{"id":"https://openalex.org/W2736566701","doi":"https://doi.org/10.1080/17517575.2017.1355985","title":"Policy reconciliation for access control in dynamic cross-enterprise collaborations","display_name":"Policy reconciliation for access control in dynamic cross-enterprise collaborations","publication_year":2017,"publication_date":"2017-07-24","ids":{"openalex":"https://openalex.org/W2736566701","doi":"https://doi.org/10.1080/17517575.2017.1355985","mag":"2736566701"},"language":"en","primary_location":{"id":"doi:10.1080/17517575.2017.1355985","is_oa":false,"landing_page_url":"https://doi.org/10.1080/17517575.2017.1355985","pdf_url":null,"source":{"id":"https://openalex.org/S24861202","display_name":"Enterprise Information Systems","issn_l":"1751-7575","issn":["1751-7575","1751-7583"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Enterprise Information Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://www.tandfonline.com/doi/abs/10.1080/17517575.2017.1355985","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069939159","display_name":"Davy Preuveneers","orcid":"https://orcid.org/0000-0001-6279-4430"},"institutions":[{"id":"https://openalex.org/I4210114974","display_name":"IMEC","ror":"https://ror.org/02kcbn207","country_code":"BE","type":"nonprofit","lineage":["https://openalex.org/I4210114974"]},{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":true,"raw_author_name":"D. Preuveneers","raw_affiliation_strings":["imec-DistriNet, Department of Computer Science, KU Leuven, Heverlee, Belgium"],"raw_orcid":"https://orcid.org/0000-0001-6279-4430","affiliations":[{"raw_affiliation_string":"imec-DistriNet, Department of Computer Science, KU Leuven, Heverlee, Belgium","institution_ids":["https://openalex.org/I4210114974","https://openalex.org/I99464096"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054031138","display_name":"Wouter Joosen","orcid":"https://orcid.org/0000-0002-7710-5092"},"institutions":[{"id":"https://openalex.org/I4210114974","display_name":"IMEC","ror":"https://ror.org/02kcbn207","country_code":"BE","type":"nonprofit","lineage":["https://openalex.org/I4210114974"]},{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"W. Joosen","raw_affiliation_strings":["imec-DistriNet, Department of Computer Science, KU Leuven, Heverlee, Belgium"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"imec-DistriNet, Department of Computer Science, KU Leuven, Heverlee, Belgium","institution_ids":["https://openalex.org/I4210114974","https://openalex.org/I99464096"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065742113","display_name":"Elisabeth Ilie\u2010Zudor","orcid":"https://orcid.org/0000-0001-9362-3538"},"institutions":[{"id":"https://openalex.org/I4210117195","display_name":"Institute for Computer Science and Control","ror":"https://ror.org/0249v7n71","country_code":"HU","type":"facility","lineage":["https://openalex.org/I4210117195","https://openalex.org/I7597260"]}],"countries":["HU"],"is_corresponding":false,"raw_author_name":"E. Ilie-Zudor","raw_affiliation_strings":["Research Laboratory of Engineering and Management Intelligence, MTA SZTAKI, Budapest, Hungary"],"raw_orcid":"https://orcid.org/0000-0001-9362-3538","affiliations":[{"raw_affiliation_string":"Research Laboratory of Engineering and Management Intelligence, MTA SZTAKI, Budapest, Hungary","institution_ids":["https://openalex.org/I4210117195"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5069939159"],"corresponding_institution_ids":["https://openalex.org/I4210114974","https://openalex.org/I99464096"],"apc_list":null,"apc_paid":null,"fwci":6.7249,"has_fulltext":true,"cited_by_count":19,"citation_normalized_percentile":{"value":0.96363352,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"12","issue":"3","first_page":"279","last_page":"299"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.8034748435020447},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.6268293857574463},{"id":"https://openalex.org/keywords/provisioning","display_name":"Provisioning","score":0.5813796520233154},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5627822279930115},{"id":"https://openalex.org/keywords/enterprise-information-system","display_name":"Enterprise information system","score":0.5479320883750916},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.528588056564331},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.5076767206192017},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5075384378433228},{"id":"https://openalex.org/keywords/enterprise-information-security-architecture","display_name":"Enterprise information security architecture","score":0.4713052213191986},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4647862911224365},{"id":"https://openalex.org/keywords/enterprise-software","display_name":"Enterprise