Map based information sharing to support virtual enterprise activities
ITVE '01 Proceedings of the workshop on Information technology for virtual enterprises
A model of OASIS role-based access control and its support for active security
ACM Transactions on Information and System Security (TISSEC)
Role-based access control for collaborative enterprise in peer-to-peer computing environments
Proceedings of the eighth ACM symposium on Access control models and technologies
Ontologies within Extended Enterprises
HICSS '02 Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 1 - Volume 1
Trust for Ubiquitous, Transparent Collaboration
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Systems Analysis and Design
Virtual enterprise access control requirements
SAICSIT '03 Proceedings of the 2003 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology
Using uml to visualize role-based access control constraints
Proceedings of the ninth ACM symposium on Access control models and technologies
A Trust based Access Control Framework for P2P File-Sharing Systems
HICSS '05 Proceedings of the Proceedings of the 38th Annual Hawaii International Conference on System Sciences - Volume 09
Decision Support Systems - Special issue: Collaborative work and knowledge management
Secure information sharing enabled by Trusted Computing and PEI models
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
HICSS '07 Proceedings of the 40th Annual Hawaii International Conference on System Sciences
Cooperative operating control based on virtual resources and user-suited HCI
CDVE'09 Proceedings of the 6th international conference on Cooperative design, visualization, and engineering
Modeling and evaluating information leakage caused by inferences in supply chains
Computers in Industry
Trust estimation in a virtual team: A decision support method
Expert Systems with Applications: An International Journal
Hi-index | 0.00 |
An increasing number of companies, especially those with knowledge-intensive R&D programs, have turned to virtual project teams (VPTs) in recent years to generate the greatest competitive advantage from limited labor and resources. Members of a VPT are not limited to an enterprise and usually have various core capabilities. Successful implementation of a VPT depends on collaboration among team members during a project; such collaboration relies on efficient management of distributed resources, safe and timely resource sharing, and reliable trust evaluation mechanisms that facilitate the greatest degree of information sharing and minimize information transfer delays. This study first identifies VPT characteristics and the particular requirements of effective resource management and sharing. A VPT model is then presented. By applying this model, this study presents a trust evaluation method that assists VPT members in determining whether resource holders have made appropriate decisions to share resources with other VPT members. The proposed evaluation method comprises a trust evaluation between two VPT workers and a reliability evaluation of worker. Each resource can have a threshold that is a benchmark for resource sharing. The trust evaluation method for the proposed VPT model enables secure resource sharing across team and enterprise boundaries, facilitates collaboration, and enhances information transparency among team members.