ebook img

Certification and Security in Inter-Organizational E-Services: IFIP 18th World Computer Congress, August 22-27, 2004, Toulouse, France (IFIP International Federation for Information Processing) PDF

154 Pages·2005·8.254 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Certification and Security in Inter-Organizational E-Services: IFIP 18th World Computer Congress, August 22-27, 2004, Toulouse, France (IFIP International Federation for Information Processing)

Description:
Certification and Security in Inter-Organizational E-Services presents the proceeding of CSES 2004 - the 2nd International Workshop on Certification and Security in Inter-Organizational E-Services held within IFIP WCC 2004 in August, 2004, in Toulouse, France.  Certification and security share a common technological basis in the reliable and efficient monitoring of executed and running processes; they likewise depend on the same fundamental organizational and economic principles.  As the range of services managed and accessed through communication networks grows throughout society, and given the legal value that is often attached to data treated or exchanged, it is critical to be able to certify the network transactions and ensure that the integrity of the involved computer-based systems is maintained. This collection of papers offers real-life application experiences, research results and methodological proposals of direct interest to systems experts and users in governmental, industrial and academic communities.  This book also documents several important developments.  The uptake of distributed computational infrastructure oriented to service provision, like Web-Services and Grid, is making C&S even more important.  E-services based on legacy systems managed by autonomous and independent organizations, a common situation in the public administration sector, increase overall complexity.  The increased presence and use of e-service IT-infrastructures depends on the critical ability required for all security issues, from the basic (availability, authentication, integrity, confidentiality) to the more complex (e.g. authorization, non-repudiation), to track responsibilities, --"who did what".
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.