Control principles and role hierarchies
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
Access control mechanisms for inter-organizational workflow
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Models for coalition-based access control (CBAC)
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Integrating role graphs: a tool for security integration
Data & Knowledge Engineering - Data and applications security
Managing Access in Extended Enterprise Networks
IEEE Internet Computing
Designing Role Hierarchies for Access Control in Workflow Systems
COMPSAC '01 Proceedings of the 25th International Computer Software and Applications Conference on Invigorating Software Development
An Application of Directory Service Markup Language (DSML) for Role-Based Access Control (RBAC)
COMPSAC '02 Proceedings of the 26th International Computer Software and Applications Conference on Prolonging Software Life: Development and Redevelopment
Design of Collaborative Agent System with Access Control for Smart-Office Environmen
WETICE '01 Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
Supporting information access rights and visibility levels in virtual enterprises
Proceedings of the IFIP TC5/WG5.3 Second IFIP Working Conference on Infrastructures for Virtual Organizations: Managing Cooperation in Virtual Organizations and Electronic Busimess towards Smart Organizations: E-Business and Virtual Enterprises: Managing Business-to-Business Cooperation
An administration concept for the enterprise role-based access control model
Proceedings of the eighth ACM symposium on Access control models and technologies
HICSS '99 Proceedings of the Thirty-second Annual Hawaii International Conference on System Sciences-Volume 8 - Volume 8
Cross-Domain Access Control via PKI
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
A rule-based framework for role-based delegation and revocation
ACM Transactions on Information and System Security (TISSEC)
Specification and Classification of Role-based Authorization Policies
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Task-role-based access control model
Information Systems
Towards a Model for Trust Relationships in Virtual Enterprises
DEXA '03 Proceedings of the 14th International Workshop on Database and Expert Systems Applications
RBPIM: A PCIM-Based Framework for RBAC
LCN '03 Proceedings of the 28th Annual IEEE International Conference on Local Computer Networks
Joint Policy Management and Auditing in Virtual Organizations
GRID '03 Proceedings of the 4th International Workshop on Grid Computing
Administration of an RBAC System
HICSS '04 Proceedings of the Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 7 - Volume 7
A Model for Team-based Access Control (TMAC 2004)
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
A composite rbac approach for large, complex organizations
Proceedings of the ninth ACM symposium on Access control models and technologies
Knowledge sharing in virtual enterprises via an ontology-based access control approach
Computers in Industry
Complex service design: A virtual enterprise architecture for logistics service
Information Systems Frontiers
Task-activity based access control for process collaboration environments
Computers in Industry
Cooperative operating control based on virtual resources and user-suited HCI
CDVE'09 Proceedings of the 6th international conference on Cooperative design, visualization, and engineering
Using ASP for knowledge management with user authorization
Data & Knowledge Engineering
Knowledge kanban system for virtual research and development
Robotics and Computer-Integrated Manufacturing
International Journal of Enterprise Information Systems
Hi-index | 0.00 |
Secure information sharing is one of key factors for success of virtual enterprise (VE). The study identifies the characteristics of a VE and analyzes the requirements of a VE access control. A Virtual Enterprise Access Control (VEAC) model is proposed to handle resource management and sharing across each participating enterprise, which consists of a Project-based Access Control (PBAC) sub-model to manage public resources and a Role-based Access Control (RBAC) sub-model to manage private resources. The architecture of a VEAC model-based system is developed and consists of three core mechanisms including the Virtual Enterprise Access Control Center (VEACC), Security Gatekeeper (SG) and Global Certificate Authority Center (GCAC). Based on the system architecture, the study proposes certificate authentication, user authority and access control approaches to identify user's identity on-line, update and search user authority lists, and access private and public resources. The results of this study will facilitate more secure resource sharing, and overcome cooperation barrier from trust among participating enterprises in VE.