Access Control: What is Required in Business Collaboration?
نویسندگان
چکیده
Access control has been studied for sometime, and there are a number of theories and techniques for handling access control for single or centralised systems; however, unique and challenging security issues concerning collaboration in the context of service oriented computing (SOC) have arisen due to the dynamic and loosely coupled nature of the environment in which these collaborations are conducted. Individual organisations usually define their access control policies independently. When a collaboration opportunity arrives, a number of problems arise, such as: determining if the collaboration is possible given the access control policies, defining the policy for the collaboration and deciding under what conditions a service is allowed to be forwarded to other parties. Furthermore, different types of collaboration, in terms of the way collaboration is carried out, require different access control support. In this paper, we propose a model encoded in description logic to capture all the necessary elements for specifying access control policy for collaboration. Based on the model, various inconsistencies between access policies from different business units are identified. The paper also shows how a description logic reasoner can be used to prove that two policies are suitable, or not suitable, for collaboration. The policy model and policies are encoded in a SROIQ knowledge base. Although access control policies focus on a single system or a single business party’s requirements, the method presented in this paper allows a logical analysis of the suitability of potential collaboration partners. We believe this work is laying a foundation for access policy development, negotiation and enforcement for cross-organization collaborations.
منابع مشابه
Publication Ethics: Many Facets, Collaboration Required
Sir, the recent publication on “Publication Ethics” is very interesting (1). The article by Fazly Bazzaz and Sadeghi demonstrated many interesting cases of misconducts. Indeed, the misconducts can be seen in many ways. As mentioned in the present publication, both author and editor can perform publication misconducts. Nevertheless, the problem has many more facets. Sometimes,...
متن کاملAuthorization Control in Business Collaboration
Authorization control has been well studied for years, and there are quite a few theories and techniques available for handling access control for a single or a centralized system. However unique and challenging security issues concerning business collaboration in the context of service oriented computing (SOC) have arisen due to the dynamic and loosely coupling nature of the environment in whi...
متن کاملAuthorization models for secure information sharing: a survey and research agenda
This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...
متن کاملAuthorization Control in Collaborative Healthcare Systems
Modern healthcare systems require collaborations between individual social entities such as hospitals, medical centers, emergency services and community services. One of the most critical issues in this setting is security and privacy, i.e., who can access what and based on which condition(s). In the healthcare system that crosses different administrative domains, each business unit has its own...
متن کاملDynamic Business Collaborations Through Contract Services
New applications have recently emerged within the domains of e-Health, e-Science, e-Research and e-Government that require the formation of dynamic collaborations between independent, autonomous business organizations for the duration of a project designed with a specific purpose. To successfully create and manage such collaborations, there is a need of a standard way to specify: (a) what resou...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008