Skip to main content

Sec-Shield: Security Preserved Distributed Knowledge Management Between Autonomous Domains

  • Conference paper
Trust, Privacy, and Security in Digital Business (TrustBus 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3592))

  • 1031 Accesses

Abstract

Knowledge Management (KM) comprises of a variety of distinct technologies and techniques, relative to the uniform treatment of tangible and intangible resources. Attempts to extend the traditional single organizational resource-sharing scheme, confront various challenges, relative to the management of security and heterogeneity issues. In this paper we discuss the various security models, presenting potential limitations – as well as the advantages – relative to their support to extend the single-domain security management framework, to a resilient and robust distributed multi-domain Knowledge Management scheme. We present the architecture of a security enhanced prototype that supports decentralization, while it maintains the autonomic character of the participating domains. We also argue about the implementation dependent choices relative to the alleviation of the multifaceted problems that a collaborative Inter-organizational knowledge asset exchange framework arises.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Nonaka, I., Takeuchi, H.: The knowledge Creating Company. Oxford University Press, Oxford (1995)

    Google Scholar 

  2. Bonifacio, M., Bouquet, P., Danieli, A., Dona, A., Mameli, G., Nori, M.: Keex: A peer-to-peer solution for distributed Knowledge Management. In: Tochtermann, K., Maurer, H. (eds.) Proceedings on the 4th International Conference on Knowledge Management, Graz Austria (2004)

    Google Scholar 

  3. Belsis, P., Gritzalis, S.: Distributed autonomous Knowledge Acquisition and Dissemination ontology based framework. In: Kuhn, H. (ed.) Proceedings of PAKM 04 5th International Conference on Practical Aspects of Knowledge Management – Workshop on Enterprise Modeling and Ontology: Ingredients for Interoperability, December 2004. Univ. of Vienna, Vienna Austria (2004)

    Google Scholar 

  4. Tempich, C., Ehrig, M., Fluit, C., Haase, P., Lladó Martí, E., Plechawski, M., Staab, S.: XAROP: A Midterm Report in Introducing a Decentralized Semantics-Based Knowledge Sharing Application. In: Karagiannis, D., Reimer, U. (eds.) PAKM 2004. LNCS (LNAI), vol. 3336, pp. 259–270. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  5. Seleznyov, A., Mohamed, A., Hailes, S.: ADAM: An agent-based Middleware Architecture for Distributed Access Control Twenty-Second International Multi-Conference on Applied Informatics: Artificial Intelligence and Applications (2004)

    Google Scholar 

  6. Damianou, N., Dulay, N., Lupu, E., Sloman, M.: Managing Security in Object-based Distributed Systems using Ponder. In: Proceedings of the 6th Open European Summer School (Eunice 2000), Enchede, The Netherlands, September 13-15 (2000)

    Google Scholar 

  7. Organization for the Advancement of Structured Information Standards (OASIS), XACML Extensible access control markup language specification 2.0, OASIS Standard available at http://www.oasis-open.org

  8. Belokosztolski, A.: Role based access control for policy administration as technical report No 586, university of Cambridge, UK, available at http://www.cl.cam.ac.uk/

  9. Joshi, J.B.D., Bhatti, R., Bertino, E., Ghafoor, A.: Access Control Language for Multi-Domain Environments. IEEE Internet Computing (November 2004)

    Google Scholar 

  10. Bhatti, R., Bertino, E., Ghafoor, A., Joshi, J.B.D.: XML-based Specification for Web services Document Security. IEEE Computer, 41–50 (April 2004)

    Google Scholar 

  11. The JADE agent development kit, Available at http://jade.tilab.com/

  12. Dongwon, L., Wesley, C.: CPI: Constraints- Preserving Inlining algorithm for mapping XML DTD to relational schema. Data and Knowledge Engineering 39, 3–25 (2001)

    Article  Google Scholar 

  13. Decker, S., Melnik, S., van Harmelen, F., Fensel, D., Klein, M., Broekstra, J., Erdmann, M., Horrocks, I.: The semantic web: the roles of XML and RDF. IEEE Internet Comput. 4(5), 63–74 (2000)

    Article  Google Scholar 

  14. Extensible Markup Language Specification (XML), http://www.w3.org/XML/

  15. FIPA standard status specifications, http://www.fipa.org/repository/standardspecs.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Belsis, P., Gritzalis, S., Malatras, A., Skourlas, C., Chalaris, I. (2005). Sec-Shield: Security Preserved Distributed Knowledge Management Between Autonomous Domains. In: Katsikas, S., López, J., Pernul, G. (eds) Trust, Privacy, and Security in Digital Business. TrustBus 2005. Lecture Notes in Computer Science, vol 3592. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11537878_2

Download citation

  • DOI: https://doi.org/10.1007/11537878_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28224-2

  • Online ISBN: 978-3-540-31796-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics