The Characteristics of Access Control Model Towards Securing Collaborative Knowledge Management System: Empirical Verification
نویسندگان
چکیده
Knowledge Management System (KMS) is such an application of computer based communications and information systems that grant sharing and transferring knowledge effectively; furthermore with the evolution of Internet, KMS has improved its knowledge process and activities where it can be accessed with varied form of technologies such as email, video conferencing and so forth, from dispersed geographical area. Hence, security becomes major issue as knowledge is an intellectual property of an organization and it must be well managed. Mostly the issues are regard to the restriction of the access permission to knowledge. Therefore, there is a need to construct a security model towards secure KMS, for managing access restriction in order to avoid unauthorized access as well as to protect knowledge throughout Knowledge Management (KM) activities. This research found that Access Control Model (ACM) is competent to overcome these issues, thus, this paper is to SCIREA Journal of Computer http://www.scirea.org/journal/Computer February 6, 2017 Volume 2, Issue 1, February 2017
منابع مشابه
A Framework of Secure Kms with Rbac Implementation
Knowledge Management System (KMS) is a tool to support knowledge management (KM) and nowadays it has been a priority to the organizations as to protect the organization intellectual assets. The evolution of internet has brought KMS becomes more powerful while it can serve users in collaborative system. However, though the excitement of expanding KMS capabilities, security issue is critical due ...
متن کاملA model for specification, composition and verification of access control policies and its application to web services
Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...
متن کاملA Developed Model for Purchase Intention of Foreign Food Products: An Empirical Study in the Iranian Context
The aim of this study is to develop a conceptual model for purchase intention of foreign food products in the Iranian context. Based on an in-depth review of past literature, the sub-factors related to customer’s purchase intention were extracted. Then, exploratory factor analysis and confirmatory factor analysis were applied to identify and confirm the factors affecting purchase intention of f...
متن کاملRBAC Architectural Design Issues in Institutions Collaborative Environment
Institutional collaborative systems focus on providing the fast, and secure connections to students, teaching and non-teaching staff members. Access control is more important in these types of systems because different kind of users access the system on different levels. So a proper architecture must be there for these kinds of systems, for providing an efficient and secure system. As lot of wo...
متن کاملRBAC Architecture Design Issues in Institutions Collaborative Environment
Institutional collaborative systems focus on providing the fast, and secure connections to students, teaching and non-teaching staff members. Access control is more important in these types of systems because different kind of users access the system on different levels. So a proper architecture must be there for these kinds of systems, for providing an efficient and secure system. As lot of wo...
متن کامل