27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Maria Semmelrock-Picej et al.<br />

Figure 10: Steps during role and resource management<br />

4. Conclusions<br />

In this paper the architecture of SPIKE IDMS is presented and it is shown how it can be integrated<br />

with an IdP. The SPIKE IDMS has been thought to work mainly for SMEs which do not own a<br />

propietary IDMS and therefore need this extra tool when a collaboration within SPIKE is started. In<br />

doing so we improve the opportunities of SMEs in a globalising world.<br />

References<br />

Artz, D. and Gil, Y. (2007) „A survey of trust in computer science and the semantic web“, Journal of Web<br />

Semantics, Vol 5, No. 2, pp 58-71.<br />

Billhardt, H., Hermoso, R., Ossowski, S. and Centeno, R. (2007) „Trust-based service provider selection in open<br />

environments“, ACM Symposium on Applied Computing (SAC), pp 1375-1380.<br />

Davenport, T.H. and Prusak, L. (1998) Working Knowledge: How Organizations Manage What they know,<br />

Harvard Business School Press, Boston MA.<br />

Ferraiolo, D.F., Kuhn, R.D. and Chandramouli, R. (2003) Role-Based Access Control, Artech House.<br />

Economist (2008) “The role of trust in business collaboration. An Economist Intelligence Unit”, Cisco Systems,<br />

Vol 10, No. 70.<br />

250

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!