Security issues in collaboration with emphasis on access management continue to be researched extensively as technology innovation allows us to collaborate in many different ways. However, this research delves into a different perspective of collaboration security where dynamic virtual teams are put together when a company A acquires company B. In this context company A brings together people, processes, and Technologies from its organization that have to collaborate with their counterparts in the acquired company. The business goal is to seamlessly integrate the acquired companies people, processes, and technologies. The paper presents the inter-enterprise collaboration focus and discusses the relevant security challenges in on boarding. The concept of self-organization and its application to collaboration security is discussed. The notion of security touch points to deal with access management is presented. Finally the security model for on boarding is discussed where four key concepts of structured organization, security touch points, three C's of collaboration, and community driven access management are discussed.
[1]
Franco Zambonelli,et al.
Case studies for self-organization in computer science
,
2006,
J. Syst. Archit..
[2]
Carlos Gershenson,et al.
When Can We Call a System Self-Organizing?
,
2003,
ECAL.
[3]
Otto Carlos Muniz Bandeira Duarte,et al.
A Self-Organized Mechanism for Thwarting Malicious Access in Ad Hoc Networks
,
2010,
2010 Proceedings IEEE INFOCOM.
[5]
Reijo Savola.
Node Level Security Management and Authentication in Mobile Ad Hoc Networks
,
2009,
2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware.
[6]
Falko Dressler,et al.
A study of self-organization mechanisms in ad hoc and sensor networks
,
2008,
Comput. Commun..
[7]
M. Eigen,et al.
The Hypercycle: A principle of natural self-organization
,
2009
.