2007
DOI: 10.1016/j.compind.2006.04.003
|View full text |Cite
|
Sign up to set email alerts
|

Development of an access control model, system architecture and approaches for resource sharing in virtual enterprise

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2007
2007
2020
2020

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 36 publications
(12 citation statements)
references
References 5 publications
0
10
0
Order By: Relevance
“…While traditional access control models are a key concept for information technology security in general, their applicability for information sharing must be carefully investigated. For example, when used in the context of the information hub model, Access Control Lists (ACLs), Discretionary Access Control (DAC), Mandatory Access Control (MAC), Role-based access Control (RBAC) fall short in terms of scalability [1]. Their main application domain is across small company networks or within an enterprise.…”
Section: Related Workmentioning
confidence: 98%
“…While traditional access control models are a key concept for information technology security in general, their applicability for information sharing must be carefully investigated. For example, when used in the context of the information hub model, Access Control Lists (ACLs), Discretionary Access Control (DAC), Mandatory Access Control (MAC), Role-based access Control (RBAC) fall short in terms of scalability [1]. Their main application domain is across small company networks or within an enterprise.…”
Section: Related Workmentioning
confidence: 98%
“…However, when used in the context of information sharing, Access Control Lists (ACLs), Discretionary Access Control (DAC), Mandatory Access Control (MAC), and Role-based access Control (RBAC) fall short in terms of scalability [6]. Their main application domain is across small company networks or within an enterprise.…”
Section: Related Workmentioning
confidence: 98%
“…The organizations use their core competencies and interoperate to provide service to their customers. Once the objective is achieved, the VE is then dissolved (Chen et al 2007;Assimakopoulos and Dimitriou 2006). In order to achieve complete integration and coordination of the business processes among the partners in the network, researchers have developed different approaches to model the situation.…”
Section: Virtual Enterprise Architecturementioning
confidence: 99%