• 沒有找到結果。

第五章 結論與未來研究

5.2 未來研究

由於本研究所探討的是水平式跨組織工作流程,由多個同性質的組織所組 成,共同進行一完整之跨組織工作流程,此跨組織合作模式非長期運作,當跨組 織工作流程進行前,需有彼此會議協商,決定使用者之原始角色在跨組織工作流 程中所擁有之原始角色分數,不僅需要額外的人力進行會議協商,且會降低跨組 織工作流程之效率;而垂直式跨組織工作流程的合作模式,卻是由各組織進行各 自部份的工作流程,根據此跨組織工作流程的規則,依序完成整個跨組織工作流 程,在此種非同步式的跨組織工作流程中,對於組織與組織工作流程間,若當使 用者需存取到其他組織之資源時,如果只加入嚴謹的限制條件是不足以保謢組織 間的安全性。

因此,我們未來的研究,是將設計一套自動化規則,決定使用者所擔任之原 始角色,在跨組織工作流程中所擁有之原始角色分數,如此一來,不僅能節省許 多時間及人力成本,亦能大大增加跨組織工作流程之效率,並將本研究所使用到 的限制條件概念,如角色分數,可將之延伸到組織上,形成組織分數(Organization Score),並使用在垂直式的跨組織工作流程環境中,並可在組織之間加入工作流

程觀(Process View)[37]的概念,組織之間根據組織分數取得對於其他組織的可 視程度,讓組織在進行垂直式的跨組織工作流程時,有更深一層的保護,並期許 完成垂直式的跨組織工作流程架構。

參考文獻

[1] 司徒達賢,「中小企業之策略聯盟」,經濟情勢暨評論季刊,第二卷第三期,

第 1~7 頁,民國 85 年。

[2] 吳青松,「策略聯盟之國際發展趨勢」,經濟情勢暨評論季刊,第二卷第三期,

第 8~13 頁,民國 85 年。

[3] 黃崇哲,「電子商務對臺灣廠商策略聯盟關係之影響及展望」,亞太經濟合作 評論,第五期,第 75~86 頁,民國 89 年。

[4] 經濟部,「2006 中小企業白皮書」,經濟部中小企業處,民國 95 年。

[5] 劉敦仁、吳美玉、黃景彰,「以工作為基礎的存取控制之權責區分授權準則 設計」,資訊管理學報,第八卷第一期,第 61~80 頁,民國 90 年。

[6] 盧昆宏,「台灣企業策略聯盟成功因素之研究」,產業經營管理國際學術研究 會,高雄,第 14~31 頁,民國 90 年。

[7] 陳金帶、袁建中,「中小企業策略聯盟特性研究」,大華學報,第十一卷,第 23-1~23-23 頁,民國 81 年。

[8] 陳哲閎,「Internet 上一般化工作流程管理系統的設計與實做」,台灣大學資 訊管理研究所碩士論文,民國 86 年。

[9] 蔡正陽、許政郎,「運用策略聯盟促進技術引進之研究」,中華民國科技管理 研討會論文集,第 209~218 頁,民國 80 年。

[10] 鄭峰斌,「台商進入大陸之策略模式、夥伴選擇準則及其經營績效相關性研 究」,成功大學管理學院碩士論文,民國 92 年。

[11] 鄧詩韻,「網際網路服務供應商(ISP)運用策略聯盟之研究」,台灣師範大 學大眾傳播研究所碩士論文,民國 92 年。

[12] 蘇漢良,「工作流程管理系統之設計與建構」,台灣大學土木工程學研究所碩 士論文,民國 90 年。

[13] G. J. Ahn, R. S. Sandhu, M. H. Kang, and J. S. Park, “Injecting RBAC to Secure

a Web-based Workflow System”, Proceedings of the 5th ACM workshop on Role-based access control, Berlin, Germany, pp. 47-63, July 2000.

[14] R. A. Botha and J. H. P. Eloff, “A framework for access control in workflow systems”, Information Management & Computer Security, vol.9, no.3, pp.

126-133, 2001.

[15] R. A. Botha and J. H. P. Eloff, “Designing Role Hierarchies for Access Control in Workflow Systems”, Proceedings of the 25th International Computer Software and Applications Conference on Invigorating Software Development, Chicago,

Illinois, U.S.A., pp. 117-122, October 2001.

[16] S. Chaari, F. Biennier, C. B. Amar, and J. Favrel, “An authorization and access control model for workflow”, International Symposium on Control, Communications and Signal Processing, Hammamet, Tunisia, pp. 141-148,

March 2004.

