A security framework for dynamic collaborative working environments

Moving away from simple data sharing within the science community towards cross-organizational collaboration scenarios significantly increased challenges related to security and privacy. They need to be addressed in order to make cross-organizational applications such as collaborative working environments a business proposition within communities such as eHealth, construction or manufacturing. Increasingly distributed scenarios where many different types of services need to be combined in order to implement semantically enriched business processes demand new approaches to security within such dynamic Virtual Organizations. The allocation of access rights need to be possible in an easy and controlled way in order to allow inexperienced users to maintain the information and ensure compliance e.g. with legal and privacy related regulations. In this paper the focus is how security concepts originating from the Grid domain have been applied for collaborative working environments. The chosen scenarios are a Virtual Laboratory for Infectious Diseases (ViroLab) and different collaborative environments from the engineering domain as defined within the CoSpaces project. The requirements from these scenarios are analyzed and a security model enabling such dynamic, secure and trustworthy collaborations is presented.
Keywords Security model  Grid  Virtual Organization  Collaborative working environment  Decentralized identity management  Dynamic policy enforcement
Categories (categorize this paper)
DOI 10.1007/s12394-009-0027-1
 Save to my reading list
Follow the author(s)
Edit this record
My bibliography
Export citation
Find it on Scholar
Mark as duplicate
Request removal from index
Revision history
Download options
Our Archive

Upload a copy of this paper     Check publisher's policy     Papers currently archived: 29,848
Through your library
References found in this work BETA

No references found.

Add more references

Citations of this work BETA

No citations found.

Add more citations

Similar books and articles
Reve{a,I}Ling the Risks.Wolter Pieters - 2010 - Techne 14 (3):194-206.
Privacy, Secrecy and Security.Paul B. Thompson - 2001 - Ethics and Information Technology 3 (1):13-19.
Security, Knowledge and Well-Being.Stephen John - 2011 - Journal of Moral Philosophy 8 (1):68-91.
Towards Inclusive Identity Management.Lothar Fritsch, Kristin Skeide Fuglerud & Ivar Solheim - 2010 - Identity in the Information Society 3 (3):515-538.
Added to PP index

Total downloads
10 ( #469,020 of 2,210,428 )

Recent downloads (6 months)
2 ( #225,618 of 2,210,428 )

How can I increase my downloads?

Monthly downloads
My notes
Sign in to use this feature