{"title":"Web服务——控制满足协作","authors":"Cristina Buchholz","doi":"10.1109/IPDPS.2003.1213194","DOIUrl":null,"url":null,"abstract":"In the context of open processes spanning across company boundaries, secure data access is a central aspect of doing business. Identity Management claims the top position among the tools that close the security gap. Driven by the use cases legal provability, digital rights management and process audit, we have designed an identity management system based on the trust management model.","PeriodicalId":177848,"journal":{"name":"Proceedings International Parallel and Distributed Processing Symposium","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Web services - control meets collaboration\",\"authors\":\"Cristina Buchholz\",\"doi\":\"10.1109/IPDPS.2003.1213194\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the context of open processes spanning across company boundaries, secure data access is a central aspect of doing business. Identity Management claims the top position among the tools that close the security gap. Driven by the use cases legal provability, digital rights management and process audit, we have designed an identity management system based on the trust management model.\",\"PeriodicalId\":177848,\"journal\":{\"name\":\"Proceedings International Parallel and Distributed Processing Symposium\",\"volume\":\"46 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2003-04-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings International Parallel and Distributed Processing Symposium\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IPDPS.2003.1213194\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings International Parallel and Distributed Processing Symposium","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IPDPS.2003.1213194","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In the context of open processes spanning across company boundaries, secure data access is a central aspect of doing business. Identity Management claims the top position among the tools that close the security gap. Driven by the use cases legal provability, digital rights management and process audit, we have designed an identity management system based on the trust management model.