Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2017
DOI: 10.1080/17517575.2017.1355985
|View full text |Cite
|
Sign up to set email alerts
|

Policy reconciliation for access control in dynamic cross-enterprise collaborations

Abstract: In dynamic cross-enterprise collaborations, different enterprises form a − possibly temporary − business relationship. To integrate their business processes, enterprises may need to grant each other limited access to their information systems. Authentication and authorization are key to secure information handling. However, access control policies often rely on non-standardized attributes to describe the roles and permissions of their employees which convolutes cross-organizational authorization when business … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 25 publications
0
9
0
Order By: Relevance
“…Liu et al [24] raised similar security concerns particularly for collaborative manufacturing systems, and argued that configuring and enforcing an access control model in a collaborative manufacturing system is a challenging task. This concern was addressed in [34,35] with a framework that enables policy-based access control to maintain trust relationships that cross the boundaries of collaborating organizations, while lifting the burden to manually align diverse sets of authorization policies of different organizations.…”
Section: Trust Models Access Control and Policy-based Authorizationmentioning
confidence: 99%
“…Liu et al [24] raised similar security concerns particularly for collaborative manufacturing systems, and argued that configuring and enforcing an access control model in a collaborative manufacturing system is a challenging task. This concern was addressed in [34,35] with a framework that enables policy-based access control to maintain trust relationships that cross the boundaries of collaborating organizations, while lifting the burden to manually align diverse sets of authorization policies of different organizations.…”
Section: Trust Models Access Control and Policy-based Authorizationmentioning
confidence: 99%
“…Evidently, the existence of virtual communities depends on the amount of effort (and strategies or mechanisms) put in by the administrator or organisers or users of the virtual community (Preuveneers et al, 2017). It appears that the existing literature focuses on identifying the various stages in the life cycle of a virtual community.…”
Section: Life Cycle Of Virtual Communitiesmentioning
confidence: 99%
“…Authors in [21] address access control in dynamic crossenterprise collaborations by proposing a framework for attribute and policy reconciliation, where attribute definitions or their interpretations are not standardized. The framework externalizes domain knowledge in order to dynamically infer attribute relationships during the evaluation of authorization decisions.…”
Section: Distributedmentioning
confidence: 99%
“…From this syntax we can switch to any XACML profile, and thereafter it will be translated to the target policy language which is specific to the model. Our solution is distributed, but unlike existing distributed solutions [10,11,20,21], we consider heterogeneous existing access control systems adopting heterogeneous models (ABAC, RBAC, UCON. .…”
Section: Our Proposed Mechanism Of Automatic Mapping Between Heterogementioning
confidence: 99%