257
Views
4
CrossRef citations to date
0
Altmetric
Article

Policy reconciliation for access control in dynamic cross-enterprise collaborations

ORCID Icon, & ORCID Icon
Pages 279-299 | Received 21 Dec 2016, Accepted 12 Jul 2017, Published online: 24 Jul 2017

References

  • Andresen, L. 2014. “Open Sourcing the Future of IAM.” Network Security 2014 (9): 18–20. doi:10.1016/S1353-4858(14)70094-7.
  • Belkadi, F., M. Messaadia, A. Bernard, and D. Baudry. 2017. “Collaboration Management Framework for OEM – Suppliers Relationships: A Trust-Based Conceptual Approach.” Enterprise Information Systems 11 (7): 1018–1042. doi:10.1080/17517575.2016.1250166.
  • Bencsáth, B., G. Pék, L. Butty´an, and M. Félegyházi. 2012. “The Cousins of Stuxnet: Duqu, Flame, and Gauss.” Future Internet 4 (4): 971. doi:10.3390/fi4040971.
  • Comuzzi, M. 2017. “Alignment of Process Compliance and Monitoring Requirements in Dynamic Business Collaborations.” Enterprise Information Systems 11 (6): 884–908. 10.1080/17517575.2015.1135482.
  • Coyne, E., and T. R. Weil. 2013. “ABAC and RBAC: Scalable, Flexible, and Auditable Access Management.” IT Professional 15 (3): 14–16. doi:10.1109/MITP.2013.37.
  • Damianou, N., N. Dulay, E. Lupu, and M. Sloman. 2001. “The Ponder Policy Specification Language.” In Proceedings of the International Workshop on Policies for Distributed Systems and Networks, POLICY ’01, edited by Morris Sloman, Jorge Lobo and Emil Lupu, Bristol, 18–38. London: Springer-Verlag.
  • Feng, N., H. Wu, M. Li, D. Wu, F. Chen, and J. Tian. 2016. “Managing Security Risks for Inter-Organisational Information Systems: A Multiagent Collaborative Model.” Enterprise Information Systems 10 (7): 751–770. doi:10.1080/17517575.2014.986217.
  • Ferraiolo, D., R. Chandramouli, R. Kuhn, and V. Hu. 2016. “Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC).” In Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, ABAC ’16, New Orleans, LA, 13–24. New York, NY: ACM. doi:10.1145/2875491.2875496.
  • Grau, B. C., I. Horrocks, B. Motik, B. Parsia, P. Patel-Schneider, and U. Sattler. 2008. “OWL 2: The Next Step for OWL.” Web Semantics (Online) 6 (4): 309–322. doi:10.1016/j.websem.2008.05.001.
  • Gunther, N. J. 2007. Guerrilla Capacity Planning - A Tactical Approach to Planning for Highly Scalable Applications and Services. Berlin, Heidelberg: Springer.
  • Hermann, M., T. Pentek, and B. Otto. 2016. “Design Principles for Industrie 4.0 Scenarios.” In HICSS, edited by Tung X. Bui and Ralph H. Sprague Jr., 3928–3937. Washington, DC: IEEE Computer Society.
  • Hoang, H. H., J. J. Jung, and C. P. Tran. 2014. “Ontology-Based Approaches for Cross- Enterprise Collaboration: A Literature Review on Semantic Business Process Management.” Enterprise Information Systems 8 (6): 648–664. doi:10.1080/17517575.2013.767382.
  • Jin, X., R. Krishnan, and R. Sandhu. 2012. “A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC.” In Proceedings of the 26th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec’12, edited by Nora Cuppens-Boulahia, Frédéric Cuppens and France Joaquin Garcia, 41–55. Berlin, Heidelberg: Springer-Verlag.
  • Kandala, S., R. Sandhu, and V. Bhamidipati. 2011. “An Attribute Based Framework for Risk- Adaptive Access Control Models.” 2011 Sixth International Conference on Availability, Reliability and Security (ARES), Vienna, August, 236–241.
  • Karnouskos, S., A. W. Colombo, T. Bangemann, K. Manninen, R. Camp, M. Tilly, P. Stluka, F. Jammes, J. Delsing, and J. Eliasson. 2012. “A SOA-based Architecture for Empowering Future Collaborative Cloud-Based Industrial Automation.” IECON 2012-38th Annual Conference on IEEE Industrial Electronics Society, Montreal, QC, October, 5766–5772.
