{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:57:15Z","timestamp":1754157435644,"version":"3.41.2"},"reference-count":11,"publisher":"Emerald","issue":"9\/10","license":[{"start":{"date-parts":[[2008,10,17]],"date-time":"2008-10-17T00:00:00Z","timestamp":1224201600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,10,17]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The purpose of this paper is to create a model of role\u2010based access control (RBAC) based access control for virtual enterprise (VE).<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>An access control model for security and management of VE is presented by integrating generic structure of VE and applying the principles of RBAC. In addition, the application of the model to a supply chain\u2010oriented VE illustrates that a general access control scheme can ensure the running of VE.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>A theory base of access control for the realization of the VE is found.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>The paper presents a very useful new model of access control for VE. This paper is aimed at researchers and engineers.<\/jats:p><\/jats:sec>","DOI":"10.1108\/03684920810907517","type":"journal-article","created":{"date-parts":[[2008,10,25]],"date-time":"2008-10-25T07:12:25Z","timestamp":1224918745000},"page":"1242-1249","source":"Crossref","is-referenced-by-count":0,"title":["Modeling of RBAC\u2010based access control of virtual enterprise"],"prefix":"10.1108","volume":"37","author":[{"given":"Dejun","family":"Chen","sequence":"first","affiliation":[]},{"given":"Zude","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Yingzhe","family":"Ma","sequence":"additional","affiliation":[]},{"given":"D.T.","family":"Pham","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022012719505719900_b2","doi-asserted-by":"crossref","unstructured":"Bertino, E. (2003), \u201cRBAC models \u2013 concepts and trends\u201d, Computers & Security, Vol. 22 No. 6, pp. 511\u20104.","DOI":"10.1016\/S0167-4048(03)00609-6"},{"key":"key2022012719505719900_b5","unstructured":"Chen, D., Huang, M. and Zude, Z. (2006), \u201cResearch on security of virtual enterprise based on multi\u2010agent\u201d, Journal of Wuhan University, Vol. 39 No. 5, pp. 137\u201042."},{"key":"key2022012719505719900_b8","unstructured":"Chen, D., Jiang, D. and Zhou, Z. (2006), \u201cResearch on a new architectural model of workflow engine of virtual enterprise\u201d, Advances in System Science and Applications, Vol. 6 No. 2, pp. 240\u20107."},{"key":"key2022012719505719900_b3","unstructured":"Chen, D., Zhou, Z. and Jiang, D. (2006), \u201cModeling of general virtual enterprise\u201d, Advances in System Science and Applications, Vol. 6 No. 2, pp. 255\u201061."},{"key":"key2022012719505719900_b6","doi-asserted-by":"crossref","unstructured":"Chen, T\u2010Y., Chen, Y\u2010M., Chu, H\u2010C. and Wang, C\u2010B. (2007), \u201cDevelopment of an access control model, system architecture and approaches for resource sharing in virtual enterprise\u201d, Computers in Industry, Vol. 58 No. 1, pp. 57\u201073.","DOI":"10.1016\/j.compind.2006.04.003"},{"key":"key2022012719505719900_b1","unstructured":"Fan, H., Xubin, H. and Zhiyong, X. (2000), \u201cRole based access control\u201d, Mini\u2010Micro Systems, Vol. 21 No. 2, pp. 198\u2010200."},{"key":"key2022012719505719900_b9","doi-asserted-by":"crossref","unstructured":"Lin, Y. (1987), \u201cA model of general systems\u201d, Mathematical Modelling: An International J., Vol. 9 No. 2, pp. 95\u2010104.","DOI":"10.1016\/0270-0255(87)90518-5"},{"key":"key2022012719505719900_b10","doi-asserted-by":"crossref","unstructured":"Lin, Y. (1990), \u201cGeneral controllability and general stabilities of linear systems\u201d, International J. Systems Sciences, Vol. 21 No. 1, pp. 193\u2010203.","DOI":"10.1080\/00207729008910353"},{"key":"key2022012719505719900_b11","doi-asserted-by":"crossref","unstructured":"Lin, Y. and Ma, Y. (1990), \u201cRemarks on controllabilities of general systems\u201d, International J. General Systems, Vol. 17 No. 4, pp. 317\u201027.","DOI":"10.1080\/03081079008935115"},{"key":"key2022012719505719900_b7","doi-asserted-by":"crossref","unstructured":"Qiuwei, Y., Fan, H., Muxiang, Y. and Xian, Z. (2006), \u201cSecurity analysis on administrative model of role\u2010based access control\u201d, Journal of Software, Vol. 8, pp. 1804\u201011.","DOI":"10.1360\/jos171804"},{"key":"key2022012719505719900_b4","unstructured":"Zhao, H. and Wang, Y. (2002), \u201cApplication of RSA to data security and EDI\u201d, Advances in Systems Science and Applications, Vol. 2 No. 1, pp. 92\u20106."}],"container-title":["Kybernetes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/03684920810907517\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/03684920810907517\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:53:22Z","timestamp":1753401202000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/k\/article\/37\/9-10\/1242-1249\/459648"}},"subtitle":[],"editor":[{"given":"Mian\u2010yun","family":"Chen","sequence":"first","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2008,10,17]]},"references-count":11,"journal-issue":{"issue":"9\/10","published-print":{"date-parts":[[2008,10,17]]}},"alternative-id":["10.1108\/03684920810907517"],"URL":"https:\/\/doi.org\/10.1108\/03684920810907517","relation":{},"ISSN":["0368-492X"],"issn-type":[{"type":"print","value":"0368-492X"}],"subject":[],"published":{"date-parts":[[2008,10,17]]}}}