Volume 8, Issue 4 pp. 523-539
Research Article
Free to Read

An authorization model for cross-enterprise collaborations

Fotios I. Gogoulos

Corresponding Author

Fotios I. Gogoulos

School of Electrical and Computer Engineering, National Technical University of Athens, Athens, Greece

Correspondence: Fotios I. Gogoulos, School of Electrical and Computer Engineering, National Technical University of Athens, Heroon Polytechniou 9, 15773, Athens, Greece.

E-mail: [email protected]

Search for more papers by this author
Anna Antonakopoulou

Anna Antonakopoulou

School of Electrical and Computer Engineering, National Technical University of Athens, Athens, Greece

Search for more papers by this author
Georgios V. Lioudakis

Georgios V. Lioudakis

School of Electrical and Computer Engineering, National Technical University of Athens, Athens, Greece

Search for more papers by this author
Aziz S. Mousas

Aziz S. Mousas

School of Electrical and Computer Engineering, National Technical University of Athens, Athens, Greece

Search for more papers by this author
Dimitra I. Kaklamani

Dimitra I. Kaklamani

School of Electrical and Computer Engineering, National Technical University of Athens, Athens, Greece

Search for more papers by this author
Iakovos S. Venieris

Iakovos S. Venieris

School of Electrical and Computer Engineering, National Technical University of Athens, Athens, Greece

Search for more papers by this author
First published: 05 May 2014

Abstract

In the modern enterprise world, collaboration has emerged as a standard of best business practice. In order to build competitive advantages and minimize inefficiencies, organizations nowadays pursuit strategic alliances with partners outside the comfort of familiar security zones, loosen their hierarchical structures, exploit “edge” competencies, and aggregate diverse and heterogeneous sources of information. Nevertheless, such techniques dictate the concentration, use, and circulation of corporate information and sensitive personal data and, thus, ignite severe information confidentiality and privacy concerns. Hence, the employment of the appropriate collaboration technology is not sufficient; potential lack of successful protection mechanisms limits the effectiveness of partnerships and denies the respective investments to reach their full potential. In this paper, an authorization framework toward the protection of sensitive resources in the context of cross-enterprise scenarios is presented. The proposed framework is founded on the utilization of a semantic information model, which integrates individual privacy preferences, organizational access control rules and information handling policies into the authorization determination procedure. Partners within the framework are organized in a bridged federated architecture in order to build a secure communication network, within which semantic and trust interoperability is guaranteed. Copyright © 2014 John Wiley & Sons, Ltd.

The full text of this article hosted at iucr.org is unavailable due to technical difficulties.