  • Kemény, Z., E. Ilie-Zudor, and L. Monostori. 2009. “From Tracking Operations to IOT: The Small Business Perspective.” In Proceedings of the 14th IEEE International Conference on Emerging Technologies & Factory Automation, ETFA’09, Palma de Mallorca, Spain, 1342–1349. Piscataway, NJ: IEEE Press. http://dl.acm.org/citation.cfm?id=1740954.1741138
  • Krötzsch, M. 2012. “OWL 2 Profiles: An Introduction to Lightweight Ontology Languages.” In Reasoning Web. Semantic Technologies for Advanced Query Answering - 8th International Summer School 2012, Proceedings, Vienna, Austria, September 3-8, edited by T. Eiter and T. Krennwallner, Vol. 7487 of Lecture Notes in Computer Science, 112–183. Springer. doi:10.1007/978-3-642-33158-9_4.
  • Langner, R. 2011. “Stuxnet: Dissecting a Cyberwarfare Weapon.” IEEE Security and Privacy 9 (3): 49–51. doi:10.1109/MSP.2011.67.
  • Lee, J., B. Bagheri, and H.-A. Kao. 2015. “A Cyber-Physical Systems Architecture for Industry 4.0-Based Manufacturing Systems.” Manufacturing Letters 3: 18–23. doi:10.1016/j.mfglet.2014.12.001.
  • Mahalle, P. N., and P. N. Railkar. 2015. Identity Management for Internet of Things. Wharton, TX: River Publishers.
  • Ni, Q., E. Bertino, and J. Lobo. 2010. “Risk-Based Access Control Systems Built on Fuzzy Inferences.” In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS ’10, edited by David Basin and Peng Liu, 250–260. New York, NY: ACM.
  • Nicholson, A., S. Webber, S. Dyer, T. Patel, and H. Janicke. 2012. “SCADA Security in the Light of Cyber-Warfare.” Computers & Security 31 (4): 418–436. doi:10.1016/j.cose.2012.02.009.
  • Nie, H., X. Lu, and H. Duan. 2014. “Supporting BPMN Choreography with System Integration Artefacts for Enterprise Process Collaboration.” Enterprise Information Systems 8 (4): 512–529. doi:10.1080/17517575.2014.880131.
  • Perkins, E., and A. Allan. 2015. The Identity of Things for the Internet of Things. Wharton, TX. doi:10.1109/MSP.2011.67.
  • Sandhu, R. S. 1993. “Lattice-Based Access Control Models.” Computer 26 (11): 9–19. doi:10.1109/2.241422.
  • Sandhu, R. S., E. J. Coyne, H. L. Feinstein, and C. E. Youman. 1996. “Role-Based Access Control Models.” Computer 29 (2): 38–47. doi:10.1109/2.485845.
  • Sandhu, R. S., and P. Samarati. 1994. “Access Control: Principle and Practice.” IEEE Communications Magazine 32 (9): 40–48. doi:10.1109/35.312842.
  • Tonti, G., J. M. Bradshaw, R. Jeffers, R. Montanari, N. Suri, and A. Uszok. 2003. “Semantic Web Languages for Policy Representation and Reasoning: A Comparison of KAoS, Rei, and Ponder.” In International Semantic Web Conference, edited by D. Fensel, K. P. Sycara, and J. Mylopoulos, Vol. 2870 of Lecture Notes in Computer Science, edited by Dieter Fensel, Katia Sycara and John Mylopoulos, Sanibel Island, FL, October 20-23, 419–437. Berlin, Heidelberg: Springer.
  • Van Cleeff, A., W. Pieters, and R. Wieringa. 2010. “Benefits of Location-Based Access Control: A Literature Study.” In Green Computing and Communications (GreenCom), 2010 IEEE/ACM Int’l Conference on Int’l Conference on Cyber, Physical and Social Computing (CPSCom), Hangzhou, December 18-20, 739–746.
  • Wang, S., J. Wan, D. Li, and C. Zhang. 2016. “Implementing Smart Factory of Industrie 4.0: An Outlook.” IJDSN 10: 1–3159805. doi:10.1155/2016/3159805.
  • XACML-V3.0. 2012. “eXtensible Access Control Markup Language (XACML) Version 3.0. Candidate OASIS Standard 01.” Accessed September. http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-cos01-en.html
  • Yuan, E., and J. Tong. 2005. “Attributed Based Access Control (ABAC) for Web Services.” In Proceedings of the IEEE International Conference on Web Services, ICWS ’05, Orlando, FL, 561–569. Washington, DC: IEEE Computer Society. doi:10.1109/ICWS.2005.25.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.