71 12 Transformation Cases for the Set of Binary Operations {U p 84 13 Extension of Algorithm 12 with the Idle Operation, Garbage Collection Administrative Logs Procedures at site s, p.104 ,
179 19 Transforming a Request Against a Log, 179 20 Control Concurrency Algorithm with Garbage Collection Scheme . . . . . . . . . . . . 184 ,
1 ) then IT (I(op 1 , op 2 ), I(op j , op 2 )) = I(IT (op 1, op 2 ) and IT (I(op 1 , op 3 ), I(op j , op 3 )) = I(IT (op 1 op 3 ) Since I(IT (op 1 ,
the similarity is preserved by transformation against normal and idle operations Using the precedent Lemma we show that similarity relation is preserved by transformation against two equal logs. Given a log H and two similar idle operations op 1 ,
By induction on H's size and the use of Lemmas 8 ,
Space: Spacial access control for collaborative virtual envoronments, 1998. ,
Giving undo attention, Interacting with Computers, vol.4, issue.3, pp.317-342, 1992. ,
DOI : 10.1016/0953-5438(92)90021-7
language for role-based separation of duty constraints, Proceedings of the fourth ACM workshop on Role-based access control , RBAC '99, pp.43-54, 1999. ,
DOI : 10.1145/319171.319176
Cope: A cooperative programming environment, 1981. ,
An authorization model for workflows, Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security, ESORICS '96, pp.44-64, 1996. ,
DOI : 10.1007/3-540-61770-1_27
Readings in Human-Computer Interaction: Toward the Year 2000, 1995. ,
SecPAL: Design and semantics of a decentralized authorization language, Proceedings of the 20th IEEE Computer Security Foundations Symposium (CSF, 2006. ,
DOI : 10.3233/JCS-2009-0364
PKI-based security for peer-to-peer information sharing, Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings., 2004. ,
DOI : 10.1109/PTP.2004.1334930
A selective undo mechanism for graphical user interfaces based on command objects, ACM Transactions on Computer-Human Interaction, vol.1, issue.3, pp.269-294, 1994. ,
DOI : 10.1145/196699.196721
A decentralized temporal autoritzation model, SEC, pp.271-280, 1996. ,
A generalized temporal role-based access control model, Ieee Transactions on Knowledge and Data Engineering, pp.4-23, 2005. ,
Securing xml documents: the author-x project demonstration, SIGMOD Conference, p.605, 2001. ,
Client-Based Access Control Management for XML documents, VLDB, pp.84-95, 2004. ,
DOI : 10.1016/B978-012088469-8.50011-5
URL : https://hal.archives-ouvertes.fr/inria-00070718
An access control framework for multi-user collaborative environments, Proceedings of the international ACM SIGGROUP conference on Supporting group work , GROUP '99, pp.140-149, 1999. ,
DOI : 10.1145/320297.320313
Version Management with CVS, Network Theory Ltd, 2002. ,
Du Contrôle d'Accès Dynamique pour les Editeurs Collaboratifs, Mémoire de Master Recherche, 2008. ,
Undo-Based Access Control for Distributed Collaborative Editors, CDVE, pp.101-108, 2009. ,
DOI : 10.1145/586081.586085
URL : https://hal.archives-ouvertes.fr/inria-00431344
Optimistic access control for distributed collaborative editors, Proceedings of the 2011 ACM Symposium on Applied Computing, SAC '11, pp.861-868, 2011. ,
DOI : 10.1145/1982185.1982374
URL : https://hal.archives-ouvertes.fr/inria-00576880
A General Multi-User Undo/Redo Model, Proceedings of the fourth conference on European Conference on Computer-Supported Cooperative Work, pp.231-246, 1995. ,
DOI : 10.1007/978-94-011-0349-7_15
Securing context-aware applications using environment roles, Proceedings of the sixth ACM symposium on Access control models and technologies , SACMAT '01, pp.10-20, 2001. ,
DOI : 10.1145/373256.373258
P-Hera: Scalable fine-grained access control for P2P infrastructures, 11th International Conference on Parallel and Distributed Systems (ICPADS'05), pp.585-591, 2005. ,
DOI : 10.1109/ICPADS.2005.215
