A security architecture for computational grids
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Globe: A Wide-Area Distributed System
IEEE Concurrency
Fine-Grain Authorization for Resource Management in the Grid Environment
GRID '02 Proceedings of the Third International Workshop on Grid Computing
Grid Information Services for Distributed Resource Sharing
HPDC '01 Proceedings of the 10th IEEE International Symposium on High Performance Distributed Computing
An Online Credential Repository for the Grid: MyProxy
HPDC '01 Proceedings of the 10th IEEE International Symposium on High Performance Distributed Computing
A Community Authorization Service for Group Collaboration
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Certificate-based access control for widely distributed resources
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Distributed Identity Management Model for Digital Ecosystems
SECUREWARE '07 Proceedings of the The International Conference on Emerging Security Information, Systems, and Technologies
A privacy augmented collaborative environment (PACE)
ACS'07 Proceedings of the 7th Conference on 7th WSEAS International Conference on Applied Computer Science - Volume 7
WSEAS Transactions on Information Science and Applications
Distributed mechanism for protecting resources in a newly emerged digital ecosystem technology
ICA3PP'11 Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part II
A distributed mechanism for secure collaboration in digital ecosystems
Proceedings of the International Conference on Management of Emergent Digital EcoSystems
Hi-index | 0.00 |
The newly emerging concept of Digital Ecosystem (DE) has played a significant role in today's technology, especially for Small and Medium Enterprises (SMEs) to adopt Information and Communication Technology (ICT) inside their businesses. DE reveals the opportunities to enhance the productivity and efficiency of each business transaction. Therefore, it will further contribute to the success of the enterprise's businesses. Along with the advancement of DE technology, security has emerged as a vital element in protecting the resources and information for the interacting DE member entities in particular. However, current developments of such security mechanisms for protecting these resources are still in their infancy. This paper proposes a distributed mechanism for individual enterprises to manage their own authorization processes and information access permissions with the aim of providing rigorous protection of enterprise resources.