题名

Securing Virtual Enterprises: Requirements and Architectural Choices

DOI

10.7903/ijecs.1110

作者

Paolo Spagnoletti;Stefano Za

关键词

Digital Platform ; Identity Management Systems ; Virtual Enterprise ; Circle of Trust

期刊名称

International Journal of Electronic Commerce Studies

卷期/出版年月

4卷2期(2013 / 12 / 01)

页次

295 - 304

内容语文

英文

英文摘要

Cooperative environments where multiple organizations interact for providing e-services to their customers are widely diffused and often referred as virtual enterprises. IT systems supporting these inter-organizational models must be designed by taking into account both functional and non-functional issues. Among the non-functional issues, information security solutions play an important role as mechanisms for reinforcing trust among members of a virtual enterprise and their supplier/customers. In this paper, we outline a set of non-functional requirements for IT systems supporting virtual enterprises, and describe the federated identity management system which has been implemented in the context of an EU project (LD-CAST) as an example of a trust-reinforcing mechanism.

主题分类 基礎與應用科學 > 資訊科學
社會科學 > 經濟學
社會科學 > 財金及會計學
社會科學 > 管理學
参考文献
  1. Åhlfeldt, R.,Spagnoletti, P.,Sindre, G.(2007).Improving the information security model by using TFI.New Approaches for Security, Privacy and Trust in Complex Environments,Boston:
  2. Bachmann, A.C.,Inkpen, A.C.(2011).Understanding institutional-based trust building processes in inter-organizational relationships.Organization Studies,32(2),281-301.
  3. Bremer, C.F.,Eversheim, W.,Walz, M.,Gutierrez, A.M.(1999).Global virtual business: A systematic approach for exploiting business opportunities in dynamic markets.International Journal of Agile Manufacturing,2(1),1-11.
  4. Cavallari, M.(2010).Information systems security and end-user consciousness - A strategic matter.Management of the Interconnected World,Berlin, Heidelberg:
  5. D'Atri, A.(2003).Organizing and managing virtual enterprises: The ECB Framework.Processes and Foundations for Virtual Organizations,Boston:
  6. Depaoli, P.,Za, S.(2013).Towards the redesign of e-Business maturity models for SMEs.Designing Organizational Systems,Berlin, Heidelberg:
  7. Ford, W.,Baum, M.(1997).Secure electronic commerce.Upper Saddle River, NJ, USA:Prentice Hall.
  8. Gou, H.,Huang, B.,Liu, W.,Li, X.(2003).A framework for virtual enterprise operation management.Computers in Industry,50(3),333-352.
  9. ISO/IEC(2005).ISO/IEC 17799: Information technology- Security techniques - Code of practice for information security management.Geneva:International Standards Organization.
  10. Kohl, J.,Neuman, C.(1993).Kerberos network authentication service (V5).United States:RFC Editor.
  11. Marzo, F.,Za, S.,Spagnoletti, P.(2013).Modeling dependence networks for agent based simulation of online and offline communities.Lecture Notes in Artificial Intelligence,7879,192-203.
  12. McKnight, D.,Cummings, L.,Chervany, N.(1998).Initial trust formation in new organizational relationships.Academy of Management Review,23(3),473-490.
  13. Motro, A.,D'Atri, A.,Brodsky, A.,Egge, N.E.(2012).Optimizing procurement decisions in virtual enterprises.International Journal of Decision Support System Technology,4(3),43-67.
  14. Motro, A.,Guo, Y.(2012).SOAVE platform: A service oriented architecture for virtual enterprises.Collaborative Networks in the Internet of Services,Berlin, Heidelberg:
  15. Olden, M.,Za, S.(2010).Biometric authentication and authorization infrastructures in trusted intra-organizational relationships.Management of the Interconnected World,Berlin, Heidelberg:
  16. Pavlou, P.,Liang, H.,Xue, Y.(2007).Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective.Mis Quarterly,31(1),105-136.
  17. Ray, S.,Ow, T.,Kim, S.S.(2011).Security assurance: How online service providers can influence security control perceptions and gain trust.Decision Sciences,42(2),391-412.
  18. Schlaeger, C.,Pernul, G.(2005).Authentication and authorization infrastructures in B2C e-Commerce.E-Commerce and Web Technologies,Berlin, Heidelberg:
  19. Spagnoletti, P.,Resca, A.(2008).The duality of Information Security Management: Fighting against predictable and unpredictable threats.Journal of Information System Security,4(3),46-62.
  20. Spagnoletti, P.,Resca, A.(2012).A design theory for IT supporting online communities.Proceedings of the 45th Hawaii International Conference on System Sciences,Los Alamitos, California:
  21. Spagnoletti, P.,Za, S.(2012).A design theory for e-Service environments: The interoperability challenge.Exploring Services Science,Heidelberg:
  22. Spagnoletti, P.,Za, S.,D'Atri, A.(2007).Institutional trust and security, new boundaries for virtual enterprises.Proceedings of 2nd International Workshop on Interoperability Solutions to Trust, Security, Policies and QoS for Enhanced Enterprise Systems. Helsinki University Printing House, HELSINKI-FIN,Helsinki:
  23. Sztompka, P.(1999).Trust: A sociological theory.Cambridge:Cambridge University Press.
  24. Wu, N.,Su, P.(2005).Selection of partners in virtual enterprise paradigm.Robotics and Computer-Integrated Manufacturing,21(2),119-131.
  25. Yin, R.K.(2003).Case study research: Design and methods.Thousand Oaks:Sage Publications.
  26. Za, S.,D'Atri, E.,Resca, A.(2011).Single sign-on in cloud computing scenarios: A research proposal.Information Technology and Innovation Trends in Organizations,Berlin, Heidelberg:
  27. Za, S.,Spagnoletti, P.(2013).Knowledge creation processes in information systems and management: Lessons from simulation studies.Organizational Change and Information Systems,Berlin, Heidelberg: