메뉴 건너뛰기




Volumn 38, Issue 4, 2008, Pages 832-851

A formal virtual enterprise access control model

Author keywords

Access control (AC); Resource sharing; Role based access control (RBAC); Virtual enterprise (VE)

Indexed keywords

ACCESS CONTROL; COMPETITION; COMPUTATIONAL LINGUISTICS; INDUSTRIAL ECONOMICS; LINGUISTICS; SECURITY SYSTEMS;

EID: 46649098888     PISSN: 10834427     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSMCA.2008.923090     Document Type: Article
Times cited : (11)

References (41)
  • 1
    • 0002087984 scopus 로고    scopus 로고
    • Design and implementation of a collaborative engineering information system for allied concurrent engineering
    • Jan
    • Y-M. Chen and M.-W. Liang, "Design and implementation of a collaborative engineering information system for allied concurrent engineering," Int. J. Comput. Integr. Manuf., vol. 13, no. 1, pp. 11-30, Jan. 2000.
    • (2000) Int. J. Comput. Integr. Manuf , vol.13 , Issue.1 , pp. 11-30
    • Chen, Y.-M.1    Liang, M.-W.2
  • 8
    • 33646894100 scopus 로고    scopus 로고
    • Semantic information assurance for secure distributed knowledge management: A business process perspective
    • May
    • R. Singh and A. F. Salam, "Semantic information assurance for secure distributed knowledge management: A business process perspective," IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, vol. 36, no. 3, pp. 472-486, May 2006.
    • (2006) IEEE Trans. Syst., Man, Cybern. A, Syst., Humans , vol.36 , Issue.3 , pp. 472-486
    • Singh, R.1    Salam, A.F.2
  • 10
    • 33751414556 scopus 로고    scopus 로고
    • Development of an access control model, system architecture and approaches for information sharing in virtual enterprise
    • Jan
    • T.-Y. Chen, Y.-M. Chen, C.-B. Wang, and H.-C. Chu, "Development of an access control model, system architecture and approaches for information sharing in virtual enterprise," Comput. Ind., vol. 58, no. 1, pp. 57-73, Jan. 2007.
    • (2007) Comput. Ind , vol.58 , Issue.1 , pp. 57-73
    • Chen, T.-Y.1    Chen, Y.-M.2    Wang, C.-B.3    Chu, H.-C.4
  • 11
    • 33947603006 scopus 로고    scopus 로고
    • Secure resource sharing on cross-organization collaboration using a novel trust method
    • Aug
    • T.-Y. Chen, Y.-M. Chen, H.-C. Chu, C.-B. Wang, and H. Yang, "Secure resource sharing on cross-organization collaboration using a novel trust method," Robot. Comput.-Integr. Manuf., vol. 23, no. 4, pp. 421-435, Aug. 2007.
    • (2007) Robot. Comput.-Integr. Manuf , vol.23 , Issue.4 , pp. 421-435
    • Chen, T.-Y.1    Chen, Y.-M.2    Chu, H.-C.3    Wang, C.-B.4    Yang, H.5
  • 14
    • 0038825675 scopus 로고    scopus 로고
    • Task-role-based access control model
    • Sep
    • S. Oh and S. Park, "Task-role-based access control model," Inf. Syst., vol. 28, no. 6, pp. 533-562, Sep. 2003.
    • (2003) Inf. Syst , vol.28 , Issue.6 , pp. 533-562
    • Oh, S.1    Park, S.2
  • 15
    • 84948985429 scopus 로고    scopus 로고
    • Advanced features for enterprise-wide role-based access control
    • A. Kern, "Advanced features for enterprise-wide role-based access control," in Proc. Comput. Security Appl. Conf., 2002, pp. 333-342.
    • (2002) Proc. Comput. Security Appl. Conf , pp. 333-342
    • Kern, A.1
  • 16
    • 1542305463 scopus 로고    scopus 로고
    • Symmetric RBAC model that takes the separation of duty and role hierarchies into consideration
    • Mar
    • C. J. Moon, D. H. Park, S. J. Park, and D. K. Baik, "Symmetric RBAC model that takes the separation of duty and role hierarchies into consideration," Comput. Security, vol. 23, no. 2, pp. 126-136, Mar. 2004.
    • (2004) Comput. Security , vol.23 , Issue.2 , pp. 126-136
    • Moon, C.J.1    Park, D.H.2    Park, S.J.3    Baik, D.K.4
  • 17
    • 0036387038 scopus 로고    scopus 로고
    • An application of directory service markup language (DSML) for role-based access control (RBAC0)
    • D. Shin, G. J. Ahn, and J. S. Park, "An application of directory service markup language (DSML) for role-based access control (RBAC0)," in Proc. Comput. Softw. Appl. Conf., 2002, pp. 934-939.
    • (2002) Proc. Comput. Softw. Appl. Conf , pp. 934-939
    • Shin, D.1    Ahn, G.J.2    Park, J.S.3
  • 18
    • 0036755364 scopus 로고    scopus 로고
    • Managing access in extended enterprise networks
    • Sep./Oct
    • K. Furst, T. Schmidt, and G. Wippel, "Managing access in extended enterprise networks," IEEE Internet Comput., vol. 6, no. 5, pp. 67-74, Sep./Oct. 2002.
