Skip to main content

GSi Compliant RAS for Public Private Sector Partnership

  • Conference paper
Global Security, Safety and Sustainability & e-Democracy (e-Democracy 2011, ICGS3 2011)

Abstract

With the current trend of moving intelligent services and administration towards the public private partnership, and the security controls that are currently in place, the shareable data modeling initiative has become a controversial issue. Existing applications often rely on isolation or trusted networks for their access control or security, whereas untrusted wide area networks pay little attention to the authenticity, integrity or confidentiality of the data they transport. In this paper, we examine the issues that must be considered when providing network access to an existing probation service environment. We describe how we intend to implement the proposed solution in one probation service application. We describe the architecture that allows remote access to the legacy application, providing it with encrypted communications and strongly authenticated access control but without requiring any modifications to the underlying application.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Gerk, E.: Overview of Certification Systems – X.509, CA, PGP and SKIP. Meta-Certificate Group (1998)

    Google Scholar 

  2. Andress “Surviving Security” How to Integrate People, Process, and Technology, 2nd edn. Auerbach Publications A CRC Press Company, Boca Raton, London, New York, Washington, D.C.

    Google Scholar 

  3. Scambray, J.: Hacking Exposed (April 2, 2001)

    Google Scholar 

  4. Burr, W.E.: Public Key Infrastructure Technical Specification. NIST (1997)

    Google Scholar 

  5. King, C.: Building a Corporate PKI. INFOSEC Engineering (1999)

    Google Scholar 

  6. Warwick, F., Baum, M.: Secure Electronic Commerce – Building Infrastructure for Digital Signatures and Encryption. Prentice Hall (1997)

    Google Scholar 

  7. Fraser, R.: Information Governance & Technology Policies - Remote Access Procedure (October 2009)

    Google Scholar 

  8. CESG: National Technical Authority for Information Assurance, http://www.cesg.gov.uk/index.shtml

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Fawzi, F., Bashroush, R., Jahankhani, H. (2012). GSi Compliant RAS for Public Private Sector Partnership. In: Georgiadis, C.K., Jahankhani, H., Pimenidis, E., Bashroush, R., Al-Nemrat, A. (eds) Global Security, Safety and Sustainability & e-Democracy. e-Democracy ICGS3 2011 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 99. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33448-1_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-33448-1_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-33447-4

  • Online ISBN: 978-3-642-33448-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics