The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Access Control for Web Service Applications: An Example in Collaborative Auditing
|
Author(s): Timon C. Du (The Chinese University of Hong Kong, China), Richard Hwang (California State University - San Marcos, USA)and Charles Ling-yu Chou (The Chinese University of Hong Kong, China)
Copyright: 2007
Pages: 22
Source title:
Advances in Electronic Business, Volume 2
Source Author(s)/Editor(s): Eldon Y. Li (National Chengchi University, Taiwan)and Timon C. Du (The Chinese University of Hong Kong, China)
DOI: 10.4018/978-1-59140-678-5.ch010
Purchase
|
Abstract
Given the rapid changes in the information technologies, the issue of information securities and company’s internal controls has become very critical to both internal and external auditors. Recently, external auditors are under pressure to provide real-time assurance. Movement of this kind has complicated as to when and how to grant the access privileges to external auditors. In addition, when there is a high degree of collaborative relationship among organizations, the collaborators need to establish policies of auditors’ access controls and set up conditions and constraints for security and confidentiality reasons. Since auditors among the collaborators have different seniority, the access privileges should be granted based on the seniority of the auditors in the collaborative team members. In contrast, the growth of Web service becomes a new paradigm to provide collaborative auditing service via Web. The access control issue is a crucial issue for the future collaboration. In this study, we propose a role-based Chinese Wall model, which organizes the corporate data into four different types of control groups with different access control policies, for the auditors to access the data among collaborating enterprises. Using the vendor-managed inventories (VMI) example, the study discusses how auditing tasks can be performed under the proposed access control environment. To ensure the functionality of the proposed framework, the study uses Oracle software to demonstrate the feasibility of the model.
Related Content
Emrah Arğın.
© 2022.
16 pages.
|
Ebru Gülbuğ Erol, Mustafa Gülsün.
© 2022.
17 pages.
|
Yeşim Şener.
© 2022.
18 pages.
|
Salim Kurnaz, Deimantė Žilinskienė.
© 2022.
20 pages.
|
Dorothea Maria Bowyer, Walid El Hamad, Ciorstan Smark, Greg Evan Jones, Claire Beattie, Ying Deng.
© 2022.
29 pages.
|
Savas S. Ates, Vildan Durmaz.
© 2022.
24 pages.
|
Nusret Erceylan, Gaye Atilla.
© 2022.
20 pages.
|
|
|