Ebook: Certification and Security in E-Services: From E-Government to E-Business
- Tags: Theory of Computation, e-Commerce/e-business, Computer Communication Networks, Management of Computing and Information Systems, The Computing Profession
- Series: IFIP — The International Federation for Information Processing 127
- Year: 2003
- Publisher: Springer US
- Edition: 1
- Language: English
- pdf
This volume contains the final proceedings of the special stream on security in E-government and E-business. This stream has been an integral part of the IFIP World Computer Congress 2002, that has taken place from 26-29 August 2002 in Montreal, Canada. The stream consisted of three events: one tutorial and two workshops. The tutorial was devoted to the theme "An Architecture for Information Se curity Management", and was presented by Prof. Dr. Basie von Solms (Past chairman of IFIP TC 11) and Prof. Dr. Jan Eloff (Past chairman of IFIP TC 11 WG 11.2). Both are from Rand Afrikaans University -Standard Bank Academy for Information Technology, Johannesburg, South Africa. The main purpose of the tutorial was to present and discuss an Architecture for Informa tion Security Management and was specifically of value for people involved in, or who wanted to find out more about the management of information secu rity in a company. It provided a reference framework covering all three of the relevant levels or dimensions of Information Security Management. The theme of the first workshop was "E-Government and Security" and was chaired by Leon Strous, CISA (De Nederlandsche Bank NY, The Netherlands and chairman of IFIP TC 11) and by Sabina Posadziejewski, I.S.P., MBA (Al berta Innovation and Science, Edmonton, Canada).
Content:
Front Matter....Pages i-viii
Front Matter....Pages 1-4
Introduction....Pages 5-13
A Network Management Viewpoint on Security in E-Services....Pages 17-45
Security and Certification Issues in Grid Computing....Pages 47-55
Performance Considerations in Web Security....Pages 57-71
Protecting Applications Against Malice Using Adaptive Middleware....Pages 73-108
A Context-Aware Approach to Infer Trust in Public Key Infrastructures....Pages 111-125
Mountain Information System: A Distributed E-Government Office....Pages 127-138
E-Government Services: Certification and Security Overlay....Pages 139-148
A Multi-Expert Based Approach to Continuous Authentication of Mobile-Device Users....Pages 149-164
Encrypted Database Integrity in Database Service Provider Model....Pages 165-174
Deploying Multi-tier Applications Across Multiple Security Domains....Pages 177-182
Security Through Integration: Towards a Comprehensive Framework for Development and Certification....Pages 183-188
Multiple Applications With a Single Smart Card....Pages 189-193
Initiatives in the Fight Against Cyber Terrorism....Pages 247-265
Front Matter....Pages 195-198
Respecting Privacy in E-Government....Pages 201-210
The Status of Privacy Enhancing Technologies....Pages 211-246
Initiatives in the Fight Against Cyber Terrorism....Pages 247-265
Identification and Confidentiality for E-Government....Pages 267-279
Mastering E-Commerce and Globalization....Pages 281-291
Content:
Front Matter....Pages i-viii
Front Matter....Pages 1-4
Introduction....Pages 5-13
A Network Management Viewpoint on Security in E-Services....Pages 17-45
Security and Certification Issues in Grid Computing....Pages 47-55
Performance Considerations in Web Security....Pages 57-71
Protecting Applications Against Malice Using Adaptive Middleware....Pages 73-108
A Context-Aware Approach to Infer Trust in Public Key Infrastructures....Pages 111-125
Mountain Information System: A Distributed E-Government Office....Pages 127-138
E-Government Services: Certification and Security Overlay....Pages 139-148
A Multi-Expert Based Approach to Continuous Authentication of Mobile-Device Users....Pages 149-164
Encrypted Database Integrity in Database Service Provider Model....Pages 165-174
Deploying Multi-tier Applications Across Multiple Security Domains....Pages 177-182
Security Through Integration: Towards a Comprehensive Framework for Development and Certification....Pages 183-188
Multiple Applications With a Single Smart Card....Pages 189-193
Initiatives in the Fight Against Cyber Terrorism....Pages 247-265
Front Matter....Pages 195-198
Respecting Privacy in E-Government....Pages 201-210
The Status of Privacy Enhancing Technologies....Pages 211-246
Initiatives in the Fight Against Cyber Terrorism....Pages 247-265
Identification and Confidentiality for E-Government....Pages 267-279
Mastering E-Commerce and Globalization....Pages 281-291
....