Policy-based access control in peerto-peer grid systems, GRID '05: Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing, pp.107-113, 2005. ,
A fine-grained access control system for XML documents, ACM Transactions on Information and System Security, vol.5, issue.2, pp.169-202, 2002. ,
DOI : 10.1145/505586.505590
Primitives for programming multi-user interfaces, Proceedings of the 4th annual ACM symposium on User interface software and technology , UIST '91, pp.69-78, 1991. ,
DOI : 10.1145/120782.120790
The cube -extending systems for undo, Proc. of DSVIS'97, pp.473-495, 1997. ,
The Sybil Attack, pp.251-260, 2002. ,
DOI : 10.1007/3-540-45748-8_24
Policies and roles in collaborative applications, Proceedings of the 1996 ACM conference on Computer supported cooperative work , CSCW '96, pp.11-20, 1996. ,
DOI : 10.1145/240080.240175
URL : http://cgit.nutn.edu.tw:8080/cgit/PaperDL/TKW_081017220736.pdf
Coordination infrastructure in collaborative systems, Ph.D. dissertation, 1995. ,
Concurrency Control in Groupware Systems, SIGMOD Conference33] Y. Elrakaiby, F. Cuppens, and N. Cuppens-Boulahia. Interactivity for reactive access control. In SECRYPT, pp.399-407, 1989. ,
Different perspectives of the N-Queens problem, Proceedings of the 1992 ACM annual conference on Communications , CSC '92, pp.99-108, 1992. ,
DOI : 10.1145/131214.131227
Specifying and managing role-based access control within a corporate intranet, Proceedings of the second ACM workshop on Role-based access control , RBAC '97, pp.77-82, 1997. ,
DOI : 10.1145/266741.266761
Concurrent Undo Operations in Collaborative Environments Using Operational Transformation, pp.155-173, 2004. ,
DOI : 10.1007/978-3-540-30468-5_12
Flexible team-based access control using contexts, Proceedings of the sixth ACM symposium on Access control models and technologies , SACMAT '01, pp.21-27, 2001. ,
DOI : 10.1145/373256.373259
Protection, Proceedings of the November 16-18, 1971, fall joint computer conference on, AFIPS '71 (Fall), pp.417-429, 1972. ,
DOI : 10.1145/1478873.1478928
Data sharing in group work, Proceedings of the 1986 ACM conference on Computer-supported cooperative work, CSCW '86, pp.175-183, 1986. ,
On the consistency problem in mobile distributed computing, Proceedings of the second ACM international workshop on Principles of mobile computing , POMC '02, pp.51-57, 2002. ,
DOI : 10.1145/584490.584501
The JXTA performance model and evaluation, Future Generation Computer Systems, vol.21, issue.3, pp.377-390, 2005. ,
DOI : 10.1016/j.future.2004.04.016
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.204.8002
Protection in operating systems, Communications of the ACM, vol.19, issue.8, pp.461-471, 1976. ,
DOI : 10.1145/360303.360333
The f accrual failure detector, SRDS, pp.66-78, 2004. ,
The policy machine for universal access control, p.3055379, 2002. ,
Assessment of access control systems, 2006. ,
DOI : 10.6028/NIST.IR.7316
Customizable Collaborative Editor Relying on treeOPT Algorithm, ECSCW, pp.315-334, 2003. ,
DOI : 10.1007/978-94-010-0068-0_17
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.70.9273
Conception Formelle d'Algorithmes de Réplication Optimiste. Vers l'Edition Collaborative dans les Réseaux Pair-à-Pair, 2006. ,
Coordination Model for Real-Time Collaborative Editors, In COORDINATION, vol.13, issue.4, pp.225-246, 2009. ,
DOI : 10.1145/1188816.1188821
URL : https://hal.archives-ouvertes.fr/inria-00576867
A Flexible Access Control Model for Distributed Collaborative Editors, Secure Data Management, pp.89-106, 2009. ,
DOI : 10.1016/j.is.2006.06.002
URL : https://hal.archives-ouvertes.fr/inria-00431341
Formal design and verification of operational transformation algorithms for copies convergence, Theoretical Computer Science, vol.351, issue.2, pp.167-183, 2006. ,
