Digital ecosystem access control management

The newly emerging concept of Digital Ecosystem (DE) has played a significant role in today's technology, especially for Small and Medium Enterprises (SMEs) to adopt Information and Communication Technology (ICT) inside their businesses. DE reveals the opportunities to enhance the productivity and efficiency of each business transaction. Therefore, it will further contribute to the success of the enterprise's businesses. Along with the advancement of DE technology, security has emerged as a vital element in protecting the resources and information for the interacting DE member entities in particular. However, current developments of such security mechanisms for protecting these resources are still in their infancy. This paper proposes a distributed mechanism for individual enterprises to manage their own authorization processes and information access permissions with the aim of providing rigorous protection of enterprise resources.

[1]  조영섭,et al.  OASIS SAML(Security Assertion Markup Language) v2.0 고찰 및 활용 , 2006 .

[2]  John Hughes,et al.  Security Assertion Markup Language (SAML) 2.0 Technical Overview , 2004 .

[3]  Audretsch,et al.  The Digital Ecosystems Research Vision : 2010 and Beyond July , 2022 .

[4]  Hristo Koshutanski,et al.  Distributed Identity Management Model for Digital Ecosystems , 2007, The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007).

[5]  Ian T. Foster,et al.  Grid information services for distributed resource sharing , 2001, Proceedings 10th IEEE International Symposium on High Performance Distributed Computing.

[6]  Andrew S. Tanenbaum,et al.  Globe: a wide area distributed system , 1999, IEEE Concurr..

[7]  Elizabeth Chang,et al.  Shield privacy: A conceptual framework for information privacy and data access controls , 2006 .

[8]  F. Nachira,et al.  A Network of Digital Business Ecosystems for Europe : Roots , Processes and Perspectives , 2007 .

[9]  Ian T. Foster,et al.  A security architecture for computational grids , 1998, CCS '98.

[10]  Von Welch,et al.  Fine-Grain Authorization for Resource Management in the Grid Environment , 2002, GRID.

[11]  Cédric Tabin,et al.  Liberty Alliance Project , 2007 .

[12]  J.-M. Seigneur Demonstration of security through collaboration in the digital business ecosystem , 2005, Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005..

[13]  Markus Lorch,et al.  A new security model for collaborative environments , 2003 .

[14]  Andrew S. Tanenbaum,et al.  The Design of a Capability-Based Distributed Operating System , 1986, Comput. J..

[15]  Steven Tuecke,et al.  X.509 Proxy Certificates for Dynamic Delegation , 2004 .

[16]  Geoff Skinner,et al.  Making A CASE for PACE: Components of the Combined Authentication Scheme Encapsulation for a Privacy Augmented Collaborative Environment , 2008, Security and Management.

[17]  F. Nachira Towards a Network of Digital Business Ecosystems Fostering the Local Development , 2002 .

[18]  Steven Tuecke,et al.  An online credential repository for the Grid: MyProxy , 2001, Proceedings 10th IEEE International Symposium on High Performance Distributed Computing.

[19]  Joel Weise-Sunps,et al.  Public Key Infrastructure Overview , 2001 .

[20]  T. Kurz,et al.  Simulation of a Self-Optimising Digital Ecosystem , 2007, 2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference.

[21]  David Cooper,et al.  Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2008, RFC.

[22]  Ian T. Foster,et al.  A community authorization service for group collaboration , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.

[23]  Geoff Skinner,et al.  A privacy augmented collaborative environment (PACE) , 2007 .

[24]  William E. Johnston,et al.  Certificate-based Access Control for Widely Distributed Resources , 1999, USENIX Security Symposium.