The official PGP user's guide
Inside SSL: The Secure Sockets Layer Protocol
IT Professional
An Online Credential Repository for the Grid: MyProxy
HPDC '01 Proceedings of the 10th IEEE International Symposium on High Performance Distributed Computing
A Community Authorization Service for Group Collaboration
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Certificate-based access control for widely distributed resources
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Digital ecosystems: evolving service-orientated architectures
Proceedings of the 1st international conference on Bio inspired models of network, information and computing systems
Distributed Identity Management Model for Digital Ecosystems
SECUREWARE '07 Proceedings of the The International Conference on Emerging Security Information, Systems, and Technologies
Research and Implementation of Key Technology Based on Internet Encryption and Authentication
ICNDS '09 Proceedings of the 2009 International Conference on Networking and Digital Society - Volume 01
Digital ecosystem access control management
WSEAS Transactions on Information Science and Applications
Study on Information Management and Security of E-commerce System
IPTC '10 Proceedings of the 2010 International Symposium on Intelligence Information Processing and Trusted Computing
Hi-index | 0.00 |
In this paper, we investigate the effectiveness and appropriateness of several existing security mechanisms for a Digital Ecosystem (DE) environment. DE is characterized as an open and dynamic environment where the interaction and collaboration between its entities are highly promoted. A major requirement to promote such intensive interaction and collaboration is the ability to secure and uphold the confidentiality, integrity and non-repudiation of shared resources and information. However, current developments of such security mechanisms for protecting the shared resources are still in their infancy. Most of the proposed protection frameworks do not provide a scalable and effective mechanism for engaging multiple interacting entities to protect their resources. This is even a greater issue when multiple resources are exchanged and shared in an open and dynamic environment such as DE. Therefore, we propose a distributed mechanism for enterprises to manage their authentication and authorization processes with an aim to provide a rigorous protection of entities' resources.