DOI : 10.1016/j.tcs.2005.09.066
URL : https://hal.archives-ouvertes.fr/inria-00000426
Requirements of role-based access control for collaborative systems, Proceedings of the first ACM Workshop on Role-based access control , RBAC '95, 1995. ,
DOI : 10.1145/270152.270183
Requirements of role-based access control for collaborative systems, Proceedings of the first ACM Workshop on Role-based access control , RBAC '95, p.16, 1996. ,
DOI : 10.1145/270152.270183
Requirements of role-based access control for collaborative systems, Proceedings of the first ACM Workshop on Role-based access control , RBAC '95, 1996. ,
DOI : 10.1145/270152.270183
Access control mechanisms for inter-organizational workflow, Proceedings of the sixth ACM symposium on Access control models and technologies , SACMAT '01, pp.66-74, 2001. ,
DOI : 10.1145/373256.373266
Context-aware role-based access control in pervasive computing systems, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.113-122, 2008. ,
DOI : 10.1145/1377836.1377854
Time, clocks, and the ordering of events in a distributed system, Communications of the ACM, vol.21, issue.7, pp.558-565, 1978. ,
DOI : 10.1145/359545.359563
Protection, ACM SIGOPS Operating Systems Review, vol.8, issue.1, pp.18-24, 1974. ,
DOI : 10.1145/775265.775268
Ensuring content and intention consistency in real-time group editors, 24th International Conference on Distributed Computing Systems, 2004. Proceedings., 2004. ,
DOI : 10.1109/ICDCS.2004.1281643
An Operational Transformation Algorithm and Performance Evaluation, Computer Supported Cooperative Work (CSCW), vol.4, issue.3, pp.469-508, 2008. ,
DOI : 10.1007/s10606-005-9008-6
An Admissibility-Based Operational Transformation Framework for Collaborative Editing Systems, Computer Supported Cooperative Work (CSCW), vol.13, issue.4, pp.1-43, 2010. ,
DOI : 10.1007/s10606-009-9103-1
Building a Taxonomy and Nomenclature of Collaborative Writing to Improve Interdisciplinary Research and Practice, Journal of Business Communication, vol.41, issue.1, pp.66-99, 2004. ,
DOI : 10.1177/0021943603259363
Proof of correctness of Ressel's adOPTed algorithm, Information Processing Letters, vol.86, issue.6, pp.303-310, 2003. ,
DOI : 10.1016/S0020-0190(03)00227-8
An Integrative Model of Organizational Trust, The Academy of Management Review, vol.20, issue.3, pp.709-734, 1995. ,
Log garbage collector-based real time collaborative editor for mobile devices Controlling access to published data using cryptography, CollaborateCom Proceedings of the 29th international conference on Very large data bases, pp.1-10, 2003. ,
Using the transformational approach to build a safe and generic data synchronizer, Proceedings of the 2003 international ACM SIGGROUP conference on Supporting group work , GROUP '03, pp.212-220, 2003. ,
DOI : 10.1145/958160.958194
URL : https://hal.archives-ouvertes.fr/inria-00099815
Empirical study on collaborative writing: What do co-authors do, use, and like? Comput. Supported Coop, Work, vol.13, issue.1, pp.63-89, 2004. ,
User Centered System Design; New Perspectives on Human- Computer Interaction. L, 1986. ,
Configuring role-based access control to enforce mandatory and discretionary access control policies, ACM Transactions on Information and System Security, vol.3, issue.2, pp.85-106, 2000. ,
DOI : 10.1145/354876.354878
Data consistency for P2P collaborative editing, Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work , CSCW '06, pp.259-268, 2006. ,
DOI : 10.1145/1180875.1180916
URL : https://hal.archives-ouvertes.fr/inria-00108523
Role-based access control on the web, ACM Transactions on Information and System Security, vol.4, issue.1, pp.37-71, 2001. ,
DOI : 10.1145/383775.383777
What's in unison? a formal specification and reference implementation of a file synchronizer, 2004. ,
