{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:55:20Z","timestamp":1725558920850},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540245513"},{"type":"electronic","value":"9783540318422"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31842-2_25","type":"book-chapter","created":{"date-parts":[[2010,7,4]],"date-time":"2010-07-04T19:50:41Z","timestamp":1278273041000},"page":"251-260","source":"Crossref","is-referenced-by-count":2,"title":["A Metaphor and User Interface for Managing Access Permissions in Shared Workspace Systems"],"prefix":"10.1007","author":[{"given":"Till","family":"Sch\u00fcmmer","sequence":"first","affiliation":[]},{"given":"J\u00f6rg M.","family":"Haake","sequence":"additional","affiliation":[]},{"given":"Anja","family":"Haake","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","unstructured":"Appelt, W., Mambrey, P.: Experiences with the BSCW Shared Workspace System as the Backbone of a Virtual Learning Environment for Students. In: Proc. of ED-MEDIA 1999, bscw.gmd.de\/Papers\/EDMEDIA99\/ (1999)"},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"Bullock, A., Benford, S.: An access control framework for multi-user collaborative environments. In: Proc. of GROUP 1999, Phoenix Arizona, pp. 140\u2013149 (1999)","DOI":"10.1145\/320297.320313"},{"key":"25_CR3","unstructured":"CURE, \n                    \n                      http:\/\/cure.pi6.fernuni-hagen.de\n                    \n                    \n                   (accessed 2003)"},{"issue":"1","key":"25_CR4","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1145\/99977.99987","volume":"34","author":"C.A. Ellis","year":"1991","unstructured":"Ellis, C.A., Gibbs, S.J., Rein, G.L.: Groupware: Some issues and experiences. CACM\u00a034(1), 38\u201358 (1991)","journal-title":"CACM"},{"key":"25_CR5","volume-title":"Beyond Knowledge Management: Sharing Expertise","author":"S. Greenberg","year":"2002","unstructured":"Greenberg, S., Roseman, M.: Using a Room Metaphor to Ease Transitions in Groupware. In: Ackermann, M., Pipek, V., Wulf, V. (eds.) Beyond Knowledge Management: Sharing Expertise, MIT Press, Cambridge (2002)"},{"key":"25_CR6","volume-title":"Proc. of ACM CSCW 2004","author":"J.M. Haake","year":"2004","unstructured":"Haake, J.M., Haake, A., Sch\u00fcmmer, T., Bourimi, M., Landgraf, B.: End-User Controlled Group Formation and Access Rights Management in a Shared Workspace System. In: Proc. of ACM CSCW 2004, Chicago. ACM Press, New York (2004) (in press)"},{"key":"25_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/978-3-540-39850-9_6","volume-title":"Groupware: Design, Implementation, and Use","author":"J.M. Haake","year":"2003","unstructured":"Haake, J.M., Sch\u00fcmmer, T., Haake, A., Bourimi, M., Landgraf, B.: Two-level tailoring support for CSCL Groupware: Design, Implementation, and Use. In: Favela, J., Decouchant, D. (eds.) CRIWG 2003. LNCS, vol.\u00a02806, pp. 74\u201382. Springer, Heidelberg (2003)"},{"key":"25_CR8","volume-title":"Proc. of HICSS-37","author":"J.M. Haake","year":"2004","unstructured":"Haake, J.M., Sch\u00fcmmer, T., Haake, A., Bourimi, M., Landgraf, B.: Supporting flexible collaborative distance learning in the CURE platform. In: Proc. of HICSS-37. IEEE Press, Los Alamitos (2004)"},{"key":"25_CR9","unstructured":"Hess, E.: Yib\u2019s Guide to Mooing: Getting the Most from Virtual Communities on the Internet. Trafford Publishing (2003), \n                    \n                      http:\/\/yibco.com\/ygm\/ygm\/"},{"key":"25_CR10","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/775265.775268","volume":"8","author":"B. Lampson","year":"1974","unstructured":"Lampson, B.: Protection. ACM Operation Systems Review\u00a08, 18\u201324 (1974)","journal-title":"ACM Operation Systems Review"},{"key":"25_CR11","unstructured":"Sch\u00fcmmer, T.: Room Pattern. In: CSCW 2002 workshop on Socio-Technical Pattern Languages (2002), \n                    \n                      http:\/\/www.groupware-patterns.org\/room"},{"key":"25_CR12","first-page":"51","volume-title":"Proc. of the ACM CSCW 1992","author":"H. Shen","year":"1992","unstructured":"Shen, H., Dewan, P.: Access Control for Collaborative Environments. In: Proc. of the ACM CSCW 1992, pp. 51\u201358. ACM Press, New York (1992)"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Stevens, G., Wulf, V.: A New Dimension in Access Control: Studying Maintenance Engineering across Organizational Boundaries. In: Proc. of the ACM CSCW 2002, New Orleans, pp. 196\u2013205 (2002)","DOI":"10.1145\/587078.587106"},{"key":"25_CR14","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1023\/A:1008787208430","volume":"9","author":"O. Stiemerling","year":"2000","unstructured":"Stiemerling, O., Wulf, V.: Beyond Yes or No Extending Access Control in Groupware with Awareness and Negotiation. Group Decision and Negotiation\u00a09, 221\u2013235 (2000)","journal-title":"Group Decision and Negotiation"},{"issue":"2","key":"25_CR15","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1109\/TSE.1984.5010221","volume":"SE-10","author":"M. Wu","year":"1984","unstructured":"Wu, M., Hwang, T.: Access Control with Single-Key-Lock. IEEE Transactions on Software Engineering\u00a0SE-10(2), 185\u2013191 (1984)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"25_CR16","doi-asserted-by":"crossref","unstructured":"Wulf, W., Cohen, E., Corwin, W., Jones, A., Levin, R., Pierson, C., Pollack, F.: HYDRA: The Kernel of a Multiprocessor Operating System. CACM\u00a017(6) (June 1974)","DOI":"10.1145\/355616.364017"}],"container-title":["Lecture Notes in Computer Science","From Integrated Publication and Information Systems to Information and Knowledge Environments"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31842-2_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:41:54Z","timestamp":1620013314000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31842-2_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540245513","9783540318422"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31842-2_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}