2007 2nd International Conference on Digital Information Management 2007
DOI: 10.1109/icdim.2007.4444310
|View full text |Cite
|
Sign up to set email alerts
|

A secure collaborative web based environment for virtual organizations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2008
2008
2015
2015

Publication Types

Select...
3
2

Relationship

3
2

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…This scenario deals with authorizations management in virtual organizations [6]. We resume it as following:…”
Section: A Authorization In Virtual Organizationsmentioning
confidence: 99%
See 1 more Smart Citation
“…This scenario deals with authorizations management in virtual organizations [6]. We resume it as following:…”
Section: A Authorization In Virtual Organizationsmentioning
confidence: 99%
“…Under certain circumstances, administrators have to unlock some of the security doors of parties information systems. During a past European project called VIVACE 1 [6], unlocking security issues was solved through a workflow engine. This article retakes the use case scenario to prove the concept of dynamic authorization using situation orientation simplifies authorization specification and management.…”
Section: Introductionmentioning
confidence: 99%
“…The first version of our prototype made use of PERMIS (Laborde et al, 2007), which is a PMI developed by the ISSRG team of the University of Kent (Chadwick et al, 2008). The core of PERMIS is mainly composed of two entities: the Policy Decision Point (PDP) making access control decisions according to a given policy and the Policy Enforcement Point (PEP) implementing the decisions taken by the PDP.…”
Section: Authorisation: Yaabamentioning
confidence: 99%
“…In recent years, theoretical research of ABAC model has achieved some results, and it can be well used in large distributed environments [18], web service systems [19,20], network computing [21] and message sharing and management [22]. However, at present, RBAC is still the mainstream of access control model, and there is still a gap between RBAC and ABAC in terms of their extensive application.…”
Section: Related Workmentioning
confidence: 99%