software","score":0.44044339656829834},{"id":"https://openalex.org/keywords/enterprise-systems-engineering","display_name":"Enterprise systems engineering","score":0.4306175112724304},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.43007373809814453},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.429610013961792},{"id":"https://openalex.org/keywords/enterprise-integration","display_name":"Enterprise integration","score":0.4247358441352844},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4197627007961273},{"id":"https://openalex.org/keywords/enterprise-life-cycle","display_name":"Enterprise life cycle","score":0.4145180583000183},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.4130449593067169},{"id":"https://openalex.org/keywords/enterprise-architecture","display_name":"Enterprise architecture","score":0.38585931062698364},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3237629532814026},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.28650951385498047}],"concepts":[{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.8034748435020447},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.6268293857574463},{"id":"https://openalex.org/C172191483","wikidata":"https://www.wikidata.org/wiki/Q1071806","display_name":"Provisioning","level":2,"score":0.5813796520233154},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5627822279930115},{"id":"https://openalex.org/C27295321","wikidata":"https://www.wikidata.org/wiki/Q831795","display_name":"Enterprise information system","level":2,"score":0.5479320883750916},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.528588056564331},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.5076767206192017},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5075384378433228},{"id":"https://openalex.org/C31139447","wikidata":"https://www.wikidata.org/wiki/Q5380386","display_name":"Enterprise information security architecture","level":2,"score":0.4713052213191986},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4647862911224365},{"id":"https://openalex.org/C185765463","wikidata":"https://www.wikidata.org/wiki/Q1318054","display_name":"Enterprise software","level":2,"score":0.44044339656829834},{"id":"https://openalex.org/C146342590","wikidata":"https://www.wikidata.org/wiki/Q11606385","display_name":"Enterprise systems engineering","level":4,"score":0.4306175112724304},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.43007373809814453},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.429610013961792},{"id":"https://openalex.org/C53996427","wikidata":"https://www.wikidata.org/wiki/Q5380387","display_name":"Enterprise integration","level":3,"score":0.4247358441352844},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4197627007961273},{"id":"https://openalex.org/C82419060","wikidata":"https://www.wikidata.org/wiki/Q5380394","display_name":"Enterprise life cycle","level":2,"score":0.4145180583000183},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.4130449593067169},{"id":"https://openalex.org/C10590034","wikidata":"https://www.wikidata.org/wiki/Q1048431","display_name":"Enterprise architecture","level":3,"score":0.38585931062698364},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3237629532814026},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.28650951385498047},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1080/17517575.2017.1355985","is_oa":false,"landing_page_url":"https://doi.org/10.1080/17517575.2017.1355985","pdf_url":null,"source":{"id":"https://openalex.org/S24861202","display_name":"Enterprise Information Systems","issn_l":"1751-7575","issn":["1751-7575","1751-7583"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Enterprise Information Systems","raw_type":"journal-article"},{"id":"pmh:oai:eprints.sztaki.hu:9540","is_oa":false,"landing_page_url":"http://eprints.sztaki.hu/9540/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401907","display_name":"SZTAKI Publication Repository (Hungarian Academy of Sciences)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I7597260","host_organization_name":"Hungarian Academy of Sciences","host_organization_lineage":["https://openalex.org/I7597260"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"},{"id":"pmh:oai:lirias2repo.kuleuven.be:123456789/588186","is_oa":true,"landing_page_url":"http://www.tandfonline.com/doi/abs/10.1080/17517575.2017.1355985","pdf_url":null,"source":{"id":"https://openalex.org/S4306401954","display_name":"Lirias (KU Leuven)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I99464096","host_organization_name":"KU Leuven","host_organization_lineage":["https://openalex.org/I99464096"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Enterprise