Web Services Enabled E-Market Access Control Model

Author(s):  
Harry Wang ◽  
Hsing K. Cheng ◽  
Leon Zhao

With the dramatic expansion of global e-markets, companies collaborate more and more in order to streamline their supply chains. Small companies often form coalitions to reach the critical mass required to bid on large volume or wide ranges of products. Meanwhile, they also compete with one another for market shares. Because of the complex relationships among companies, controlling the access to shared information found in e-markets is a challenging task. Currently, there is a lack of comprehensive access control approaches that can be used to maintain data security in e-markets. We propose to integrate several known access control mechanisms such as role-based access control, coalition-based access control, and relationship driven access control into an e-market access control model (EMAC). In this chapter, we present a Web services-based architecture for EMAC and the associated concepts and algorithms. We also illustrate, via an automotive e-market example, how the EMAC model can support e-market access control.

Author(s):  
Harry Wang ◽  
Hsing K. Cheng ◽  
Leon Zhao

With the dramatic expansion of global e-markets, companies collaborate more and more in order to streamline their supply chains. Small companies often form coalitions to reach the critical mass required to bid on large volume or wide ranges of products. Meanwhile, they also compete with one another for market shares. Because of the complex relationships among companies, controlling the access to shared information found in e-markets is a challenging task. Currently, there is a lack of comprehensive access control approaches that can be used to maintain data security in e-markets. We propose to integrate several known access control mechanisms such as role-based access control, coalition-based access control, and relationship driven access control into an e-market access control model (EMAC). In this chapter, we present a Web services-based architecture for EMAC and the associated concepts and algorithms. We also illustrate, via an automotive e-market example, how the EMAC model can support e-market access control.


Author(s):  
Vivying S.Y. Cheng ◽  
Patrick Hung

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a set of rules to be followed by health plans, doctors, hospitals and other healthcare providers in the United States of America. HIPAA privacy rules create national standards to protect individuals’ health information; it is therefore necessary to create standardized solutions to tackle the various privacy issues. This chapter focuses on the e-healthcare privacy issues based on a prior extension of role-based access control (RBAC) model. We review an access control enforcement model in Web services for tackling HIPAA privacy rules and protecting personal health information (PHI) called the Privacy Access Control Model. First, we discuss related backgrounds of, and privacy requirements in the HIPAA legislation. Next, four privacy-related entities (purposes, recipients, obligations, and retentions) are incorporated into the core RBAC model. The HIPAA rules are then embedded into the extended RBAC model as constraints. Then, we present a vocabulary-independent Web services privacy framework in a layered architecture for supporting healthcare applications.


2004 ◽  
Vol 1 (1) ◽  
pp. 21-40 ◽  
Author(s):  
Harry J. Wang ◽  
Hsing K. Cheng ◽  
J. Leon Zhao

Sign in / Sign up

Export Citation Format

Share Document