C. Ignat, G. Oster, P. Molli, Michèle Cart, J. Ferrié, Anne-Marie Kermarrec, P. Sutra, M. Shapiro, Lamia Benmouffok, Jean-Michel Busca, R. Guerraoui
{"title":"A comparison of optimistic approaches to collaborative editing of Wiki pages","authors":"C. Ignat, G. Oster, P. Molli, Michèle Cart, J. Ferrié, Anne-Marie Kermarrec, P. Sutra, M. Shapiro, Lamia Benmouffok, Jean-Michel Busca, R. Guerraoui","doi":"10.1109/COLCOM.2007.4553878","DOIUrl":"https://doi.org/10.1109/COLCOM.2007.4553878","url":null,"abstract":"Wikis, a popular tool for sharing knowledge, are basically collaborative editing systems. However, existing Wiki systems offer limited support for co-operative authoring, and they do not scale well, because they are based on a centralised architecture. This paper compares the well-known centralised MediaWiki system with several peer-to-peer approaches to editing of wiki pages: an operational transformation approach (MOT2), a commutativity-oriented approach (WOOTO) and a conflict resolution approach (ACF). We evaluate and compare them, according to a number of qualitative and quantitative metrics.","PeriodicalId":340691,"journal":{"name":"2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129604030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Videoconferencing design for remote groups","authors":"P. Slovák, E. Hladká, Pavel Troubil","doi":"10.1109/COLCOM.2007.4553871","DOIUrl":"https://doi.org/10.1109/COLCOM.2007.4553871","url":null,"abstract":"Videoconferencing has emerged as a popular method of remote communication. The design of a videoconferencing environment strongly influences the communication efficiency and user satisfaction. Various studies on perceived effects of videoconferencing environments and their parameters have been done, however, they primarily focused on dyadic conversation. This paper describes an exploratory study on the effects on remote groups communication. Beginning with the standard environment, a videoconferencing design has been developed iteratively according to information obtained from the experimental group. Two new videoconferencing environment designs are introduced to suit the group conversation needs better and bring the group videoconference closer to face-to-face communication.","PeriodicalId":340691,"journal":{"name":"2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127197045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Óscar García-Morchón, H. Baldus, T. Heer, Klaus Wehrle
{"title":"Cooperative security in distributed sensor networks","authors":"Óscar García-Morchón, H. Baldus, T. Heer, Klaus Wehrle","doi":"10.1109/COLCOM.2007.4553817","DOIUrl":"https://doi.org/10.1109/COLCOM.2007.4553817","url":null,"abstract":"Distributed sensor network protocols, such as routing, time synchronization or data aggregation protocols make use of collaborative techniques to minimize the consumption of scarce resources in sensors. However, compromised and misbehaving nodes are a serious threat, as an attacker can employ them to eavesdrop on communication, inject forged data, or manipulate protocol operation. In this context, distributed revocation protocols play a decisive role since they allow removing compromised nodes in an efficient way. The design of distributed revocation protocols is challenging due to technical restrictions of sensor nodes, the distributed operation of sensor networks, and the presence of compromised nodes that can collude to subvert protocol operation. We propose the cooperative security protocol (CSP) to enhance network security and enable efficient distributed revocation. The CSP is based on the distribution of revocation information - so called partial revocation votes - to the neighbors of a node as prerequisite to join the network. If an intruder refuses to disclose its revocation votes, the network does not allow it to join. Thus, the node is prevented from attacking the network. If the intruder cooperates by disclosing its revocation information, it can endanger the network neither, since its neighbors, which cooperate to monitor its correct operation, can use the revocation information to ban it from the network.","PeriodicalId":340691,"journal":{"name":"2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124290789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure peer-to-peer networks for trusted collaboration","authors":"Kevin W. Hamlen, B. Thuraisingham","doi":"10.1109/COLCOM.2007.4553810","DOIUrl":"https://doi.org/10.1109/COLCOM.2007.4553810","url":null,"abstract":"An overview of recent advances in secure peer-to-peer networking is presented, toward enforcing data integrity, confidentiality, availability, and access control policies in these decentralized, distributed systems. These technologies are combined with reputation-based trust management systems to enforce integrity-based discretionary access control policies. Particular attention is devoted to the problem of developing secure routing protocols that constitute a suitable foundation for implementing this security system. The research is examined as a basis for developing a secure data management system for trusted collaboration applications such as e-commerce, situation awareness, and intelligence analysis.","PeriodicalId":340691,"journal":{"name":"2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115600031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-level locks to control collaborative modeling sessions","authors":"M. Pichiliani, C. Hirata","doi":"10.1109/COLCOM.2007.4553847","DOIUrl":"https://doi.org/10.1109/COLCOM.2007.4553847","url":null,"abstract":"Collaborative editing systems require mechanisms of control in order to make the collaboration more effective. The synchronous collaboration allows the notion of simultaneity; however, it demands more adequate perception elements. In the collaborative edition of UML diagrams where dependencies between their modeling elements do exist, it is necessary to apply a mechanism of control to support the edition of consistent models. In this work, we present a multi-level locking mechanism that automatically manages locks in the modeling elements of UML diagrams during a collaborative session. This paper also describes a controlled experiment conducted to study the use of the multi-level locking mechanism during collaborative modeling sessions, and the observations from the empirical data collected.","PeriodicalId":340691,"journal":{"name":"2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116753240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A request-driven secure interoperation framework in loosely-coupled multi-domain environments employing RBAC policies","authors":"Yue Zhang, J. Joshi","doi":"10.1109/COLCOM.2007.4553805","DOIUrl":"https://doi.org/10.1109/COLCOM.2007.4553805","url":null,"abstract":"Multi-domain