{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:07:42Z","timestamp":1750306062998,"version":"3.41.0"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319588001"},{"type":"electronic","value":"9783319588018"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-58801-8_7","type":"book-chapter","created":{"date-parts":[[2017,5,2]],"date-time":"2017-05-02T12:14:44Z","timestamp":1493727284000},"page":"77-86","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Security Aspects and Models in Cooperative Production Processes"],"prefix":"10.1007","author":[{"given":"Dagmar","family":"Auer","sequence":"first","affiliation":[]},{"given":"Josef","family":"K\u00fcng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,3]]},"reference":[{"issue":"1","key":"7_CR1","first-page":"6","volume":"1","author":"MR Firmansyah","year":"2013","unstructured":"Firmansyah, M.R., Amer, Y.: A review of collaborative manufacturing network models. Int. J. Mater. Mech. Manufact. 1(1), 6\u201312 (2013)","journal-title":"Int. J. Mater. Mech. Manufact."},{"key":"7_CR2","first-page":"27","volume":"12","author":"M McClellan","year":"2003","unstructured":"McClellan, M.: Collaborative manufacturing: a strategy built on trust and cooperation. Control Solution Int. 12, 27\u201331 (2003)","journal-title":"Control Solution Int."},{"key":"7_CR3","unstructured":"Gabler Wirtschaftslexikon, Springer Gabler. http:\/\/wirtschaftslexikon.gabler.de"},{"key":"7_CR4","unstructured":"Schmalz, S.: Zwischen Kooperation und Kollaboration, zwischen Hierarchie und Heterarchie. Organisationsprinzipien und -strukturen von Wikis. In: Stegbauer, C., Schmidt, J., Sch\u00f6nberger, K. (Hrsg.): Wikis: Diskurse, Theorien und Anwendungen. Sonderausgabe von kommunikation@gesellschaft, Jg. 8. Online-Publikation (2007). http:\/\/www.soz.uni-frankfurt.de\/K.G\/B5_2007_Schmalz.pdf"},{"key":"7_CR5","unstructured":"Stoller-Schai, D.: E-Collaboration: Die Gestaltung internetgest\u00fctzter kollaborativer Handlungsfelder. Dissertation, Universit\u00e4t St. Gallen; Hochschule f\u00fcr Wirtschafts- Rechts- und Sozialwissenschaften (HSG) (2003)"},{"key":"7_CR6","unstructured":"Etter, C.: Nachgr\u00fcndungsdynamik neugegr\u00fcndeter Unternehmen in Berlin im interregionalen Vergleich. Dissertation, FU Berlin (2003)"},{"key":"7_CR7","unstructured":"Killich S.: Aufbau erfolgreicher Unternehmenskooperationen \u2013 Ein Leitfaden f\u00fcr mittelst\u00e4ndische Automobilzulieferer. Luczak, H. (Hrsg.), Forschungsinstitut f\u00fcr Rationalisierung, Lehrstuhl und Institut Arbeitswissenschaften (FIR\u00a0+\u00a0IAW), RWTH Aachen, Sonderdruck 06\/00, 1. Auflage, Aachen (2000)"},{"key":"7_CR8","unstructured":"Draheim, D.: Smart business process management. In: Fischer, L. (ed.) Social BPM: work, planning and collaboration under the impact of social technology. BPM and workflow handbook series, digital edn. Future Strategies Inc., Lighthouse Point (2011)"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Jensen, M.C., Meckling, W.H.: Theory of the firm: managerial behavior, agency costs and ownership structure. SSRN J. (1998)","DOI":"10.2139\/ssrn.94043"},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/978-3-642-40495-5_22","volume-title":"Computational Collective Intelligence. Technologies and Applications","author":"K Kravari","year":"2013","unstructured":"Kravari, K., Papavasileiou, C., Bassiliades, N.: Knowledge-based e-contract negotiation among agents using semantic web technologies. In: B\u01cedic\u01ce, C., Nguyen, N.T., Brezovan, M. (eds.) ICCCI 2013. LNCS, vol. 8083, pp. 215\u2013224. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-40495-5_22"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Ferreira, J., Gigante, F., Sarraipa, J., Nunez, M.J., Agostinho, C., Jardim-Goncalves, R.: Collaborative production using dynamic manufacturing networks for SME\u2019s. In: International ICE Conference on Engineering, Technology and Innovation (ICE), pp. 1\u20137 (2014)","DOI":"10.1109\/ICE.2014.6871620"},{"issue":"3\u20134","key":"7_CR12","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/s12159-012-0086-9","volume":"5","author":"N Papakostas","year":"2012","unstructured":"Papakostas, N., Efthymiou, K., Georgoulias, K., Chryssolouris, G.: On the configuration and planning of dynamic manufacturing networks. Logistics Res. 5(3\u20134), 105\u2013111 (2012)","journal-title":"Logistics Res."},{"issue":"1","key":"7_CR13","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1109\/TRA.2002.805659","volume":"19","author":"N Viswanadham","year":"2003","unstructured":"Viswanadham, N., Gaonkar, R.S.: Partner selection and synchronized planning in dynamic manufacturing networks. IEEE Trans. Robot. Autom. 19(1), 117\u2013130 (2003)","journal-title":"IEEE Trans. Robot. Autom."},{"issue":"1","key":"7_CR14","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1080\/0951192042000213164","volume":"18","author":"R Chalmeta","year":"2005","unstructured":"Chalmeta, R., Grangel, R.: Performance measurement systems for virtual enterprise integration. Int. J. Comput. Integr. Manuf. 18(1), 73\u201384 (2005)","journal-title":"Int. J. Comput. Integr. Manuf."