IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Access Control for Web Service Applications: An Example in Collaborative Auditing

Access Control for Web Service Applications: An Example in Collaborative Auditing
View Sample PDF
Author(s): Timon C. Du (The Chinese University of Hong Kong, China), Richard Hwang (California State University - San Marcos, USA)and Charles Ling-yu Chou (The Chinese University of Hong Kong, China)
Copyright: 2007
Pages: 22
Source title: Advances in Electronic Business, Volume 2
Source Author(s)/Editor(s): Eldon Y. Li (National Chengchi University, Taiwan)and Timon C. Du (The Chinese University of Hong Kong, China)
DOI: 10.4018/978-1-59140-678-5.ch010

Purchase

View Access Control for Web Service Applications: An Example in Collaborative Auditing on the publisher's website for pricing and purchasing information.

Abstract

Given the rapid changes in the information technologies, the issue of information securities and company’s internal controls has become very critical to both internal and external auditors. Recently, external auditors are under pressure to provide real-time assurance. Movement of this kind has complicated as to when and how to grant the access privileges to external auditors. In addition, when there is a high degree of collaborative relationship among organizations, the collaborators need to establish policies of auditors’ access controls and set up conditions and constraints for security and confidentiality reasons. Since auditors among the collaborators have different seniority, the access privileges should be granted based on the seniority of the auditors in the collaborative team members. In contrast, the growth of Web service becomes a new paradigm to provide collaborative auditing service via Web. The access control issue is a crucial issue for the future collaboration. In this study, we propose a role-based Chinese Wall model, which organizes the corporate data into four different types of control groups with different access control policies, for the auditors to access the data among collaborating enterprises. Using the vendor-managed inventories (VMI) example, the study discusses how auditing tasks can be performed under the proposed access control environment. To ensure the functionality of the proposed framework, the study uses Oracle software to demonstrate the feasibility of the model.

Related Content

Emrah Arğın. © 2022. 16 pages.
Ebru Gülbuğ Erol, Mustafa Gülsün. © 2022. 17 pages.
Yeşim Şener. © 2022. 18 pages.
Salim Kurnaz, Deimantė Žilinskienė. © 2022. 20 pages.
Dorothea Maria Bowyer, Walid El Hamad, Ciorstan Smark, Greg Evan Jones, Claire Beattie, Ying Deng. © 2022. 29 pages.
Savas S. Ates, Vildan Durmaz. © 2022. 24 pages.
Nusret Erceylan, Gaye Atilla. © 2022. 20 pages.
Body Bottom