27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Maria Semmelrock-Picej et al.<br />

In the case of a centralized collaboration only the hub company offers services which are accessed by<br />

partners. The partner companies only act as identity provider for their federated users. This type of<br />

collaboration mostly apperas when only one large company is involved which offers a large service<br />

and application landscape with complex business processes supported by workflow management<br />

systems and when partners are mostly smaller companies without an own service infrastructure but<br />

specialized and/or cost-efficient employees which take over whole outsourced services of the Hub<br />

company.<br />

In the case of a decentralized collaboration (see figure 9) all partners offer services in the<br />

collaboration and act as Service Providers which are accessed mutually. All Partner act as identity<br />

Provider for their federated users. This type of collaboration often appears when one or more large<br />

companies are involved which offer a large service and application landscape with complex business<br />

processes supported by workflow management systems and those workflows include the involvement<br />

of highly specialized partner companies or when partners are companies with few but highly<br />

specialized services which can be offered cost-efficiently.<br />

Figure 9: Decentralized collaboration<br />

3.2.3 Role and resource management<br />

Modeling roles is a research topic with a long history. There are a lot of approaches (Ferraiolo, Kuhn<br />

and Chandramouli 2003) which are more or less successful. They can be classified according to three<br />

different strategies:<br />

Top-down is based on the analysis of business processes and organizational structures;<br />

Bottom-up tries to analyze information of existing permissions throughout different systems and<br />

aggregate similar patterns (clusters) to roles;<br />

Hybrid approaches combine both strategies<br />

The necessary steps during resource and role management are modelled in figure 10.<br />

249

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!