Rule Adaptation in Collaborative Working Environments using RBAC Model
نویسندگان
چکیده
منابع مشابه
Rule Adaptation in Collaborative Working Environments using RBAC Model
Collaborative Working Environments (CWEs) are getting prominence these days. With the increase in the use of collaboration tools and technologies, a lot of sharing and privacy issues have also emerged. Due to its dynamic nature, a CWE needs to adapt the changes into accordingly. In this paper, we have implemented the Adaptive Dynamic Sharing and Privacy-aware Role Based Access Control (Adaptive...
متن کاملDesigning collaborative learning model in online learning environments
Introduction: Most online learning environments are challenging for the design of collaborative learning activities to achieve high-level learning skills. Therefore, the purpose of this study was to design and validate a model for collaborative learning in online learning environments. Methods: The research method used in this study was a mixed method, including qualitative content analysis and...
متن کاملFrom Collaborative Tools to Collaborative Working Environments
In this article we introduce the main research lines concerning CSCW and groupware, which are forming the core foundation of Collaborative Working Environments (CWE). Furthermore, we introduce the problematic aspects in CWE and the features and recommendations for the integration of CWE in organizations. Through this issue readers will learn new paradigms for the building of CWE as well as dire...
متن کاملWorking with objects in collaborative virtual environments
........................................................................................................................................XI ACKNOWLEDGEMENTS .............................................................................................................. XII CHAPTER
متن کاملCA-RBAC: Context Aware RBAC Scheme in Ubiquitous Computing Environments
Role based access control (RBAC) assigns access permissions to a role rather than a user. This simplifies access control management by simply assigning appropriate roles to users and by modifying the permissions of the roles. With the advent of ubiquitous computing, many kinds of services, especially personalized services to give convenience to users, have been introduced. Among them, providing...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Advanced Computer Science and Applications
سال: 2017
ISSN: 2156-5570,2158-107X
DOI: 10.14569/ijacsa.2017.080362