Inside SSL: The Secure Sockets Layer Protocol
IT Professional
Globe: A Wide-Area Distributed System
IEEE Concurrency
Grid Information Services for Distributed Resource Sharing
HPDC '01 Proceedings of the 10th IEEE International Symposium on High Performance Distributed Computing
An Online Credential Repository for the Grid: MyProxy
HPDC '01 Proceedings of the 10th IEEE International Symposium on High Performance Distributed Computing
A Community Authorization Service for Group Collaboration
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Certificate-based access control for widely distributed resources
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Digital ecosystems: evolving service-orientated architectures
Proceedings of the 1st international conference on Bio inspired models of network, information and computing systems
Distributed Identity Management Model for Digital Ecosystems
SECUREWARE '07 Proceedings of the The International Conference on Emerging Security Information, Systems, and Technologies
Digital ecosystem access control management
WSEAS Transactions on Information Science and Applications
TIDE: measuring and evaluating trustworthiness and credibility of enterprises in digital ecosystem
Proceedings of the International Conference on Management of Emergent Digital EcoSystems
Hi-index | 0.00 |
Digital Ecosystem (DE) is characterized as an open and dynamic environment where the interaction and collaboration between its entities are highly promoted. A major requirement to promote such intensive interaction and collaboration in a DE environment is the ability to secure and uphold the confidentiality, integrity and non-repudiation of shared resources and information. However, current developments of such security mechanisms for protecting the shared resources are still in their infancy. Most of the proposed protection frameworks do not provide a scalable and effective mechanism for engaging multiple interacting entities to protect their resources. This is even a greater issue when multiple resources are exchanged and shared in an open and dynamic environment. Therefore, we proposes a distributed mechanism for individual enterprises to manage their own authorization processes and resource access permissions with an aim to provide a rigorous protection of entities' resources.