Reference Hub5
Managing Data Security in E-Markets through Relationship Driven Access Control

Managing Data Security in E-Markets through Relationship Driven Access Control

Harry Wang, J. Leon Zhao, Guoqing Chen
Copyright: © 2012 |Volume: 23 |Issue: 2 |Pages: 21
ISSN: 1063-8016|EISSN: 1533-8010|EISBN13: 9781466614949|DOI: 10.4018/jdm.2012040101
Cite Article Cite Article

MLA

Wang, Harry, et al. "Managing Data Security in E-Markets through Relationship Driven Access Control." JDM vol.23, no.2 2012: pp.1-21. http://doi.org/10.4018/jdm.2012040101

APA

Wang, H., Zhao, J. L., & Chen, G. (2012). Managing Data Security in E-Markets through Relationship Driven Access Control. Journal of Database Management (JDM), 23(2), 1-21. http://doi.org/10.4018/jdm.2012040101

Chicago

Wang, Harry, J. Leon Zhao, and Guoqing Chen. "Managing Data Security in E-Markets through Relationship Driven Access Control," Journal of Database Management (JDM) 23, no.2: 1-21. http://doi.org/10.4018/jdm.2012040101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Data security in e-markets is vital to maintaining trust among trading partners. In an e-market, companies must share information to improve operational efficiency in their supply chains, while at the same time, access to sensitive information by rival companies should be prevented. In today’s highly dynamic business environment, the relationships among companies in e-markets are constantly changing while these relationships determine how company information should be shared with other companies. In this paper, the authors show that existing access control models are not designed for managing data security in e-markets with dynamic company relationships and propose a Relationship Driven Access Control (RDAC) model to provide a better solution. In particular, the authors design a rule-based approach for managing dynamic company relationships and a secure query processing mechanism to filter shared information based on company relationships. A prototype system is developed to demonstrate and validate the authors’ RDAC model.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.