Abstract
The lack of trust among software services spanning multiple organisations and the rather poor adaptability level of the current security policies are often seen as braking forces to collaborative-enterprise development. Removing this impediment involves re-thinking the security policy according to “due usage” requirements and setting security enforcement and regulations according to both the due usage and the runtime environment. This paper analyzes the nature of secured assets exchange management in collaborative enterprise, describing the assets sharing patterns and, accordingly, ‘sub-context’ partition method. Resource protection can be done by applying a ‘collaborative usage control policy model’ on each ‘sub-context’ to manage “due usage” control during service/information aggregation. In this way, a compendious but comprehensive security governance for collaborative enterprise is achieved.
Chapter PDF
Similar content being viewed by others
References
Linda, B.B., Richard, C., Kristin, L., Ric, T., Mark, E.: The evolving role of IT managers and CIOs–findings from the 2010 IBM global IT risk study. Technical report, IBM (2010)
Jay, H., Mark, N.: Assessing the security risks of Cloud Computing. Technical report, Gartner (2008)
Biennier, F., Aubry, R., Maranzana, M.: Integration of Business and Industrial Knowledge on Services to Set Trusted Business Communities of Organisations. In: Camarinha-Matos, L.M., Boucher, X., Afsarmanesh, H. (eds.) PRO-VE 2010. IFIP AICT, vol. 336, pp. 420–426. Springer, Heidelberg (2010)
Su, Z., Biennier, F.: End-to-end Security Policy Description and Management for Collaborative System. In: Proc. IAS 2010, pp. 68–73 (2010)
Su, Z., Biennier, F.: End-to-end security policy description and management for collaborative system. In: Proc. IAS 2010, pp. 137–142. MIR Lab. (August 2010)
Paci, F., Bertino, E., Crampton, J.: An Access-Control Framework for WS-BPEL. Int. J. Web Service Res. 5, 20–43 (2008)
Martino, L., Bertino, E.: Security for Web Services: Standards and Resarch Issues. Int. J. Web Service Res. 6, 48–74 (2009)
Sans, T., Cuppens, F., Cuppens-Boulahia, N.: FORM: A Federated Rights Expression Model for Open DRM Frameworks. In: Okada, M., Satoh, I. (eds.) ASIAN 2006. LNCS, vol. 4435, pp. 45–59. Springer, Heidelberg (2008)
Cuppens, F., Cuppens-Boulahia, N., Coma, C.: O2O: Virtual Private Organizations to Manage Security Policy Interoperability. In: Bagchi, A., Atluri, V. (eds.) ICISS 2006. LNCS, vol. 4332, pp. 101–115. Springer, Heidelberg (2006)
Cuppens, F., Cuppens-Boulahis, N.: Modeling Contextual Security Policies. Int. J.Inf. Secur. 7, 285–305 (2008)
Wang, L., Wijesekera, D., Jajodia, S.: A logic-based Framework for Attribute Based Access Control. In: Proc. FMSE 2004, pp. 45–55. ACM, New York (2004)
Organization for the Advancement of Structured Information Standards (OASIS): eXtensible Access Control Markup Language (XACML) version 2.0. OASIS (2005)
Alfaro, J.G., Cuppens-Boulahia, N., Cuppens, F.: Complete Analysis of Configuration Rules to Guarantee Reliable Network Security Policies. Int. J.Inf. Secur. 7, 103–122 (2008)
Kheir, N., Debar, H., Cuppens, F., Cuppens-Boulahia, N., Viinikka, J.: A Service Dependency Modeling Framework for Policy-Based Response Enforcement. In: Flegel, U., Bruschi, D. (eds.) DIMVA 2009. LNCS, vol. 5587, pp. 176–195. Springer, Heidelberg (2009)
Debar, H., Kheir, N., Cuppens-Boulahia, N., Cuppens, F.: Service Dependencies in Information Systems Security. In: Kotenko, I., Skormin, V. (eds.) MMM-ACNS 2010. LNCS, vol. 6258, pp. 1–20. Springer, Heidelberg (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 IFIP International Federation for Information Processing
About this paper
Cite this paper
Su, Z., Biennier, F. (2012). Toward Comprehensive Security Policy Governance in Collaborative Enterprise. In: Frick, J., Laugen, B.T. (eds) Advances in Production Management Systems. Value Networks: Innovation, Technologies, and Management. APMS 2011. IFIP Advances in Information and Communication Technology, vol 384. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33980-6_39
Download citation
DOI: https://doi.org/10.1007/978-3-642-33980-6_39
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33979-0
Online ISBN: 978-3-642-33980-6
eBook Packages: Computer ScienceComputer Science (R0)