ZEUS: a toolkit and approach for building distributed multi-agent systems
Proceedings of the third annual conference on Autonomous Agents
A model of OASIS role-based access control and its support for active security
ACM Transactions on Information and System Security (TISSEC)
Managing Access in Extended Enterprise Networks
IEEE Internet Computing
An Application of Directory Service Markup Language (DSML) for Role-Based Access Control (RBAC)
COMPSAC '02 Proceedings of the 26th International Computer Software and Applications Conference on Prolonging Software Life: Development and Redevelopment
Supporting information access rights and visibility levels in virtual enterprises
Proceedings of the IFIP TC5/WG5.3 Second IFIP Working Conference on Infrastructures for Virtual Organizations: Managing Cooperation in Virtual Organizations and Electronic Busimess towards Smart Organizations: E-Business and Virtual Enterprises: Managing Business-to-Business Cooperation
Advanced Features for Enterprise-Wide Role-Based Access Control
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
Task-role-based access control model
Information Systems
An XACML-based Policy Management and Authorization Service for Globus Resources
GRID '03 Proceedings of the 4th International Workshop on Grid Computing
Virtual enterprise access control requirements
SAICSIT '03 Proceedings of the 2003 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology
Administration of an RBAC System
HICSS '04 Proceedings of the Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 7 - Volume 7
A Model for Team-based Access Control (TMAC 2004)
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Using uml to visualize role-based access control constraints
Proceedings of the ninth ACM symposium on Access control models and technologies
A composite rbac approach for large, complex organizations
Proceedings of the ninth ACM symposium on Access control models and technologies
Object-Oriented Software Engineering
Object-Oriented Software Engineering
Hi-index | 0.00 |
Virtual enterprises (VEs) provide a novel solution to potentially enhance global competitiveness via collaboration on product design, production, assembly and marketing. Efficient and secure information resource sharing is one of the key factors to a successful VE. This study presents the architecture of a virtual enterprise access control (VEAC) system with a VEAC model to handle access control for information sharing across enterprises, thus enabling VEs to change dynamically. To improve current access control models to be adapted to VEs, the requirements for the access control system and model are first specified by the results of analysis on the characteristics of dynamic VEs. According to the requirements, this study designs the architecture of VEAC system and presents a VEAC model based on the concept of role-based access control (RBAC). The VEAC model, modelled in unified modeling Language (UML), is composed of a project-based access control (PBAC) model and RBAC models to manage resources related to VE activities and to solve problems in distributed authorization management and security access control across organizations that may both compete and cooperate with each other. Moreover, algorithms to generate user authorization are developed based on the model. Finally, the prototype of the VEAC system is implemented. The results of this study can provide VE workers with efficient and easy access to relevant resources with up-to-date information, thus averting information delay and increase information transparency.