Cyber Security Management of Access Controls in Digital Ecosystems and Distributed Environments

Resource and information protection plays a significant role in engaging the enterprises to actively participate inside a Digital Ecosystem or collaborative distributed digital environment. However, current developments of such security mechanisms for protecting these resources are still in their infancy. Most of the proposed protection frameworks do not provide a scalable and effective mechanism for multiple interacting entities in particular. This is even a greater issue when multiple resources are exchanged and shared in an open and dynamic environment. This paper proposes a distributed mechanism for individual enterprises to manage their own authorization processes and information access permissions with the aim of providing rigorous protection of enterprise resources.

[1]  Andrew S. Tanenbaum,et al.  Globe: a wide area distributed system , 1999, IEEE Concurr..

[2]  Ian T. Foster,et al.  Grid information services for distributed resource sharing , 2001, Proceedings 10th IEEE International Symposium on High Performance Distributed Computing.

[3]  Andrew S. Tanenbaum,et al.  The Design of a Capability-Based Distributed Operating System , 1986, Comput. J..

[4]  Von Welch,et al.  Fine-Grain Authorization for Resource Management in the Grid Environment , 2002, GRID.

[5]  Ian T. Foster,et al.  A security architecture for computational grids , 1998, CCS '98.

[6]  Steven Tuecke,et al.  An online credential repository for the Grid: MyProxy , 2001, Proceedings 10th IEEE International Symposium on High Performance Distributed Computing.

[7]  Hristo Koshutanski,et al.  Distributed Identity Management Model for Digital Ecosystems , 2007, The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007).

[8]  Steven Tuecke,et al.  X.509 Proxy Certificates for Dynamic Delegation , 2004 .

[9]  J.-M. Seigneur Demonstration of security through collaboration in the digital business ecosystem , 2005, Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005..

[10]  William E. Johnston,et al.  Certificate-based Access Control for Widely Distributed Resources , 1999, USENIX Security Symposium.

[11]  F. Nachira Towards a Network of Digital Business Ecosystems Fostering the Local Development , 2002 .

[12]  Markus Lorch,et al.  A new security model for collaborative environments , 2003 .

[13]  T. Kurz,et al.  Simulation of a Self-Optimising Digital Ecosystem , 2007, 2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference.

[14]  Ian T. Foster,et al.  A community authorization service for group collaboration , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.

[15]  Russ Housley,et al.  Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2002, RFC.

[16]  Cédric Tabin,et al.  Liberty Alliance Project , 2007 .