Information Systems, vol. 12 (3), Art.No. 3, (279-299)","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"pmh:oai:lirias2repo.kuleuven.be:123456789/588186","is_oa":true,"landing_page_url":"http://www.tandfonline.com/doi/abs/10.1080/17517575.2017.1355985","pdf_url":null,"source":{"id":"https://openalex.org/S4306401954","display_name":"Lirias (KU Leuven)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I99464096","host_organization_name":"KU Leuven","host_organization_lineage":["https://openalex.org/I99464096"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Enterprise Information Systems, vol. 12 (3), Art.No. 3, (279-299)","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[{"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17","score":0.4099999964237213}],"awards":[],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320322308","display_name":"KU Leuven","ror":"https://ror.org/05f950310"},{"id":"https://openalex.org/F4320332999","display_name":"Horizon 2020 Framework Programme","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320338218","display_name":"Exploratory Research Center on Life and Living Systems, National Institutes of Natural Sciences","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W130640788","https://openalex.org/W1525540222","https://openalex.org/W1560042744","https://openalex.org/W1974034305","https://openalex.org/W1997199359","https://openalex.org/W1997888312","https://openalex.org/W2006942880","https://openalex.org/W2007999111","https://openalex.org/W2024364040","https://openalex.org/W2029608738","https://openalex.org/W2039427951","https://openalex.org/W2070199221","https://openalex.org/W2093154365","https://openalex.org/W2094741359","https://openalex.org/W2095824333","https://openalex.org/W2097171586","https://openalex.org/W2107988260","https://openalex.org/W2129864031","https://openalex.org/W2135729865","https://openalex.org/W2139315672","https://openalex.org/W2154889864","https://openalex.org/W2166602595","https://openalex.org/W2168884369","https://openalex.org/W2295939521","https://openalex.org/W2298494124","https://openalex.org/W2339568833","https://openalex.org/W2515259086","https://openalex.org/W2547180403"],"related_works":["https://openalex.org/W3179864257","https://openalex.org/W2017265757","https://openalex.org/W1037270987","https://openalex.org/W2384503522","https://openalex.org/W3144267558","https://openalex.org/W2001051351","https://openalex.org/W2500022970","https://openalex.org/W2350360727","https://openalex.org/W154420263","https://openalex.org/W2387926196"],"abstract_inverted_index":{"In":[0],"dynamic":[1,104,127],"cross-enterprise":[2,128,166],"collaborations,":[3],"different":[4],"enterprises":[5,19],"form":[6],"a":[7,117],"\u2013":[8,11],"possibly":[9],"temporary":[10],"business":[12,17,64],"relationship.":[13],"To":[14],"integrate":[15],"their":[16,29,57],"processes,":[18],"may":[20],"need":[21],"to":[22,28,37,50,77,85],"grant":[23],"each":[24],"other":[25],"limited":[26],"access":[27,42,78,162],"information":[30,39,83],"systems.":[31],"Authentication":[32],"and":[33,54,98,101,137,142,154,157],"authorization":[34,62,110],"are":[35,130],"key":[36],"secure":[38],"handling.":[40],"However,":[41],"control":[43,79,163],"policies":[44,80,164],"often":[45],"rely":[46],"on":[47,122],"non-standardized":[48],"attributes":[49],"describe":[51],"the":[52,71,107,135,144,148,159],"roles":[53],"permissions":[55],"of":[56,74,109,139,146,161],"employees":[58],"which":[59],"convolutes":[60],"cross-organizational":[61],"when":[63],"relationships":[65],"evolve":[66],"quickly.":[67],"Our":[68],"framework":[69,95,115],"addresses":[70],"managerial":[72],"overhead":[73],"continuous":[75],"updates":[76],"for":[81,165],"enterprise":[82],"systems":[84],"accommodate":[86],"disparate":[87],"attribute":[88,92,97],"usage.":[89],"By":[90],"inferring":[91],"relationships,":[93],"our":[94,114,140],"facilitates":[96],"policy":[99],"reconciliation,":[100],"automatically":[102],"aligns":[103],"entitlements":[105],"during":[106],"evaluation":[108,133],"decisions.":[111],"We":[112],"validate":[113],"with":[116],"Industry":[118],"4.0":[119],"motivating":[120],"scenario":[121],"networked":[123],"production":[124],"where":[125],"such":[126],"collaborations":[129],"quintessential.":[131],"The":[132],"reveals":[134],"capabilities":[136],"performance":[138],"framework,":[141],"illustrates":[143],"feasibility":[145],"liberating":[147],"security":[149],"administrator":[150],"from":[151],"manually":[152],"provisioning":[153],"aligning":[155],"attributes,":[156],"verifying":[158],"consistency":[160],"collaborations.":[167]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
