The Community for Technology Leaders
2008 IEEE International Conference on Services Computing (2008)
July 7, 2008 to July 11, 2008
ISBN: 978-0-7695-3283-7
pp: 561-562
ABSTRACT
Different types of business collaborations exist in terms of the way that the collaboration is carried out. In this paper, we will look into the characteristics of different collaborations and analyze their policy requirements accordingly. Various inconsistencies between authorization policies from different business units are identified and suggestions are made according to different types collaborations.
INDEX TERMS
authorization control, access control, security policy, business collaboration, collaboration
CITATION

D. D. He and J. Yang, "Identify Authorization Control Requirement in Business Collaboration," 2008 IEEE International Conference on Services Computing(SCC), vol. 02, no. , pp. 561-562, 2008.
doi:10.1109/SCC.2008.75
88 ms
(Ver 3.3 (11022016))