Secure resource sharing on cross-organization collaboration using a novel trust method

被引:16
作者
Chen, Tsung-Yi
Chen, Yuh-Min [1 ]
Wang, Chin-Bin
Chu, Hui-Chuan
Yang, Huimei
机构
[1] Natl Cheng Kung Univ, Inst Mfg Engn, Tainan 70101, Taiwan
[2] Nan Hua Univ, Elect Comerence Management Dept, Chiayi, Taiwan
[3] Natl Univ Tainan, Tainan, Taiwan
[4] Tatung Inst Commerce & Technol, Dept Business Adm, Chiayi, Taiwan
关键词
virtual enterprise; resource sharing; RBAC; trust; access control; collaboration;
D O I
10.1016/j.rcim.2006.04.005
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
A virtual enterprise (VE) consists of a network of independent, geographically dispersed administrative business domains that collaborate with each other by sharing business processes and resources across enterprises to provide a value-added service to customers. Therefore, the success of a VE relies on full information transparency and appropriate resource sharing, making security and trust among subjects significant issues. Trust evaluation to ensure information security is most complicated in a VE involving cross-organization collaboration. This study presents a virtual enterprise access control (VEAC) model to enable resource sharing for collaborative operations in the VE. A scenario for authentication and authorization in the life cycle of a VE is then described to identify the main activities for controlling access. Also developed herein is a trust evaluation method based on the VEAC model to improve its security while safeguarding sensitive resources to support collaborative activities. The trust evaluation method involves two trust evaluation sub-models, one to evaluate the level of trust between two virtual enterprise roles, and another to measure the level of trust between two projects. The two sub-models support each other to make resource-sharing decisions, and are developed based on the concepts of direct, indirect, and negative trust factors. Finally, an example of measuring the trust between two subjects is demonstrated after introducing the two sub-models. The VEAC-based trust evaluation method enables the following: (1) secure resource sharing across projects and enterprises, (2) collaborative operation among participating workers, (3) increased information transparency and (4) lowered information delay in VEs. (c) 2006 Elsevier Ltd. All rights reserved.
引用
收藏
页码:421 / 435
页数:15
相关论文
共 22 条
[1]  
Ahn GJ, 2003, TWELFTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, P202
[2]   A model for attribute-based user-role assignment [J].
Al-Kahtani, MA ;
Sandhu, R .
18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, :353-362
[3]  
[Anonymous], INTEGRITY CONSIDERAT
[4]   Automated cross-organisational trust establishment on extranets [J].
Au, R ;
Looi, M ;
Ashley, P .
PROCEEDINGS OF THE WORKSHOP ON INFORMATION TECHNOLOGY FOR VIRTUAL ENTERPRISES, ITVE 2001, 2001, 23 (06) :3-11
[5]  
BARRETT S, 1982, MIS Q, P83
[6]   Designing role hierarchies for access control in workflow systems [J].
Botha, RA ;
Eloff, JHP .
25TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE & APPLICATIONS CONFERENCE, 2001, :117-122
[7]  
CHARLES E, 2002, P 7 ACM S ACC CONTR, P87
[8]  
Chen CY, 1999, BIOMED CHROMATOGR, V13, P11, DOI 10.1002/(SICI)1099-0801(199902)13:1<11::AID-BMC764>3.0.CO
[9]  
2-V
[10]  
Dimmock N., 2004, Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies, P156, DOI [DOI 10.1145/990036.990062, 10.1145/990036.990062]