-
1
-
-
0002087984
-
Design and implementation of a collaborative engineering information system for allied concurrent engineering
-
Jan
-
Y-M. Chen and M.-W. Liang, "Design and implementation of a collaborative engineering information system for allied concurrent engineering," Int. J. Comput. Integr. Manuf., vol. 13, no. 1, pp. 11-30, Jan. 2000.
-
(2000)
Int. J. Comput. Integr. Manuf
, vol.13
, Issue.1
, pp. 11-30
-
-
Chen, Y.-M.1
Liang, M.-W.2
-
2
-
-
84901672146
-
Supporting information access rights and visibility levels in virtual enterprises
-
A. Frenkel, H. Afsarmanesh, C. Garita, and L. O. Hertzberger, "Supporting information access rights and visibility levels in virtual enterprises," in Proc. 2nd IFIP Work. Conf. Infrastructure Virtual Enterprise, 2000, pp. 177-192.
-
(2000)
Proc. 2nd IFIP Work. Conf. Infrastructure Virtual Enterprise
, pp. 177-192
-
-
Frenkel, A.1
Afsarmanesh, H.2
Garita, C.3
Hertzberger, L.O.4
-
3
-
-
33646890642
-
Trust management and trust theory revision
-
May
-
J. Ma and M. A. Orgun, "Trust management and trust theory revision," IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, vol. 36, no. 3, pp. 451-460, May 2006.
-
(2006)
IEEE Trans. Syst., Man, Cybern. A, Syst., Humans
, vol.36
, Issue.3
, pp. 451-460
-
-
Ma, J.1
Orgun, M.A.2
-
4
-
-
33646885897
-
Trust-based privacy preservation for peer-to-peer data sharing
-
May
-
Y. Lu, W. Wang, B. Bhargava, and D. Xu, "Trust-based privacy preservation for peer-to-peer data sharing," IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, vol. 36, no. 3, pp. 498-502, May 2006.
-
(2006)
IEEE Trans. Syst., Man, Cybern. A, Syst., Humans
, vol.36
, Issue.3
, pp. 498-502
-
-
Lu, Y.1
Wang, W.2
Bhargava, B.3
Xu, D.4
-
5
-
-
0003725488
-
-
Upper Saddle River, NJ: Pearson Educ. Int
-
E. Turban, D. King, D. Viehland, and J. Lee, Electronic Commerce: A Managerial Perspective. Upper Saddle River, NJ: Pearson Educ. Int., 2006.
-
(2006)
Electronic Commerce: A Managerial Perspective
-
-
Turban, E.1
King, D.2
Viehland, D.3
Lee, J.4
-
6
-
-
46649105201
-
Special issue on secure knowledge management
-
Jan
-
H. R. Rao and S. J. Upadhyaya, "Special issue on secure knowledge management," IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, vol. 35, no. 1, p. 185, Jan. 2005.
-
(2005)
IEEE Trans. Syst., Man, Cybern. A, Syst., Humans
, vol.35
, Issue.1
, pp. 185
-
-
Rao, H.R.1
Upadhyaya, S.J.2
-
7
-
-
33646886776
-
Secure knowledge management: Confidentiality, trust, and privacy
-
May
-
E. Bertino, L. R. Khan, R. Sandhu, and B. Thuraisingham, "Secure knowledge management: Confidentiality, trust, and privacy," IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, vol. 36, no. 3, pp. 429-438, May 2006.
-
(2006)
IEEE Trans. Syst., Man, Cybern. A, Syst., Humans
, vol.36
, Issue.3
, pp. 429-438
-
-
Bertino, E.1
Khan, L.R.2
Sandhu, R.3
Thuraisingham, B.4
-
8
-
-
33646894100
-
Semantic information assurance for secure distributed knowledge management: A business process perspective
-
May
-
R. Singh and A. F. Salam, "Semantic information assurance for secure distributed knowledge management: A business process perspective," IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, vol. 36, no. 3, pp. 472-486, May 2006.
-
(2006)
IEEE Trans. Syst., Man, Cybern. A, Syst., Humans
, vol.36
, Issue.3
, pp. 472-486
-
-
Singh, R.1
Salam, A.F.2
-
9
-
-
84938208411
-
Automated cross-organizational trust establishment on extranets
-
R. Au, M. Looi, and P. Ashley, "Automated cross-organizational trust establishment on extranets," in Proc. Workshop Inf. Technol. Virtual Enterprises, 2001, pp. 3-11.
-
(2001)
Proc. Workshop Inf. Technol. Virtual Enterprises
, pp. 3-11
-
-
Au, R.1
Looi, M.2
Ashley, P.3
-
10
-
-
33751414556
-
Development of an access control model, system architecture and approaches for information sharing in virtual enterprise
-
Jan
-
T.-Y. Chen, Y.-M. Chen, C.-B. Wang, and H.-C. Chu, "Development of an access control model, system architecture and approaches for information sharing in virtual enterprise," Comput. Ind., vol. 58, no. 1, pp. 57-73, Jan. 2007.
