Providing Cost-effective Security Functionality into Applications

  • Hilton J
N/ACitations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper asserts that the current approach to the use of asymmetric cryptography and the provision of digital certificates is overly cumbersome, expensive and forces unreasonable requirements on standard business users and consumers; so they ignore or resist their use. In addition, many web-based applications are emerging without appropriate security functionality built-in. It proposes the management of digital certificates within an enhanced commercial environment using best practice personnel recruiting and management procedures and best practice information security management combined with enhanced cryptographic services within the installed base of the corporate IT infrastructure. This, combined with a security middle layer based on the XML Key Management Specification will suffice. The benefit is commercially "fit-for-purpose" identity management, and security functionality, provided at a corporate level, which meets the requirements of applicable law whether it is the EU Directive, or other legislation such as the US HIPAA and Sarbanes-Oxley law.

Cite

CITATION STYLE

APA

Hilton, J. (2004). Providing Cost-effective Security Functionality into Applications. In Securing Electronic Business Processes (pp. 38–48). Vieweg+Teubner Verlag. https://doi.org/10.1007/978-3-322-84982-3_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free