Toward comprehensive security policy governance in collaborative enterprise

1Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The lack of trust among software services spanning multiple organisations and the rather poor adaptability level of the current security policies are often seen as braking forces to collaborative-enterprise development. Removing this impediment involves re-thinking the security policy according to "due usage" requirements and setting security enforcement and regulations according to both the due usage and the runtime environment. This paper analyzes the nature of secured assets exchange management in collaborative enterprise, describing the assets sharing patterns and, accordingly, 'sub-context' partition method. Resource protection can be done by applying a 'collaborative usage control policy model' on each 'sub-context' to manage "due usage" control during service/information aggregation. In this way, a compendious but comprehensive security governance for collaborative enterprise is achieved. © 2012 IFIP International Federation for Information Processing.

Cite

CITATION STYLE

APA

Su, Z., & Biennier, F. (2012). Toward comprehensive security policy governance in collaborative enterprise. In IFIP Advances in Information and Communication Technology (Vol. 384 AICT, pp. 350–358). Springer New York LLC. https://doi.org/10.1007/978-3-642-33980-6_39

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free