Access control policies for different collaborators are defined by security experts who are superusers from a security perspective. ...
doi:10.1145/3106237.3122829
dblp:conf/sigsoft/DebreceniBBRV17
fatcat:gau753zxujazvojtwdzw63nhqa
From Cyber Security Activities to Collaborative Virtual Environments Practices Through the 3D CyberCOP Platform
[chapter]
2018
Lecture Notes in Computer Science
Based on four Security Operations Centers (SOCs) visits we have made in different organizations, we have designed a cyber collaborative activity model which has been used as a reference to design our 3D ...
Contrary to other research fields, cyber security is not harnessing yet the capabilities of Collaborative Virtual Environments (CVE) which can be used both for immersive and interactive data visualization ...
or for internal security. ...
doi:10.1007/978-3-030-05171-6_14
fatcat:wxfdgzntande3lws4yn7swf7qe
Access Control for Collaborative Systems: A Web Services Based Approach
2007
IEEE International Conference on Web Services (ICWS 2007)
This work proposes a new access control model for collaborative systems: "PolyOrBAC". ...
On the one hand, we extend OrBAC (Organization-Based Access Control Model) to specify local as well as collaboration access control rules; on the other hand, we enforce these security policies by applying ...
Our major aim in this paper is to define a global framework (model and mechanisms) for secure collaborative systems while respecting their functioning flexibilities. ...
doi:10.1109/icws.2007.30
dblp:conf/icws/KalamDBK07
fatcat:v2sh35jyazagnbxeg5rkydsm6u
3D CyberCOP: A Collaborative Platform for Cybersecurity Data Analysis and Training
[chapter]
2018
Lecture Notes in Computer Science
After visiting French Security Operations Centers (SOCs), we have defined a collaborative interaction model and some use-cases, to assess of the effectiveness of our solution. ...
users to have a better understanding of a cyber situation by mediating interactions towards them and also by providing different points of view of the same data, on different scales. ...
levels and who investigate incidents either for client companies or for internal security. ...
doi:10.1007/978-3-030-00560-3_24
fatcat:vw5mzfd4i5abrl733ooasrxiwi
Secure collaboration in mediator-free environments
2005
Proceedings of the 12th ACM conference on Computer and communications security - CCS '05
In this paper, we propose a distributed secure interoperability framework for mediator-free collaboration environments. ...
We introduce the idea of secure access paths which enables domains to make localized access control decisions without having global view of the collaboration. ...
The research of Mohamed Shehab and Arif Ghafoor has been supported by the sponsors of the Center for Education and Research in Information Assurance and Security (CERIAS) at Purdue University, and the ...
doi:10.1145/1102120.1102130
dblp:conf/ccs/ShehabBG05
fatcat:3vo4y7u3bje3ho3umpmpx4wh3q
Collaborative Virtual Environment for Training Teams in Emergency Situations
2016
Chemical Engineering Transactions
For modelling the virtual environment we used Unity software for the land creation, and Autodesk 3ds Max for the scenery and objects. We include in the Unity core radiation detectors and avatars. ...
This paper describes a Collaborative Virtual Environment (CVE) for training and assessment of collaboration among agents who deal with radiological and nuclear emergency situations at big events. ...
Methodology for the CVE development for security agents training in big events The CVE modeling comprehends characteristics as shape and appearance of objects, ambient lighting, input and output devices ...
doi:10.3303/cet1653037
doaj:e92b20f263c44324b76efabbf48875de
fatcat:24cezxlldzgmdc3ayhvjp5ury4
An interaction-based access control model (IBAC) for collaborative services
2008
2008 International Symposium on Collaborative Technologies and Systems
We provide an access control model for a service participating in a collaboration. ...
We propose a model for representing the collaboration context so that a service can be made aware of the existing interactions. ...
Our access control model has an interaction-based view; each access requirement is stated for an interaction type. ...
doi:10.1109/cts.2008.4543977
dblp:conf/cts/AltunayBBD08
fatcat:n45vyyxpcvanbl55wvapsmmfqq
Efficiently supporting secure and reliable collaboration in scientific workflows
2010
Journal of computer and system sciences (Print)
In this paper, we present an access control framework and models for supporting secure and reliable collaboration. ...
The proposed approaches combine control flows and data flow models to describe scientific workflows, and extend the atomicity sphere concept by considering two levels of atomicity abstraction at the level ...
One such effective mechanism for balancing security and information choice for users is the concept of a view. ...
doi:10.1016/j.jcss.2009.11.008
fatcat:vjjpdlqrpnbhxdz5no5wcghode
Enhancement of National Collaboration Between Defence Establishment and Industry by Systems Approach
2010
Journal of Military Studies
The conceptual model of systems approach pursues to manage cooperation activities and mechanisms comprehensively and so fulfil expectations placed for the collaboration both by the defence establishment ...
However, the model that it represents is of universal application, especially for countries that do not have a comprehensive defence industry but import the major part of their materiel from abroad. ...
bid for collaboration model illustrates the conceptual collaboration model between the defence establishment and national industry. ...
doi:10.1515/jms-2016-0172
fatcat:ttkj6ed3sngvrfem3kaicegeiq
Idea to derive security policies from collaborative business processes
2009
2009 13th Enterprise Distributed Object Computing Conference Workshops
This paper introduces our ongoing research effort for developing algorithms and methods to derive security policies from formally defined business process models. ...
However, managing security requirements in collaborative environments is error-prone, effort inefficient, and hard to be verified. ...
SECURITY POLICIES FOR BUSINESS COLLABORATIONS Security related requirements can be managed by security policies. ...
doi:10.1109/edocw.2009.5331987
dblp:conf/edoc/Hu09
fatcat:hcwrxb2bl5balnlxvjoqcxcxme
« Previous
Showing results 1 — 15 out of 415,663 results