Identity and Access Management for Remote Maintenance Services in Business Networks

Access to information systems across corporate boundaries with high demands to privacy and trust result into ambitious research and development targets. This study provides motivation and a roadmap for approaching integrated security management solutions in a business network of partners with heterogeneous ICT and security infrastructures. We aim at describing specifics of identity and access management in inter-organizational collaboration, and a vision and arguments for identity and access management in a business network. A case study with Metso Paper, Inc., the leading manufacturer of paper machinery and related services, validates the results, thus providing a motivating example of the possibilities of e-services.

[1]  Ty Mey Eap,et al.  Federated security: lightweight security infrastructure for object repositories and Web services , 2005, International Conference on Next Generation Web Services Practices (NWeSP'05).

[2]  Jouni Pyötsiä ICT Opportunities and Challenges for Remote Services , 2005, Industrial Applications of Semantic Web.

[3]  Yih-Jiun Lee A Dynamic Virtual Organization Solution for Web-Services Based Grid Middleware , 2005, 16th International Workshop on Database and Expert Systems Applications (DEXA'05).

[4]  M. Lynn Hawaii International Conference on System Sciences , 1996 .

[5]  David S. Linthicum,et al.  Next Generation Application Integration: From Simple Information to Web Services , 2003 .

[6]  A.C. Weaver Enforcing distributed data security via Web services , 2004, IEEE International Workshop on Factory Communication Systems, 2004. Proceedings..

[7]  조영섭,et al.  OASIS SAML(Security Assertion Markup Language) v2.0 고찰 및 활용 , 2006 .

[8]  Phillip Hallam-Baker,et al.  Web services security: soap message security , 2003 .

[9]  Wilhelm Hasselbring,et al.  Information system integration , 2000, CACM.

[10]  Col Perks,et al.  Guide to Enterprise IT Architecture , 2003, Springer Professional Computing.

[11]  G. T. Gangemi,et al.  Computer Security Basics , 2006 .

[12]  R. Adams Proceedings , 1947 .

[13]  Jukka Heikkilä,et al.  Sharing for understanding and doing for learning: An Emerging Learning Business Network , 2005 .

[14]  R.A. Shaikh,et al.  Comparative analysis and design philosophy of next generation unified enterprise application security , 2005, Proceedings of the IEEE Symposium on Emerging Technologies, 2005..

[15]  Mirja Pulkkinen,et al.  EA Planning, Development and Management Process for Agile Enterprise Development , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.