-
(2007)
Comput. Ind
, vol.58
, Issue.1
, pp. 57-73
-
-
Chen, T.-Y.1
Chen, Y.-M.2
Wang, C.-B.3
Chu, H.-C.4
-
11
-
-
33947603006
-
Secure resource sharing on cross-organization collaboration using a novel trust method
-
Aug
-
T.-Y. Chen, Y.-M. Chen, H.-C. Chu, C.-B. Wang, and H. Yang, "Secure resource sharing on cross-organization collaboration using a novel trust method," Robot. Comput.-Integr. Manuf., vol. 23, no. 4, pp. 421-435, Aug. 2007.
-
(2007)
Robot. Comput.-Integr. Manuf
, vol.23
, Issue.4
, pp. 421-435
-
-
Chen, T.-Y.1
Chen, Y.-M.2
Chu, H.-C.3
Wang, C.-B.4
Yang, H.5
-
12
-
-
41849103307
-
-
Amsterdam, The Netherlands: Elsevier science B. V
-
M. Koch, L. V. Mancini, and F. Parisi-Presicce, Graph Transformations for the Specification of Access Control Policies. Amsterdam, The Netherlands: Elsevier science B. V, 2002.
-
Graph Transformations for the Specification of Access Control Policies
, vol.2002
-
-
Koch, M.1
Mancini, L.V.2
Parisi-Presicce, F.3
-
14
-
-
0038825675
-
Task-role-based access control model
-
Sep
-
S. Oh and S. Park, "Task-role-based access control model," Inf. Syst., vol. 28, no. 6, pp. 533-562, Sep. 2003.
-
(2003)
Inf. Syst
, vol.28
, Issue.6
, pp. 533-562
-
-
Oh, S.1
Park, S.2
-
15
-
-
84948985429
-
Advanced features for enterprise-wide role-based access control
-
A. Kern, "Advanced features for enterprise-wide role-based access control," in Proc. Comput. Security Appl. Conf., 2002, pp. 333-342.
-
(2002)
Proc. Comput. Security Appl. Conf
, pp. 333-342
-
-
Kern, A.1
-
16
-
-
1542305463
-
Symmetric RBAC model that takes the separation of duty and role hierarchies into consideration
-
Mar
-
C. J. Moon, D. H. Park, S. J. Park, and D. K. Baik, "Symmetric RBAC model that takes the separation of duty and role hierarchies into consideration," Comput. Security, vol. 23, no. 2, pp. 126-136, Mar. 2004.
-
(2004)
Comput. Security
, vol.23
, Issue.2
, pp. 126-136
-
-
Moon, C.J.1
Park, D.H.2
Park, S.J.3
Baik, D.K.4
-
17
-
-
0036387038
-
An application of directory service markup language (DSML) for role-based access control (RBAC0)
-
D. Shin, G. J. Ahn, and J. S. Park, "An application of directory service markup language (DSML) for role-based access control (RBAC0)," in Proc. Comput. Softw. Appl. Conf., 2002, pp. 934-939.
-
(2002)
Proc. Comput. Softw. Appl. Conf
, pp. 934-939
-
-
Shin, D.1
Ahn, G.J.2
Park, J.S.3
-
18
-
-
0036755364
-
Managing access in extended enterprise networks
-
Sep./Oct
-
K. Furst, T. Schmidt, and G. Wippel, "Managing access in extended enterprise networks," IEEE Internet Comput., vol. 6, no. 5, pp. 67-74, Sep./Oct. 2002.
-
(2002)
IEEE Internet Comput
, vol.6
, Issue.5
, pp. 67-74
-
-
Furst, K.1
Schmidt, T.2
Wippel, G.3
-
19
-
-
84865788031
-
A model of OASIS role-based access control and its support for active security
-
Nov
-
J. Bacon, K. Moody, and W. Yao, "A model of OASIS role-based access control and its support for active security," ACM Trans. Inf. Syst. Security, vol. 5, no. 4, pp. 492-540, Nov. 2002.
-
(2002)
ACM Trans. Inf. Syst. Security
, vol.5
, Issue.4
, pp. 492-540
-
-
Bacon, J.1
Moody, K.2
Yao, W.3
-
21
-
-
0032667079
-
Application of information technology to a virtual enterprise broker: The case of Bill Epstein
-
May
-
J. J. Kanet, W. Faisst, and P. Mertens, "Application of information technology to a virtual enterprise broker: The case of Bill Epstein," Int. J. Prod. Econ., vol. 62, no. 1, pp. 23-32, May 1999.