    • (2002) IEEE Internet Comput , vol.6 , Issue.5 , pp. 67-74
    • Furst, K.1    Schmidt, T.2    Wippel, G.3
  • 19
    • 84865788031 scopus 로고    scopus 로고
    • A model of OASIS role-based access control and its support for active security
    • Nov
    • J. Bacon, K. Moody, and W. Yao, "A model of OASIS role-based access control and its support for active security," ACM Trans. Inf. Syst. Security, vol. 5, no. 4, pp. 492-540, Nov. 2002.
    • (2002) ACM Trans. Inf. Syst. Security , vol.5 , Issue.4 , pp. 492-540
    • Bacon, J.1    Moody, K.2    Yao, W.3
  • 21
    • 0032667079 scopus 로고    scopus 로고
    • Application of information technology to a virtual enterprise broker: The case of Bill Epstein
    • May
    • J. J. Kanet, W. Faisst, and P. Mertens, "Application of information technology to a virtual enterprise broker: The case of Bill Epstein," Int. J. Prod. Econ., vol. 62, no. 1, pp. 23-32, May 1999.
    • (1999) Int. J. Prod. Econ , vol.62 , Issue.1 , pp. 23-32
    • Kanet, J.J.1    Faisst, W.2    Mertens, P.3
  • 22
    • 32644438360 scopus 로고    scopus 로고
    • An agent-based platform for the management of dynamic virtual enterprises,
    • Ph.D. dissertation, Tech. Univ. Berlin, Berlin, Germany
    • E. K. Ouzounis, "An agent-based platform for the management of dynamic virtual enterprises," Ph.D. dissertation, Tech. Univ. Berlin, Berlin, Germany, 2001.
    • (2001)
    • Ouzounis, E.K.1
  • 23
    • 0242540377 scopus 로고    scopus 로고
    • RBAC for collaborative environments: Role-based access control for collaborative enterprise in peer-to-peer computing environments
    • J. S. Park and J. Hwang, "RBAC for collaborative environments: Role-based access control for collaborative enterprise in peer-to-peer computing environments," in Proc. 8th ACM Symp. Access Control Models Technol., 2003, pp. 93-99.
    • (2003) Proc. 8th ACM Symp. Access Control Models Technol , pp. 93-99
    • Park, J.S.1    Hwang, J.2
  • 25
    • 50249164677 scopus 로고    scopus 로고
    • Joint policy management and auditing in virtual organizations
    • T. J. Smith and L. Ramakrishnan, "Joint policy management and auditing in virtual organizations," in Proc. 4th Int. Workshop Grid Comput. 2003, pp. 117-124.
    • (2003) Proc. 4th Int. Workshop Grid Comput , pp. 117-124
    • Smith, T.J.1    Ramakrishnan, L.2
  • 26
  • 27
    • 0141763767 scopus 로고    scopus 로고
    • Some issues of role-based collaboration
    • H. Zhu, "Some issues of role-based collaboration," in Proc. Can. Conf. Elect. Comput. Eng., 2003, vol. 2, pp. 687-690.
    • (2003) Proc. Can. Conf. Elect. Comput. Eng , vol.2 , pp. 687-690
    • Zhu, H.1
  • 31
    • 0036887434 scopus 로고    scopus 로고
    • Integrating role graphs: A tool for security integration
    • Dec
    • S. Osborn, "Integrating role graphs: A tool for security integration," Data Knowl. Eng., vol. 43, no. 3, pp. 317-333, Dec. 2002.
    • (2002) Data Knowl. Eng , vol.43 , Issue.3 , pp. 317-333
    • Osborn, S.1
  • 33
    • 3042584122 scopus 로고    scopus 로고
    • Flexible access control policy specification with constraint logic programming
    • Nov
    • S. Barker and P. J. Stuckey, "Flexible access control policy specification with constraint logic programming," ACM Trans. Inf. Syst. Security, vol. 6, no. 4, pp. 501-546, Nov. 2003.
    • (2003) ACM Trans. Inf. Syst. Security , vol.6 , Issue.4 , pp. 501-546
    • Barker, S.1    Stuckey, P.J.2
  • 38
    • 33646878060 scopus 로고    scopus 로고
    • Security policies for sharing knowledge in virtual communities
    • May
    • G. Boella and L. van der Torre, "Security policies for sharing knowledge in virtual communities," IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, vol. 36, no. 3, pp. 439-450, May 2006.
    • (2006) IEEE Trans. Syst., Man, Cybern. A, Syst., Humans , vol.36 , Issue.3 , pp. 439-450
    • Boella, G.1    van der Torre, L.2
  • 39
    • 0242456743 scopus 로고    scopus 로고
    • Enterprise role administration: An administration concept for the enterprise role-based access control model
    • A. Kern, A. Schaad, and J. Moffett, "Enterprise role administration: An administration concept for the enterprise role-based access control model," in Proc. 8th ACM Symp. Access Control Models Technol., 2003, pp. 3-11.
    • (2003) Proc. 8th ACM Symp. Access Control Models Technol , pp. 3-11
    • Kern, A.1    Schaad, A.2    Moffett, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.