skip to main content
10.1145/2077489.2077495acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmedesConference Proceedingsconference-collections
research-article

A distributed mechanism for secure collaboration in digital ecosystems

Published:21 November 2011Publication History

ABSTRACT

In this paper, we investigate the effectiveness and appropriateness of several existing security mechanisms for a Digital Ecosystem (DE) environment. DE is characterized as an open and dynamic environment where the interaction and collaboration between its entities are highly promoted. A major requirement to promote such intensive interaction and collaboration is the ability to secure and uphold the confidentiality, integrity and non-repudiation of shared resources and information. However, current developments of such security mechanisms for protecting the shared resources are still in their infancy. Most of the proposed protection frameworks do not provide a scalable and effective mechanism for engaging multiple interacting entities to protect their resources. This is even a greater issue when multiple resources are exchanged and shared in an open and dynamic environment such as DE. Therefore, we propose a distributed mechanism for enterprises to manage their authentication and authorization processes with an aim to provide a rigorous protection of entities' resources.

References

  1. D. Boughaci and H. Drias, "A secure e-transaction model for e-commerce," presented at the IEEE GCC Conference (GCC), Manama, 2006.Google ScholarGoogle Scholar
  2. C. Potter and A. Beard, "Information Security Breaches Survey 2010," PricewaterhouseCoopers, Technical Report, 2010.Google ScholarGoogle Scholar
  3. Pö, P. ltner, and T. Grechenig, "A joint infrastructure of "digital corporate organisms" as facilitator for a virtual digital retail ecosystem," presented at the 4th IEEE International Conference on Digital Ecosystems and Technologies (DEST), Dubai, 2010.Google ScholarGoogle Scholar
  4. F. Ying-lan, H. Bing, and L. Y.-b.;, "Research and Implementation of Key Technology Based on Internet Encryption and Authentication," International Conference on Networking and Digital Society (ICNDS '09), 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. X. Tian and W. Dai, "Study on Information Management and Security of E-commerce System," presented at the International Symposium on Intelligence Information Processing and Trusted Computing (IPTC), Huanggang, China, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. H. Koshutanski, et al., "Distributed Identity Management Model for Digital Ecosystems," presented at the International Conference on Emerging Security Information, Systems and Technologies (Securware'07), Valencia, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. M. Seigneur, "Demonstration of security through collaborative in digital business ecosystem," in Proceedings of the IEEE SECOVAL Workshop, Athens, Greece, 2005.Google ScholarGoogle Scholar
  8. J. Hughes and E. Maler, "Security Assertion Markup Language (SAML) v. 2.0 Technical Overview," OASIS, Working Paper, 2005.Google ScholarGoogle Scholar
  9. L. Alliance. (February 2011). Liberty Aliance Project. Available: http://www.projectliberty.org/Google ScholarGoogle Scholar
  10. J. M. Seigneur, "Demonstration of security through collaborative in digital business ecosystem," in Proceedings of the IEEE SECOVAL Workshop, Athens, Greece, 2005.Google ScholarGoogle Scholar
  11. J. Novotny, "An online credential repository for the Grid: MyProxy," in Proceedings of the IEEE Tenth International Symposium on High Performance Distributed Computing (HPDC-10), San Fransisco, USA, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. W. Chou. (2002) Inside SSL: The Secure Sockets Layer Protocol. IEEE Computer Society: IT Professional Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. L. Pearlman, et al., "A Community Authorization Service for Group Collaboration," in Proceedings of the Third International Workshop on Policies for Distributed Systems and Networks, Monterey, USA, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. Thompson, et al., "Certificate-based access control for widely distributed resources," in Proceedings of the 8th conference on USENIX Security Symposium, Washington DC, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. J. Weise, "Public Key Infrastructure Overview," Sun Microsystem, Sun BluePrints Online2001.Google ScholarGoogle Scholar
  16. H. Boley and E. Chang, "Digital Ecosystem: Principles and Semantics," presented at the Inaugural IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2007), Cairns, Australia, 2007.Google ScholarGoogle Scholar
  17. G. Briscoe and P. Wilde, "Digital Ecosystems: Evolving Service-Oriented Architectures," in Proceedings of the 1st international conference on Bio inspired models of network, information and computing systems, New York, USA, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. I. Pranata and G. Skinner, "Managing enterprise authentication and authorization permissions in digital ecosystem"," presented at the 3th IEEE International Conference on Digital Ecosystems and Technologies (DEST), Istanbul, Turkey, 2009.Google ScholarGoogle Scholar
  19. I. Pranata and G. Skinner, "Digital ecosystem access control management" WSEAS Transactions on Information Science and Applications, vol. 6, pp. 926--935, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. J. Kennedy, "Distributed infrastructural service," in Digital Ecosystem Technology, F. Nachira, P. Dini, A. Nicolai, M. Le Louarn, and L. R. Leon, Eds.: European Commission: Information Society and Media, 2007.Google ScholarGoogle Scholar
  21. W3C. (February 2011). Extensible Markup Language (XML). Available: http://www.w3.org/XML/Google ScholarGoogle Scholar
  22. R. Lemos. (2001, March 2011). Microsoft warns of hijacked certificates. Available: http://news.cnet.com/2100-1001-254586.htmlGoogle ScholarGoogle Scholar
  23. Sophos. (2011, June 2011). Fraudulent certificates issued by Comodo, is it time to rethink who we trust? Available: http://nakedsecurity.sophos.com/2011/03/24/fraudulent-certificates-issued-by-comodo-is-it-time-to-rethink-who-we-trust/Google ScholarGoogle Scholar
  24. P. R. Zimmermann, The Official PGP User's Guide. Massachusetts, USA: MIT Press, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. RSA-Labs. A Cost-Based Security Analysis of Symmetric and Asymmetric Key Lengths {Bulletin #13}. Available: www.rsasecurity.com/rsalabsGoogle ScholarGoogle Scholar

Index Terms

  1. A distributed mechanism for secure collaboration in digital ecosystems

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          MEDES '11: Proceedings of the International Conference on Management of Emergent Digital EcoSystems
          November 2011
          316 pages
          ISBN:9781450310475
          DOI:10.1145/2077489

          Copyright © 2011 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 21 November 2011

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          MEDES '11 Paper Acceptance Rate26of82submissions,32%Overall Acceptance Rate267of682submissions,39%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader