Certification and Security in Inter-Organizational E-Services: IFIP 18th World Computer Congress, August 22-27, 2004, Toulouse, France

Front Cover
Enrico Nardelli, Maurizio Talamo
Springer Science & Business Media, Apr 12, 2005 - Computers - 149 pages

Certification and Security in Inter-Organizational E-Services presents the proceeding of CSES 2004 - the 2nd International Workshop on Certification and Security in Inter-Organizational E-Services held within IFIP WCC 2004 in August, 2004, in Toulouse, France.  Certification and security share a common technological basis in the reliable and efficient monitoring of executed and running processes; they likewise depend on the same fundamental organizational and economic principles.  As the range of services managed and accessed through communication networks grows throughout society, and given the legal value that is often attached to data treated or exchanged, it is critical to be able to certify the network transactions and ensure that the integrity of the involved computer-based systems is maintained.

This collection of papers offers real-life application experiences, research results and methodological proposals of direct interest to systems experts and users in governmental, industrial and academic communities.  This book also documents several important developments.  The uptake of distributed computational infrastructure oriented to service provision, like Web-Services and Grid, is making C&S even more important.  E-services based on legacy systems managed by autonomous and independent organizations, a common situation in the public administration sector, increase overall complexity.  The increased presence and use of e-service IT-infrastructures depends on the critical ability required for all security issues, from the basic (availability, authentication, integrity, confidentiality) to the more complex (e.g. authorization, non-repudiation), to track responsibilities, --"who did what". 

 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

OVERALL ARCHITECTURE AND IT INFRASTRUCTURE
5
PROBLEMS RUNNING UNTRUSTED SERVICES AS JAVA THREADS
19
GENERATING NETWORK SECURITY PROTOCOL IMPLEMENTATIONS FROM FORMAL SPECIFICATIONS
33
USING NGSCB TO MITIGATE EXISTING SOFTWARE THREATS
55
USE OF ELECTRONIC IDENTITY CARDS IN THE PRIVATE SECTOR
75
BASED ON A SERVICE PORTFOLIO APPROACH FOR AN EQUIPMENTPROVIDING SERVICE
85
A WEB SERVICE FOR CERTIFIED EMAIL
91
TRUTHFUL MECHANISMS FOR BUILDING TRUST IN ECOMMERCE
101
A BAYESIAN APPROACH TO ANOMALIES DETECTION
113
MOBILE FINANCIAL INFORMATION SERVICES SECURITY AND CERTIFICATION
129
HW BASED FIREWALL FOR HIGH PERFORMANCE NETWORK SECURITY
141
Copyright

Other editions - View all

Common terms and phrases

Bibliographic information