Optimistic security, Proceedings of the 1999 workshop on New security paradigms , NSPW '99, pp.40-45, 2000. ,
DOI : 10.1145/335169.335188
A framework for undoing actions in collaborative systems, ACM Transactions on Computer-Human Interaction, vol.1, issue.4, pp.295-330, 1994. ,
DOI : 10.1145/198425.198427
A model of authorization for next-generation database systems, ACM Transactions on Database Systems, vol.16, issue.1, pp.88-131, 1991. ,
DOI : 10.1145/103140.103144
Concurrent and Real-Time Update of Access Control Policies, DEXA, pp.330-339, 2003. ,
DOI : 10.1007/978-3-540-45227-0_33
Reducing the problems of group undo, Proceedings of the international ACM SIGGROUP conference on Supporting group work , GROUP '99, pp.131-139, 1999. ,
DOI : 10.1145/320297.320312
An integrating, transformation-oriented approach to concurrency control and undo in group editors, Proceedings of the 1996 ACM conference on Computer supported cooperative work , CSCW '96, pp.288-297, 1996. ,
DOI : 10.1145/240080.240305
Maintaining replicated authorizations in distributed database systems, Data & Knowledge Engineering, vol.18, issue.1, pp.55-84, 1996. ,
DOI : 10.1016/0169-023X(95)00000-I
Access Control: Policies, Models, and Mechanisms, FOSAD, pp.137-196, 2000. ,
DOI : 10.1007/3-540-45608-2_3
Access Control: Policies, Models, and Mechanisms, FOSAD, pp.137-196, 2000. ,
DOI : 10.1007/3-540-45608-2_3
Access control: principle and practice, IEEE Communications, pp.40-48, 1994. ,
DOI : 10.1109/35.312842
Peer-to-peer access control architecture using trusted computing technology, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, pp.147-158, 2005. ,
DOI : 10.1145/1063979.1064005
Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996. ,
DOI : 10.1109/2.485845
Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996. ,
DOI : 10.1109/2.485845
The NIST model for role-based access control, Proceedings of the fifth ACM workshop on Role-based access control , RBAC '00, pp.47-63, 2000. ,
DOI : 10.1145/344287.344301
Conceptual foundations for a model of task-based authorizations, CSFW, pp.66-79, 1994. ,
An algorithm for selective undo of any operation in collaborative applications, Proceedings of the 16th ACM international conference on Supporting group work, GROUP '10, pp.131-140, 2010. ,
DOI : 10.1145/1880071.1880093
Access control for collaborative environments, Proceedings of the 1992 ACM conference on Computer-supported cooperative work , CSCW '92, pp.51-58, 1992. ,
DOI : 10.1145/143457.143461
The future of interactive systems and the emergence of direct manipulation???, Behaviour & Information Technology, vol.7, issue.3, pp.237-256, 1982. ,
DOI : 10.1080/01449298208914450
Integrating communication, cooperation, and awareness, Proceedings of the 1994 ACM conference on Computer supported cooperative work , CSCW '94, pp.331-343, 1994. ,
DOI : 10.1145/192844.193041
Gnu emacs manual, 2007. ,
An access control mechanism for P2P collaborations, Proceedings of the 2008 international workshop on Data management in peer-to-peer systems, DaMaP '08, pp.51-58, 2008. ,
DOI : 10.1145/1379350.1379358
Serialization of concurrent operations in a distributed collaborative environment, Proceedings of the international ACM SIGGROUP conference on Supporting group work : the integration challenge the integration challenge, GROUP '97, pp.435-445, 1997. ,
DOI : 10.1145/266838.267369
Concurrent operations in a distributed and mobile collaborative environment, Proceedings 14th International Conference on Data Engineering, pp.36-45, 1998. ,
DOI : 10.1109/ICDE.1998.655755
Undo any operation at any time in group editors, Proceedings of the 2000 ACM conference on Computer supported cooperative work , CSCW '00, pp.191-200, 2000. ,
DOI : 10.1145/358916.358990
Undo as concurrent inverse in group editors, ACM Transactions on Computer-Human Interaction, vol.9, issue.4, pp.309-361, 2002. ,