},{"key":"7_CR15","unstructured":"Renton, W.J., Rudnick, F.C., Brown, R.G.: Virtual manufacturing technology implementation at boeing. In: Proceeding 85th AGARD SMP Meeting on Virtual Manufacturing, Aalborg (1997)"},{"key":"7_CR16","unstructured":"Santoro, R., Conte, M.: Evaluation of benefits and advantages of the virtual enterprise approach adoption for actual business cases. In: Proceeding 8th International Conference on Concurrent Enterprising (2002)"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Markaki, O., Panopoulos, D., Kokkinakos, P., Koussouris, S., Askounis, D.: Towards adopting dynamic manufacturing networks for future manufacturing: benefits and risks of the IMAGINE DMN end-to-end management methodology. In: 22nd International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), pp. 305\u2013310. IEEE (2013)","DOI":"10.1109\/WETICE.2013.64"},{"key":"7_CR18","first-page":"318","volume-title":"Handbuch Unternehmensorganisation \u2013 Strategien, Planung, Umsetzung","author":"G Schuh","year":"2009","unstructured":"Schuh, G., Sauer, A., Sch\u00f6nung, M.: Management von Unternehmensnetzwerken \u2013 Konzepte zur Gestaltung, Lenkung und Entwicklung. In: Bullinger, H.-J., Spath, D., Warnecke, H.-J., Westk\u00e4mper, E. (eds.) Handbuch Unternehmensorganisation \u2013 Strategien, Planung, Umsetzung, 3rd edn, pp. 318\u2013332. Springer, Berlin Heidelberg (2009)","edition":"3"},{"issue":"9","key":"7_CR19","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/35.312842","volume":"32","author":"RS Sandhu","year":"1994","unstructured":"Sandhu, R.S., Samarati, P.: Access control: principles and practice. IEEE Commun. Mag. 32(9), 40\u201348 (1994)","journal-title":"IEEE Commun. Mag."},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Sandhu, R.S.: Lattice-based access control models. In: IEEE Computer (1993)","DOI":"10.1109\/2.241422"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. In: IEEE Computer, pp. 38\u201347. IEEE Press (1996)","DOI":"10.1109\/2.485845"},{"issue":"3","key":"7_CR22","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"DF Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R.S., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4(3), 224\u2013274 (2001)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"7_CR23","unstructured":"Hansen, F., Oleshchuk, V.: SRBAC: a spatial role-based access control model for mobile systems. In: Proceedings of the Seventh Nordic Workshop on Secure IT Systems (Nordsec 2003), 15\u201317 October, pp. 129\u2013141 (2003)"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Hu, V.C., Ferraiolo, D., Kuhn, R., Schnitzer, A., Sandlin, K., Miller, R., Scarfone K.: Guide to Attribute Based Access Control (ABAC) Definition and Considerations. NIST Special Publication 800-162, National Institute of Standards and Technology (2014)","DOI":"10.6028\/NIST.SP.800-162"},{"key":"7_CR25","first-page":"41","volume-title":"DBSec 2012, LNCS","author":"X Jin","year":"2012","unstructured":"Jin, X., Krishnan, R., Sandhu, R.: A unified attribute-based access control model covering DAC, MAC and RBAC. In: Cuppens-Boulahia, N., Cuppens, F., GarciaAlfaro, J. (eds.) DBSec 2012, LNCS, vol. 7371, pp. 41\u201355. Springer, Heidelberg (2012)"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Brewer, D., Nash, M.: The chinese wall security policy. In: Proceeding 10th IEEE Symposium on Security and Privacy, pp. 206\u2013214 (1989)","DOI":"10.1109\/SECPRI.1989.36295"},{"key":"7_CR27","unstructured":"Break-glass: An approach to granting emergency access to healthcare systems. White Paper, Joint NEMA\/COCIR\/JIRA Security and Privacy Committee (SPC) (2004)"},{"key":"7_CR28","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-319-11460-6_9","volume-title":"Business Information Systems Workshops","author":"S Schefer-Wenzl","year":"2014","unstructured":"Schefer-Wenzl, S., Bukvova, H., Strembeck, M.: A review of delegation and break-glass models for flexible access control management. In: Abramowicz, W., Kokkinaki, A. (eds.) BIS 2014. LNBIP, vol. 183, pp. 93\u2013104. Springer, Cham (2014). doi: 10.1007\/978-3-319-11460-6_9"},{"key":"7_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JSYST.2015.2424677","volume":"99","author":"A Almehmadi","year":"2015","unstructured":"Almehmadi, A., El-Khatib, K.: On the possibility of insider threat prevention using Intent-Based Access Control (IBAC). IEEE Syst. J. 99, 1\u201312 (2015)","journal-title":"IEEE Syst. J."}],"container-title":["Lecture Notes in Business Information Processing","Innovations in Enterprise Information Systems Management and Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-58801-8_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:04:00Z","timestamp":1750215840000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-58801-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319588001","9783319588018"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-58801-8_7","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"3 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ERP Future","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Enterprise Resource Planning Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hagenberg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 November 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 November 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"erpf2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.erp-future.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}