environments where distributed multiple organizations interoperate with each other are becoming a reality as witnessed by emerging Internet-based enterprise applications. Ensuring secure interoperation in such multi-domain environments has drawn considerable research works in the past, especially in tightly coupled, federated environments. However, methods applied to such environments are not suitable in emerging loosely-coupled environments where the inter-domain interactions are transient and based on specific requirements within a given context (e.g., time, location), which is typical in Web service, P2P and grid-based applications. In this paper, we propose a request-driven secure interoperation framework to facilitate secure interoperation in loosely-coupled environments where the individual domains employ role-based access control policies. In particular, our proposed framework is driven by the service requirements and dynamically integrates relevant policy components between interacting domains.","PeriodicalId":340691,"journal":{"name":"2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127007661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Collaborative Panel Administrator: A framework and implementation for expert panel lifecycle management","authors":"C. Behrens, D. Bassu, H. Shim","doi":"10.1109/COLCOM.2007.4553866","DOIUrl":"https://doi.org/10.1109/COLCOM.2007.4553866","url":null,"abstract":"In this paper, we describe the Collaborative Panel Administrator, a collaboration framework designed to manage the lifecycle of virtual teams of domain experts working in collaborative gaming and modeling. A unique feature of the CPA is the way it is guided by sound experimental research design so that information collected from panelists can be vetted, and knowledge built from this information can be validated quantitatively. The framework is deployed as a J2EE application and provides extension points to integrate critical services needed to foster collaboration among panelists and analyze the information acquired from them. We examine in detail the CPApsilas integration with a commercial collaboration platform.","PeriodicalId":340691,"journal":{"name":"2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127730237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Collaborative practice-oriented business processes Creating a new case for business process management and CSCW synergy","authors":"O. Marjanovic, H. Skaf-Molli, P. Molli, C. Godart","doi":"10.1109/COLCOM.2007.4553874","DOIUrl":"https://doi.org/10.1109/COLCOM.2007.4553874","url":null,"abstract":"In very recent times, organisations have started to shift their focus from highly standardised operational business processes (BPs) to other types of processes that cannot be easily replicated due to the knowledge, skills and creativity of people involved. Consequently the field of business process management (BPM) has gradually evolved to include four different, but equally important components: strategy, people, processes and technology. The renewed interest in process-related knowledge and collaboration has opened a new case for possible synergy of BPM and CSCW (computer supported cooperative work) fields. The paper argues that the key to this synergy is in the field of knowledge management. The paper introduces the knowledge dimension of BPs and uses it to determine how collaborative processes, in particular practice-oriented creative BPs, differ from other types of organizational processes. The paper argues that in the case of these BPs, process support needs to co-evolve with process execution itself, and therefore could be also considered as an ever evolving, ldquoorganicrdquo system, creating a new set of interesting research and practical challenges in the future.","PeriodicalId":340691,"journal":{"name":"2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130133347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Unraveling decentralized authorization for multi-domain collaborations","authors":"Hannah K. Lee","doi":"10.1109/COLCOM.2007.4553806","DOIUrl":"https://doi.org/10.1109/COLCOM.2007.4553806","url":null,"abstract":"Current authorization solutions take highly case-by-case approaches. First of all, the solutions address particular types of multi-domain collaborations such as virtual organization or resource-sharing collaborations. Secondly, they tend to be based on specific technology their subject interactions adopt. We consider this phenomena of having a number of different authorization solutions as a result of taking a mainly bottom-up approach to cater the authorization need of diverse types of mult-domain collaborations currently existing. In this paper, we present an extended analysis of different types of multi-domain collaborations based on various e-Government case studies as well as that of existing authorization solutions. With the converged requirements resulting from those analyses, we take a top-down approach of explicitly highlighting generic and interoperable components for a decentralized authorization scheme. This approach appears to be more suitable to produce a more efficient and elegant authorization solution for the majority of multi-domain collaborations.","PeriodicalId":340691,"journal":{"name":"2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134325550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Asynchronous reconciliation based on operational transformation for P2P collaborative environments","authors":"Michèle Cart, J. Ferrié","doi":"10.1109/COLCOM.2007.4553821","DOIUrl":"https://doi.org/10.1109/COLCOM.2007.4553821","url":null,"abstract":"Reconciling divergent copies is a problem encountered in distributed systems, groupware, version control systems and personal work involving several mobile computing devices. Published reconciliation methods, whether synchronous or asynchronous, require some ordering facility provided either by a central component (master copy, sequencer) or by a fully distributed mechanism (timestamps, state vectors,...). Nevertheless, scalability is limited. This paper presents an asynchronous algorithm based on Operational Transformations which provides the means to reconcile any number of copies, without this limitation. Copies can be modified (concurrently or not) and then reconciled pair-wise, at any time, regardless of the pair, while their convergence is achieved. Its main advantage is thus to enable free propagation of update operations while ensuring they will be ordered in the same global order.","PeriodicalId":340691,"journal":{"name":"2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122597943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}