DOI : 10.1145/586081.586085
Operational transformation in real-time group editors, Proceedings of the 1998 ACM conference on Computer supported cooperative work , CSCW '98, pp.59-68, 1998. ,
DOI : 10.1145/289444.289469
Achieving convergence, causality preservation, and intention preservation in real-time cooperative editing systems, ACM Transactions on Computer-Human Interaction, vol.5, issue.1, pp.63-108, 1998. ,
DOI : 10.1145/274444.274447
Transparent adaptation of single-user applications for multi-user real-time collaboration, ACM Transactions on Computer-Human Interaction, vol.13, issue.4, pp.531-582, 2006. ,
DOI : 10.1145/1188816.1188821
Context-Based Operational Transformation in Distributed Collaborative Editing Systems, IEEE Transactions on Parallel and Distributed Systems, vol.20, issue.10, pp.1454-1470, 2009. ,
DOI : 10.1109/TPDS.2008.240
Operational transformation for collaborative word processing, Proceedings of the 2004 ACM conference on Computer supported cooperative work , CSCW '04, pp.437-446, 2004. ,
DOI : 10.1145/1031607.1031681
Collaborative Writing Is Hard to Support: A Field Study of Collaborative Writing, Computer Supported Cooperative Work (CSCW), vol.22, issue.1, pp.19-51, 1997. ,
DOI : 10.1023/A:1008636321493
Interlisp reference manual, 1978. ,
Team-based access control (TMAC), Proceedings of the second ACM workshop on Role-based access control , RBAC '97, pp.13-19, 1997. ,
DOI : 10.1145/266741.266748
Task-based authorization controls (TBAC): a family of models for active and enterprise-oriented authorization management, Proceedings of the IFIP WG11 ,
DOI : 10.1007/978-0-387-35285-5_10
Access control in collaborative systems, ACM Computing Surveys, vol.37, issue.1, pp.29-41, 2005. ,
DOI : 10.1145/1057977.1057979
Foundations of constraint satisfaction, 1993. ,
Copies convergence in a distributed real-time collaborative environment, Proceedings of the 2000 ACM conference on Computer supported cooperative work , CSCW '00, 2000. ,
DOI : 10.1145/358916.358988
URL : https://hal.archives-ouvertes.fr/hal-00684563
User: A new framework for redoing, Software Development Environments (SDE), pp.168-176, 1984. ,
Team-and-role-based organizational context and access control for cooperative hypermedia environments, Proceedings of the tenth ACM Conference on Hypertext and hypermedia : returning to our diverse roots returning to our diverse roots, HYPERTEXT '99, pp.37-46, 1999. ,
DOI : 10.1145/294469.294480
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.119.3048
Naming and grouping privileges to simplify security management in large databases, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy, pp.71-60, 1990. ,
DOI : 10.1109/RISP.1990.63844
Compensation in Collaborative Editing, 2007. ,
URL : https://hal.archives-ouvertes.fr/inria-00138381
An Undo Framework for P2P Collaborative Editing, 4th International Conference on Collaborative Computing : Networking, Applications and Worksharing -CollaborateCom, pp.529-544, 2008. ,
DOI : 10.1007/978-3-540-30468-5_12
URL : https://hal.archives-ouvertes.fr/inria-00432373
Policy-based access control for weakly consistent replication, Proceedings of the 5th European conference on Computer systems, EuroSys '10, pp.293-306, 2010. ,
DOI : 10.1145/1755913.1755943
A lattice-based approach for updating access control policies in real-time, Information Systems, vol.32, issue.5, pp.755-772, 2007. ,
DOI : 10.1016/j.is.2006.06.002
A lattice-based approach for updating access control policies in real-time, Information Systems, vol.32, issue.5, pp.755-772, 2007. ,
DOI : 10.1016/j.is.2006.06.002
Context-aware dynamic access control for pervasive applications, In Communication Networks and Distributed Systems Modeling and Simulation Conference, 2004. ,