Certification and Security in E-Services: From E-Government to E-Business

Front Cover
Enrico Nardelli, Sabina Posadziejewski, Maurizio Talamo
Springer Science & Business Media, Jun 30, 2003 - Education - 291 pages
This volume contains the final proceedings of the special stream on security in E-government and E-business. This stream has been an integral part of the IFIP World Computer Congress 2002, that has taken place from 26-29 August 2002 in Montreal, Canada. The stream consisted of three events: one tutorial and two workshops. The tutorial was devoted to the theme "An Architecture for Information Se curity Management", and was presented by Prof. Dr. Basie von Solms (Past chairman of IFIP TC 11) and Prof. Dr. Jan Eloff (Past chairman of IFIP TC 11 WG 11.2). Both are from Rand Afrikaans University -Standard Bank Academy for Information Technology, Johannesburg, South Africa. The main purpose of the tutorial was to present and discuss an Architecture for Informa tion Security Management and was specifically of value for people involved in, or who wanted to find out more about the management of information secu rity in a company. It provided a reference framework covering all three of the relevant levels or dimensions of Information Security Management. The theme of the first workshop was "E-Government and Security" and was chaired by Leon Strous, CISA (De Nederlandsche Bank NY, The Netherlands and chairman of IFIP TC 11) and by Sabina Posadziejewski, I.S.P., MBA (Al berta Innovation and Science, Edmonton, Canada).
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

A NETWORK MANAGEMENT VIEWPOINT ON SECURITY IN ESERVICES
17
SECURITY AND CERTIFICATION ISSUES IN GRID COMPUTING
47
PERFORMANCE CONSIDERATIONS IN WEB SECURITY
57
PROTECTING APPLICATIONS AGAINST MALICE USING ADAPTIVE MIDDLEWARE
73
CONTRIBUTED FULL PAPERS
109
A CONTEXTAWARE APPROACH TO INFER TRUST IN PUBLIC KEY INFRASTRUCTURES
111
A DISTRIBUTED EGOVERNMENT OFFICE
127
CERTIFICATION AND SECURITY OVERLAY
139
DEPLOYING MULTITIER APPLICATIONS ACROSS MULTIPLE SECURITY DOMAINS
177
TOWARDS A COMPREHENSIVE FRAMEWORK FOR DEVELOPMENT AND CERTIFICATION
183
MULTIPLE APPLICATIONS WITH A SINGLE SMART CARD
189
WORKSHOP ORGANIZATION
197
INVITED SPEAKERS
199
RESPECTING PRIVACY IN EGOVERNMENT
201
THE STATUS OF PRIVACY ENHANCING TECHNOLOGIES
211
INITIATIVES IN THE FIGHT AGAINST CYBER TERRORISM
247

A MULTIEXPERT BASED APPROACH TO CONTINUOUS AUTHENTICATION OF MOBILEDEVICE USERS
149
ENCRYPTED DATABASE INTEGRITY IN DATABASE SERVICE PROVIDER MODEL
165
CONTRIBUTED SHORT PAPERS
175
IDENTIFICATION AND CONFIDENTIALITY FOR EGOVERNMENT
267
MASTERING ECOMMERCE AND GLOBALIZATION
281
Copyright

Other editions - View all

Common terms and phrases

Popular passages

Page i - IFIP's events range from an international congress to local seminars, but the most important are: • The IFIP World Computer Congress, held every second year; • Open conferences; • Working conferences. The flagship event is the IFIP World Computer Congress, at which both invited and contributed...