ECEC'2006

April 17-19, 2006 - Athens Imperial Hotel, Athens, Greece

Conference Tutorials





















 


Conference Tutorials

 

 

Security Issues in Virtual Organisations
by Abdelmalek Benzekri

Abstract:

Recently, Virtual Organizations were the focus of different research axes (business, social and human aspects, infrastructure, networking…). Many definitions may be found in the literature where there is not a clear-cut definition of what a VO is.

Early definitions focus on business and human collaboration within the virtual organization which is a set of “Independent individuals from different organizations who realize together a project or a common economic activity…”

Recent ones reflect the emergent technologies influence where a VO is seen as “Temporary networks of independent companies linked by information technology that share competencies, infrastructure and business processes, with the purpose to fulfil a specific market requirement”.

Then the virtual organization is a conversion point between two axes:

-         Business needs: Market and cost pressure which obliges enterprises in various industries to focus their investments on their core competencies while outsourcing supporting processes to partners. This necessitates an aggregation of core competencies within a virtual organization to grab a good market opportunity.

-         Information technology advancement:  the information technology offers a flexible environment over which collaboration spaces may be built. Virtual Private Networks and Grid technologies are examples of collaboration spaces. VPN constitutes simply a secure connectivity infrastructure when compared to the Grid which offers more services like resources sharing, dynamic allocation and coordination at the different partners’ sites.

 

Creating a virtual organization encompasses multiple issues starting by business process modelling and discovery of potential partners. The main challenge is to achieve a common understanding among the different partners concerning their relationships, responsibilities and tasks within the structure. Solutions based on ontologies or model-based can be employed to achieve common understanding.

Considering a Grid infrastructure, the understanding extends also to the different services and resources (attributes, composition, constraints, access points…) to be interconnected and employed to ensure the achievement of the business needs.

This should be reflected in an access control policy that specifies the subjects authorized to do certain activities on the available resources in certain conditions. Policy expression and management are problems that arise in a multi organizational environment.  Policy enforcement points may vary according to the network topology and resource management system employed, while monitoring of the executed policies depends on how deep the probes are installed in the partners’ networks.

 



 


Page created by Philippe Geril. Last update 28-02-06
© Copyright ETI Bvba - EUROSIS - All Rights Reserved