Knowledge sharing in virtual enterprises via an ontology-based access control approach

被引:54
作者
Chen, Tsung-Yi [1 ]
机构
[1] Nanhua Univ, Dept Elect Commerce Management, Chiayi 62248, Taiwan
关键词
virtual enterprise; ontology; knowledge sharing; access control policy;
D O I
10.1016/j.compind.2007.12.004
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Collaborating throughout a product life cycle via virtual enterprise (VE) is one of the most promising strategies for enhancing global competitiveness. Efficient and secure knowledge sharing is critical to the success of a VE. This study presents a novel approach, model and technology for knowledge access control and sharing across enterprises. First, this study proposes an ontology-based knowledge sharing model and a multiple-layer knowledge representation framework on which a knowledge access control model for knowledge sharing in a VE is proposed. In the proposed model, user authorizations permitting access to knowledge in a VE are classified into two levels: (1) basic privileges and (2) extended privileges. The former is evaluated from four dimensions, i.e. who, what, when and where, while the latter is determined by considering how three domain ontologies, i.e., product, organization and activity, are related. This study then develops a knowledge access control policy (KACP) language model which is used to identify the knowledge access control and sharing rules of a VE and all its enterprise members. The knowledge access control model proposed in this study can facilitate VE Knowledge management and sharing across enterprises, enhance knowledge sharing security and flexibility and regulate knowledge sharing to expeditiously reflect changes in the business environment. (c) 2007 Elsevier B.V. All rights reserved.
引用
收藏
页码:502 / 519
页数:18
相关论文
共 29 条
[1]  
Bacon J., 2002, ACM Transactions on Information and Systems Security, V5, P492, DOI 10.1145/581271.581276
[2]  
Barker S., 2003, ACM Transactions on Information and Systems Security, V6, P501, DOI 10.1145/950191.950194
[3]   Meta-policies for distributed role-based access control systems [J].
Belokosztolszki, A ;
Moody, K .
THIRD INTERNATION WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, :106-115
[4]   Secure knowledge management: Confidentiality, trust, and privacy [J].
Bertino, Elisa ;
Khan, Latifur R. ;
Sandhu, Ravi ;
Thuraisingham, Bhavani .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2006, 36 (03) :429-438
[5]   DESCRIPTION LOGICS IN DATA MANAGEMENT [J].
BORGIDA, A .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 1995, 7 (05) :671-682
[6]   Knowledge representation with ontologies: The present and future [J].
Brewster, C ;
O'Hara, K .
IEEE INTELLIGENT SYSTEMS, 2004, 19 (01) :72-81
[7]  
Chen T.-Y., 2008, J INFORM MANAGEMENT, V15, P239
[8]   Secure resource sharing on cross-organization collaboration using a novel trust method [J].
Chen, Tsung-Yi ;
Chen, Yuh-Min ;
Wang, Chin-Bin ;
Chu, Hui-Chuan ;
Yang, Huimei .
ROBOTICS AND COMPUTER-INTEGRATED MANUFACTURING, 2007, 23 (04) :421-435
[9]   Development of an access control model, system architecture and approaches for resource sharing in virtual enterprise [J].
Chen, Tsung-Yi ;
Chen, Yuh-Min ;
Chu, Hui-Chuan ;
Wang, Chin-Bin .
COMPUTERS IN INDUSTRY, 2007, 58 (01) :57-73
[10]  
COETZEE M, 2003, P 2003 ANN RES C S A, P285