Objects, components, and the virtual enterprise
Addendum to the 1998 proceedings of the conference on Object-oriented programming, systems, languages, and applications (Addendum)
Fine grained access control for SOAP E-services
Proceedings of the 10th international conference on World Wide Web
Flexible support for multiple access control policies
ACM Transactions on Database Systems (TODS)
An algebra for composing access control policies
ACM Transactions on Information and System Security (TISSEC)
Toward open, secure, widely distributed services
Communications of the ACM - Adaptive middleware
Access Control: Policies, Models, and Mechanisms
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Towards securing XML Web services
Proceedings of the 2002 ACM workshop on XML security
A Privacy Policy Model for Enterprises
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
A Logical Language for Expressing Authorizations
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
An overview of VOAC, a virtual organizations access control infrastructure
PDCN'06 Proceedings of the 24th IASTED international conference on Parallel and distributed computing and networks
Knowledge sharing in virtual enterprises via an ontology-based access control approach
Computers in Industry
International Journal of Computer Integrated Manufacturing
Trust and privacy in attribute based access control for collaboration environments
Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services
Virtual enterprise security: importance, challenges, and solutions
ACS'06 Proceedings of the 6th WSEAS international conference on Applied computer science
Decentralized governance of distributed systems via interaction control
Logic Programs, Norms and Action
Hi-index | 0.00 |
Current developments in IT point towards the formation of loosely coupled enterprises, often referred to as virtual enterprises. These enterprises require both secure and flexible collaboration between unrelated information systems. Web services technology can be used as an ideal platform for realising virtual enterprises throughh their ease of integration, flexibility, and support of XML vocabularies. To ensure the successful implementation of Web services within virtual enterprises, new approaches to security are required. Together with authentication, access control has been seen as a pillar of IT security approaches. The focus of this paper will be to determine requirements that could play a role when the access control policies of such enterprises are defined.