메뉴 건너뛰기




Volumn 179, Issue , 2007, Pages 47-58

Security and Trust in IT Business Outsourcing: a Manifesto

Author keywords

Business Process Outsourcing; Protection Level Agreement; Security; Security Metrics

Indexed keywords

BUSINESS OBJECTIVES; PROTECTION LEVEL AGREEMENT; SECURITY GUARANTEES; SECURITY METRICS;

EID: 34250776507     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.entcs.2006.08.030     Document Type: Article
Times cited : (25)

References (31)
  • 2
    • 1642394689 scopus 로고    scopus 로고
    • Microsoft IBM, VeriSign, 1.0 edition
    • Atkinson, B., et al. "Web Services Security," Microsoft, IBM, VeriSign, 1.0 edition (2002)
    • (2002) Web Services Security
    • Atkinson, B.1
  • 4
    • 84887406309 scopus 로고    scopus 로고
    • Outsourcing for competitive advantage
    • Bowles, J., Outsourcing for competitive advantage, available via http://www.vmc.com/articles/Forbes%20Advertorial.pdf (2004).
    • (2004)
    • Bowles, J.1
  • 5
    • 70350642949 scopus 로고    scopus 로고
    • Trusted virtual domains: Secure foundations for business and IT services
    • Bussani, A., et al. Trusted Virtual Domains: Secure Foundations for Business and IT Services, Technical Report RC23792, IBM (2005).
    • (2005) Technical Report RC23792, IBM
    • Bussani, A.1
  • 7
    • 84882690392 scopus 로고    scopus 로고
    • A SLA evaluation methodology in service oriented architectures
    • Casola, V., A. Mazzeo, N. Mazzocca and M. Rak, A SLA evaluation methodology in Service Oriented Architectures, in: Proc. of QoP. (2005).
    • (2005) Proc. of QoP.
    • Casola, V.1    Mazzeo, A.2    Mazzocca, N.3    Rak, M.4
  • 8
    • 84883407120 scopus 로고    scopus 로고
    • CISWG, Technical Report CS1/05-0005, Government reform comittee
    • CISWG, Report of the best practices and metrics teams, Technical Report CS1/05-0005, Government reform comittee (2004).
    • (2004) Report of the Best Practices and Metrics Teams
  • 9
    • 34250759867 scopus 로고    scopus 로고
    • Managing network security - Part 5: Risk management or risk analysis
    • Cohen, F., Managing network security - part 5: Risk management or risk analysis, Network Sec. 1997 (1997), pp. 15-19.
    • (1997) Network Sec. 1997 , pp. 15-19
    • Cohen, F.1
  • 10
    • 33646784057 scopus 로고    scopus 로고
    • Information Security Management - A New Paradigm
    • Eloff, J. and M. Eloff, Information Security Management - A New Paradigm, in: Proc. of SAICSIT, 2003, pp. 130 - 136.
    • (2003) Proc. of SAICSIT , pp. 130-136
    • Eloff, J.1    Eloff, M.2
  • 11
    • 34250779459 scopus 로고    scopus 로고
    • The ins and outs of it outsourcing
    • Goth, G., The ins and outs of it outsourcing, IT Professional 1 (1999), pp. 11 - 14.
    • (1999) IT Professional , vol.1 , pp. 11-14
    • Goth, G.1
  • 12
    • 46749096706 scopus 로고    scopus 로고
    • Trusted virtual domains: Toward secure distributed services
    • Yokohama, Japan
    • Griffin, J. L., et al. Trusted virtual domains: Toward secure distributed services, in: Proc. of HotDep, Yokohama, Japan, 2005.
    • (2005) Proc. of HotDep
    • Griffin, J.L.1
  • 13
    • 0033489646 scopus 로고    scopus 로고
    • Security service level agreements: Quantifiable security for the enterprise?
    • Henning, R., Security service level agreements: quantifiable security for the enterprise?, in: Proc. of NSPW (2000), pp. 54-60.
    • (2000) Proc. of NSPW , pp. 54-60
    • Henning, R.1
  • 16
    • 55549137582 scopus 로고    scopus 로고
    • Assessment of enterprise information security - An architecture theory diagram definition
    • Johansson, E. and P. Johnson, Assessment of enterprise information security - an architecture theory diagram definition, in: Proc. of CSER, 2005.
    • (2005) Proc. of CSER
    • Johansson, E.1    Johnson, P.2
  • 17
    • 37249047727 scopus 로고    scopus 로고
    • Service-oriented assurance comprehensive security by explicit assurances
    • Karjoth, G., et al Service-oriented assurance comprehensive security by explicit assurances, in: Proc. of QoP. (2005).
    • (2005) Proc. of QoP
    • Karjoth, G.1
  • 18
    • 1242331287 scopus 로고    scopus 로고
    • TBSE - An engineering approach to the design of accurate and reliable security systems
    • Leach, J., TBSE - an engineering approach to the design of accurate and reliable security systems, Comp. & Sec. 23 (2004), pp. 22-28.
    • (2004) Comp. & Sec. , vol.23 , pp. 22-28
    • Leach, J.1
  • 19
    • 84887409446 scopus 로고    scopus 로고
    • The common criteria - Good, bad or indifferent?, Inform
    • List, W., The common criteria - good, bad or indifferent?, Inform. Sec. Technical Report 2 (1997), pp. 19-23.
    • (1997) Sec. Technical Report 2 , pp. 19-23
    • List, W.1
  • 21
    • 1042277255 scopus 로고    scopus 로고
    • A method for modeling and quantifying the security attributes of intrusion tolerant systems
    • Madan, B. B., et al. A method for modeling and quantifying the security attributes of intrusion tolerant systems, Performance evaluation journal 1-4 (2004), pp. 167-186.
    • (2004) Performance Evaluation Journal , vol.1-4 , pp. 167-186
    • Madan, B.B.1
  • 22
    • 36049032185 scopus 로고    scopus 로고
    • Hierarchical hippocratic databases with minimal disclosure for virtual organizations
    • to appear
    • Massacci, F., J. Mylopoulos and N. Zannone, Hierarchical hippocratic databases with minimal disclosure for virtual organizations, The VLDB J. (2006), to appear.
    • (2006) The VLDB J
    • Massacci, F.1    Mylopoulos, J.2    Zannone, N.3
  • 23
    • 0037392527 scopus 로고    scopus 로고
    • Standards for xml and web services security
    • Naedele, M., Standards for xml and web services security, IEEE Comp. 36 (2003), pp. 96-98.
    • (2003) IEEE Comp. , vol.36 , pp. 96-98
    • Naedele, M.1
  • 24
    • 0033325475 scopus 로고    scopus 로고
    • Experimenting with quantitative evaluation tools for monitoring operational security
    • Ortalo, R., Y. Deswarte and M. Kaaniche, Experimenting with quantitative evaluation tools for monitoring operational security, TSE 25 (1999), pp. 633-650.
    • (1999) TSE , vol.25 , pp. 633-650
    • Ortalo, R.1    Deswarte, Y.2    Kaaniche, M.3
  • 30
    • 30944468129 scopus 로고    scopus 로고
    • Evaluation methodology for the security of e-finance systems
    • Wang, Y. and P. K. Ray, Evaluation methodology for the security of e-finance systems, in: Proc. of EEE (2005).
    • (2005) Proc. of EEE
    • Wang, Y.1    Ray, P.K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.