-
(1999)
Int. J. Prod. Econ
, vol.62
, Issue.1
, pp. 23-32
-
-
Kanet, J.J.1
Faisst, W.2
Mertens, P.3
-
22
-
-
32644438360
-
An agent-based platform for the management of dynamic virtual enterprises,
-
Ph.D. dissertation, Tech. Univ. Berlin, Berlin, Germany
-
E. K. Ouzounis, "An agent-based platform for the management of dynamic virtual enterprises," Ph.D. dissertation, Tech. Univ. Berlin, Berlin, Germany, 2001.
-
(2001)
-
-
Ouzounis, E.K.1
-
23
-
-
0242540377
-
RBAC for collaborative environments: Role-based access control for collaborative enterprise in peer-to-peer computing environments
-
J. S. Park and J. Hwang, "RBAC for collaborative environments: Role-based access control for collaborative enterprise in peer-to-peer computing environments," in Proc. 8th ACM Symp. Access Control Models Technol., 2003, pp. 93-99.
-
(2003)
Proc. 8th ACM Symp. Access Control Models Technol
, pp. 93-99
-
-
Park, J.S.1
Hwang, J.2
-
27
-
-
0141763767
-
Some issues of role-based collaboration
-
H. Zhu, "Some issues of role-based collaboration," in Proc. Can. Conf. Elect. Comput. Eng., 2003, vol. 2, pp. 687-690.
-
(2003)
Proc. Can. Conf. Elect. Comput. Eng
, vol.2
, pp. 687-690
-
-
Zhu, H.1
-
31
-
-
0036887434
-
Integrating role graphs: A tool for security integration
-
Dec
-
S. Osborn, "Integrating role graphs: A tool for security integration," Data Knowl. Eng., vol. 43, no. 3, pp. 317-333, Dec. 2002.
-
(2002)
Data Knowl. Eng
, vol.43
, Issue.3
, pp. 317-333
-
-
Osborn, S.1
-
32
-
-
3543052334
-
First experiences using XACML for access control in distributed systems
-
M. Lorch, S. Proctor, R. Lepro, D. Kafura, and S. Shah, "First experiences using XACML for access control in distributed systems," in Proc. ACM Workshop XML Security, 2003, pp. 25-37.
-
(2003)
Proc. ACM Workshop XML Security
, pp. 25-37
-
-
Lorch, M.1
Proctor, S.2
Lepro, R.3
Kafura, D.4
Shah, S.5
-
33
-
-
3042584122
-
Flexible access control policy specification with constraint logic programming
-
Nov
-
S. Barker and P. J. Stuckey, "Flexible access control policy specification with constraint logic programming," ACM Trans. Inf. Syst. Security, vol. 6, no. 4, pp. 501-546, Nov. 2003.
-
(2003)
ACM Trans. Inf. Syst. Security
, vol.6
, Issue.4
, pp. 501-546
-
-
Barker, S.1
Stuckey, P.J.2
-
35
-
-
0001619596
-
Flexible support for multiple access control policies
-
Jun
-
S. Jajodia, P. Samarati, M. L. Sapino, and V. S. Subrahmanian, "Flexible support for multiple access control policies," ACM Trans. Database Syst., vol. 26, no. 2, pp. 214-260, Jun. 2001.
-
(2001)
ACM Trans. Database Syst
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.L.3
Subrahmanian, V.S.4
-
38
-
-
33646878060
-
Security policies for sharing knowledge in virtual communities
-
May
-
G. Boella and L. van der Torre, "Security policies for sharing knowledge in virtual communities," IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, vol. 36, no. 3, pp. 439-450, May 2006.
-
(2006)
IEEE Trans. Syst., Man, Cybern. A, Syst., Humans
, vol.36
, Issue.3
, pp. 439-450
-
-
Boella, G.1
van der Torre, L.2
-
39
-
-
0242456743
-
Enterprise role administration: An administration concept for the enterprise role-based access control model
-
A. Kern, A. Schaad, and J. Moffett, "Enterprise role administration: An administration concept for the enterprise role-based access control model," in Proc. 8th ACM Symp. Access Control Models Technol., 2003, pp. 3-11.
-
(2003)
Proc. 8th ACM Symp. Access Control Models Technol
, pp. 3-11
-
-
Kern, A.1
Schaad, A.2
Moffett, J.3
-
41
-
-
12344300279
-
Administration of an RBAC system
-
F. Dridi, B. Muschall, and G. Pernul, "Administration of an RBAC system," in Proc. 37th Annu. Hawaii Int. Conf. Syst. Sci., 2004, pp. 187-192.
-
(2004)
Proc. 37th Annu. Hawaii Int. Conf. Syst. Sci
, pp. 187-192
-
-
Dridi, F.1
Muschall, B.2
Pernul, G.3
|