TY - JOUR
T1 - Development of an access control model, system architecture and approaches for resource sharing in virtual enterprise
AU - Chen, Tsung Yi
AU - Chen, Yuh Min
AU - Chu, Hui Chuan
AU - Wang, Chin Bin
PY - 2007/1/1
Y1 - 2007/1/1
N2 - Secure information sharing is one of key factors for success of virtual enterprise (VE). The study identifies the characteristics of a VE and analyzes the requirements of a VE access control. A Virtual Enterprise Access Control (VEAC) model is proposed to handle resource management and sharing across each participating enterprise, which consists of a Project-based Access Control (PBAC) sub-model to manage public resources and a Role-based Access Control (RBAC) sub-model to manage private resources. The architecture of a VEAC model-based system is developed and consists of three core mechanisms including the Virtual Enterprise Access Control Center (VEACC), Security Gatekeeper (SG) and Global Certificate Authority Center (GCAC). Based on the system architecture, the study proposes certificate authentication, user authority and access control approaches to identify user's identity on-line, update and search user authority lists, and access private and public resources. The results of this study will facilitate more secure resource sharing, and overcome cooperation barrier from trust among participating enterprises in VE.
AB - Secure information sharing is one of key factors for success of virtual enterprise (VE). The study identifies the characteristics of a VE and analyzes the requirements of a VE access control. A Virtual Enterprise Access Control (VEAC) model is proposed to handle resource management and sharing across each participating enterprise, which consists of a Project-based Access Control (PBAC) sub-model to manage public resources and a Role-based Access Control (RBAC) sub-model to manage private resources. The architecture of a VEAC model-based system is developed and consists of three core mechanisms including the Virtual Enterprise Access Control Center (VEACC), Security Gatekeeper (SG) and Global Certificate Authority Center (GCAC). Based on the system architecture, the study proposes certificate authentication, user authority and access control approaches to identify user's identity on-line, update and search user authority lists, and access private and public resources. The results of this study will facilitate more secure resource sharing, and overcome cooperation barrier from trust among participating enterprises in VE.
UR - http://www.scopus.com/inward/record.url?scp=33751414556&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33751414556&partnerID=8YFLogxK
U2 - 10.1016/j.compind.2006.04.003
DO - 10.1016/j.compind.2006.04.003
M3 - Article
AN - SCOPUS:33751414556
VL - 58
SP - 57
EP - 73
JO - Computers in Industry
JF - Computers in Industry
SN - 0166-3615
IS - 1
ER -