Nathalie Dagorn



This paper tackles security issues for cooperative information systems (CIS) by first identifying the major security requirements for this particular type of information systems, and then discussing the security techniques usually implemented to address these requirements as well as their limitations.


  1. Allen, V., 2008. ERP Security Tools. In Internal Auditor, Vol. 65 Issue 1, p25-27.
  2. Anderson, R., 2001. Security Engineering: A Guide to Building Dependable Distributed Systems, John Wiley & Sons.
  3. Apostolou, D., Mentzas, G., Klein, B., Abecker, A., Maass, W., 2008. Interorganizational knowledge exchanges. In IEEE Intelligent Systems, Vol. 23 Issue 4, p65-74.
  4. Bharadwaj, S., Bharadwaj, A., Bendoly, E., 2007. The performance effects of complementarities between information systems, marketing, manufacturing, and supply chain processes. In Information Systems Research, Vol. 18 Issue 4, p437-453.
  5. Briguet, C., 2009. Building a Secure Collaborative Infrastructure. In ECN: Electronic Component News, Vol. 53 Issue 2, p27-29.
  6. Cao, J., Chen, J., Zhao, H., Li, M., 2009. A policy-based authorization model for workflow-enabled dynamic process management. In Journal of Network & Computer Applications, Vol. 32 Issue 2, p412-422.
  7. Cheswick, W.R., Bellovin, S.M., Rubin, A.D., 2003. Firewalls and Internet Security: Repelling the Wily Hacker, Addison-Wesley Professional. 2nd edition.
  8. Chi, L., Holsapple, C.W., Srinivasan, C., 2007. Competitive dynamics in electronic networks: a model and the case of interorganizational systems. In International Journal of Electronic Commerce, Vol. 11 Issue 3, p37-49.
  9. Cook, N., Robinson, P., Shrivastava, S.K., 2006. Design and Implementation of Web Services Middleware to Support Fair Non-Repudiable Interactions. In International Journal of Cooperative Information Systems, Vol. 15 Issue 4, p565-597.
  10. Dagorn, N., 2008. Politiques en matière de sécurité des systèmes d'information inter-organisationnels: une enquête dans dix grandes entreprises. In Systèmes d'Information et Management, Vol. 13 Issue 2, p97- 125.
  11. Dagorn, N., 2009. Sécurité des systèmes d'information coopératifs. PhD Dissertation, Nancy-Université, September (to appear).
  12. Demchenko, Y., Mulmo, O., Gommans, L., de Laat, C., Wan, A., 2008. Dynamic security context management in Grid-based applications. In Future Generation Computer Systems, Vol. 24 Issue 5, p434-441.
  13. Ekelhart, A., Fenz, S., Goluch, G., Steinkellner, M., Weippl, E., 2008. XML security: A comparative literature review. In Journal of Systems & Software, Vol. 81 Issue 10, p1715-1724.
  14. Fenoulière, P., 2004. Vers une informatique ouverte : enjeux et infrastructures, Hermes Science Publications. Paris.
  15. Graff, M.G., Van Wyk, K.R., 2003. Secure Coding: Principles and Practices, O'Reilly Media.
  16. Howard, M., LeBlanc, D., 2001. Writing Secure Code, Microsoft Press.
  17. Izza, S., 2009. Integration of industrial information systems: from syntactic to semantic integration approaches. In Enterprise Information Systems, Vol. 3 Issue 1, p1-57.
  18. Khosrow, M., 2008. Web Technologies for Commerce and Services Online, Information Science Reference. Hershey, PA.
  19. Lehtinen, R., 2006. Computer Security Basics, O'Reilly Media. Sebastopol, CA, 2nd edition.
  20. Lin, S.-J., Liu, D.-C., 2009. An incentive-based electronic payment scheme for digital content transactions over the Internet. In Journal of Network & Computer Applications, Vol. 32 Issue 3, p589-598.
  21. Malik, Z., Bouguettaya, A., 2005. Preserving trade secrets between competitors in b2b interactions. In International Journal of Cooperative Information Systems, Vol.14 Issue 2-3, p265-297.
  22. Mansfield-Devine, S., 2008. Danger in the clouds. In Network Security, Vol. 2008 Issue 12, p9-11.
  23. Menold, N., 2009. How to Use Information Technology for Cooperative Work: Development of Shared Technological Frames. In Computer Supported Cooperative Work (CSCW), Vol. 18 Issue 1, p47-81.
  24. Mortgage Banking, 2008. Elements of a Successful Platform. In Mortgage Banking, Vol. 69 Issue 3, p71.
  25. Narayanan, S., Marucheck, A.S., Handfield, R.B, 2009. Electronic Data Interchange: Research Review and Future Directions. In Decision Sciences, Vol. 40 Issue 1, p121-163.
  26. Periorellis, P., 2007. Securing Web Services: Practical Usage of Standards and Specifications, Information Science Reference. Hershey, PA.
  27. Saeed, K.A., Malhotra, M.K., Grover, V., 2005. Examining the impact of interorganizational systems on process efficiency and sourcing leverage in buyersupplier dyads. In Decision Sciences, Vol. 36 Issue 3, p365-396.
  28. Smith, M., Schmidt, M., Fallenbeck, N., Dörnemann, T., Schridde, C., Freisleben, B., 2009. Secure on-demand grid computing. In Future Generation Computer Systems, Vol. 25 Issue 3, p315-325.
  29. Straub, D., Rai, A., Klein, R., 2004. Measuring firm performance at the network level: a nomology of the business impact of digital supply networks. In Journal of Management Information Systems, Vol. 21 Issue 1, p83-114.
  30. Tsung-Yi, C., Yuh-Min, C., Chin-Bin, W., Hui-Chuan, C., 2009. Flexible authorisation in dynamic e-business environments using an organisation structure-based access control model. In International Journal of Computer Integrated Manufacturing, Vol. 22 Issue 3, p225-244.
  31. Wainer, J., Barthelmess, P., Kumar, A., 2003. W-RBAC: A workflow security model incorporating controlled overriding of constraints. In International Journal on Cooperative Information Systems, Vol. 12 Issue 4, p455-485.
  32. Waters, J.K., 2009. Target: the web. In THE Journal, Vol. 36 Issue 2, p34-40.
  33. Whittaker, J., Andrews, M., 2006. How to Break Web Software: Functional And Security Testing of Web Applications And Web Services, Addison-Wesley Educational Publishers Inc.
  34. Wortman, J., 2008. Seven Deadly Sins of IT Due Diligence. In Buyouts, Vol. 21 Issue 5, p44-46.

Paper Citation

in Harvard Style

Dagorn N. (2009). IDENTIFYING SECURITY ELEMENTS FOR COOPERATIVE INFORMATION SYSTEMS . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009) ISBN 978-989-674-005-4, pages 319-324. DOI: 10.5220/0002232403190324

in Bibtex Style

author={Nathalie Dagorn},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)},

in EndNote Style

JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)
SN - 978-989-674-005-4
AU - Dagorn N.
PY - 2009
SP - 319
EP - 324
DO - 10.5220/0002232403190324