{"title":"A secure collaborative web based environment for virtual organizations","authors":"R. Laborde, M. Kamel, F. Barrère, A. Benzekri","doi":"10.1109/ICDIM.2007.4444310","DOIUrl":null,"url":null,"abstract":"The concept of Virtual Organization (VO) is a natural outcome of networks evolution and collaborative work tools growth. In the projects VIVACE and TSCP, we have studied the different issues when setting VOs up. In this paper, we expose requirements and characteristics of VOs through a use case, which was proposed by these consortiums. Then, we present a secured collaborative environment, which combines attribute based access control models, privileges management infrastructure and federation of identity, we have deployed to deal with VO security constraints.","PeriodicalId":198626,"journal":{"name":"2007 2nd International Conference on Digital Information Management","volume":"172 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 2nd International Conference on Digital Information Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICDIM.2007.4444310","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
The concept of Virtual Organization (VO) is a natural outcome of networks evolution and collaborative work tools growth. In the projects VIVACE and TSCP, we have studied the different issues when setting VOs up. In this paper, we expose requirements and characteristics of VOs through a use case, which was proposed by these consortiums. Then, we present a secured collaborative environment, which combines attribute based access control models, privileges management infrastructure and federation of identity, we have deployed to deal with VO security constraints.