[17] F. Casati, S. Ceri, B. Pernici, and G. Pozzi, “Workflow Evolution”, Data and Knowledge Engineering, vol.24, no.3, pp. 211-238, 1998.

[18] I. Chebbi, S. Dustdar, and S. Tata, “The view-based approach to dynamic inter-organizational workflow cooperation”, Data & Knowledge Engineering, vol.56, no.2, pp. 139-173, February 2006.

[19] F. Chen and R. S. Sandhu, “Constraints for Role-Based Access Control”, ACM Role-Based Access Control Workshop, Gaithersburg, Maryland, U.S.A., pp.

39-46, 1996.

[20] I. Chebbi and S. Tata, “CoopFlow: A Framework for Inter-organizational Workflow Cooperation”, Proceedings of International Conference on Cooperative Information Systems, Agia Napa, Cyprus, pp. 112-129, 2005.

[21] D. F. Ferraiolo, J. F. Barkley, and D. R. Kuhn, “A Role-Based Access Control Model and Reference Implementation within a Corporate Intranet”, ACM

Transactions on Information Systems Security, vol.2, no.1, pp. 34-64, February

1999.

[22] D. F. Ferraiolo, J. A. Cugini, and D. R. Kuhn, “Role-Based Access Control (RBAC): Features and Motivations”, Proceedings of 11th Annual Computer Security Application Conference, IEEE Computer Society Press, New Orleans,

Louisiana, U.S.A., pp. 241-248, December 1995.

[23] D. F. Ferraiolo and D. R. Kuhn, “Role-based Access Controls”, Proceedings of the 15th National Computer Security Conference, Baltimore, Maryland, U.S.A.,

pp. 554-563, October 1992.

[24] D. F. Ferraiolo, R. S. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli,

“Proposed NIST Standard for Role-Based Access Control”, ACM Transactions on Information and System Security, vol.4, no.3, pp. 224-274, August 2001.

[25] D. Georgakopoulos, M. Hornick, and A. Sheth, “An Overview of Workflow Management: From Process Modeling to Workflow Automation Infrastructure”, Distributed and Parallel Databases, vol.3, pp. 119-153, 1995.

[26] L. Giuri and P. Iglio, “A Formal Model for Role-Based Access Control with Constraints”, Proceedings of the 9th IEEE workshop on Computer Security Foundations, Dromquinna Manor, Kenmare, Country Kerry, Ireland, pp.

136-145, March 1996.

[27] R. W. Griffin and M. W. Pustay, “International Business: A Managerial Perspective”, New Jersey: Pearson Education, Inc. 2002.

[28] M. C. Ho and T. Y. Li, “An Experimental News Production System with Flexible Role-Based Access Control”, Proceedings of 3rd International Conference on Information Technology: Research and Education, Hsinchu, Taiwan, pp. 287-291, June 2005.

[29] M. H. Kang, J. S. Park, and J. N. Froscher, “Access Control Mechanisms for

Inter-Organizational Workflow”, Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, Chantilly, Virginia, U.S.A., pp. 66-74,

May 2001.

[30] J. D. Lewis, “Making Strategic Alliance Work”, Research Technology Management, Vol.33, no.6, pp. 12-15, 1990.

[31] J. Liu and L. Sun, “The Application of Role-Based Access Control in Workflow Management Systems”, Proceedings of IEEE International Conference on System, Man and Cybemetics, vol.6, pp. 5492-5496, October 2004.

[32] S. Oh and S. Park, “Task-role-based access control model”, Information System Journal, vol.28, no.8, pp. 533-562, 2003.

[33] M. E. Porter and M. B. Fuller, “Competition in Global Industries”, New York:

Lexington Books. 1986.

[34] R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, “Role-Based Access Control: A Multi-Dimensional View”, Proceedings of 10th Annual Computer Security Applications Conference, Orlando, Florida, U.S.A., pp. 54-62,

December 1994.

[35] R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, “Role-based Access Control Models”, IEEE Computer, vol.29, no.2, pp. 38-47, February 1996.

[36] R. S. Sandhu, D. F. Ferraiolo, and D. R. Kuhn, “The NIST Model for Role-Based Access Control: Towards A Unified Standard”, Proceedings of the 5th ACM workshop on Role-based access control, Berlin, Germany, pp. 47-63, July 2000.

[37] M. Shen and D. R. Liu, “Coordinating Interorganizational Workflows Based on Process-Views”, Proceedings of the 12th International Conference on Database and Expert Systems Applications, Munich, Germany, pp. 274-283, September 2001.

相關文件