Certification and Security in Inter-Organizational E-Services: IFIP 18th World Computer Congress, August 22-27, 2004, Toulouse, France (IFIP International Federation for Information Processing)

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Certification and Security in Inter-Organizational E-Services presents the proceeding of CSES 2004 - the 2nd International Workshop on Certification and Security in Inter-Organizational E-Services held within IFIP WCC 2004 in August, 2004, in Toulouse, France.  Certification and security share a common technological basis in the reliable and efficient monitoring of executed and running processes; they likewise depend on the same fundamental organizational and economic principles.  As the range of services managed and accessed through communication networks grows throughout society, and given the legal value that is often attached to data treated or exchanged, it is critical to be able to certify the network transactions and ensure that the integrity of the involved computer-based systems is maintained. This collection of papers offers real-life application experiences, research results and methodological proposals of direct interest to systems experts and users in governmental, industrial and academic communities.  This book also documents several important developments.  The uptake of distributed computational infrastructure oriented to service provision, like Web-Services and Grid, is making C&S even more important.  E-services based on legacy systems managed by autonomous and independent organizations, a common situation in the public administration sector, increase overall complexity.  The increased presence and use of e-service IT-infrastructures depends on the critical ability required for all security issues, from the basic (availability, authentication, integrity, confidentiality) to the more complex (e.g. authorization, non-repudiation), to track responsibilities, --"who did what". 

Author(s): Enrico Nardelli, Maurizio Talamo
Edition: 1
Year: 2005

Language: English
Pages: 149