• Journal of Internet Computing and Services
    ISSN 2287 - 1136(Online) / ISSN 1598 - 0170 (Print)
    http://jics.or.kr/

Trusted Information Sharing Model in Collaborative Systems


Seng-Phil Hong, Jae-Hyoun Kim, Journal of Internet Computing and Services, Vol. 8, No. 1, pp. 99-114, Feb. 2007
Full Text:
Keywords: Authorization, authentication, access control, Security Policy, PKI, PMI, e-Business

Abstract

In the rapidly changing e-business environment, organizations need to share information, process business transactions, and enhance collaborations with relevant entities by taking advantage of the various technologies. However, there are always the security issues that need to be handled in order for the e-business operations to be run efficiently. In this research, we suggest the new security authorization model for safety flexible supporting the needs of e-business (e-marketplace) in an organization. This proposed model provides the scalable of access control policy among multi-domains, and preservation of flexible authorization management in distributed system environments. For servers to take the access control policy and enforcement decisions, we also describe the feasible authorization architecture is concerned with how they might seek advice and guideline from formal access control model.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[APA Style]
Seng-Phil Hong and Jae-Hyoun Kim (2007). Trusted Information Sharing Model in Collaborative Systems. Journal of Internet Computing and Services, 8(1), 99-114.

[IEEE Style]
S. Hong and J. Kim, "Trusted Information Sharing Model in Collaborative Systems," Journal of Internet Computing and Services, vol. 8, no. 1, pp. 99-114, 2007.

[ACM Style]
Seng-Phil Hong and Jae-Hyoun Kim. 2007. Trusted Information Sharing Model in Collaborative Systems. Journal of Internet Computing and Services, 8, 1, (2007), 99-114.