Abstract
With the current trend of moving intelligent services and administration towards the public private partnership, and the security controls that are currently in place, the shareable data modeling initiative has become a controversial issue. Existing applications often rely on isolation or trusted networks for their access control or security, whereas untrusted wide area networks pay little attention to the authenticity, integrity or confidentiality of the data they transport. In this paper, we examine the issues that must be considered when providing network access to an existing probation service environment. We describe how we intend to implement the proposed solution in one probation service application. We describe the architecture that allows remote access to the legacy application, providing it with encrypted communications and strongly authenticated access control but without requiring any modifications to the underlying application.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Gerk, E.: Overview of Certification Systems – X.509, CA, PGP and SKIP. Meta-Certificate Group (1998)
Andress “Surviving Security” How to Integrate People, Process, and Technology, 2nd edn. Auerbach Publications A CRC Press Company, Boca Raton, London, New York, Washington, D.C.
Scambray, J.: Hacking Exposed (April 2, 2001)
Burr, W.E.: Public Key Infrastructure Technical Specification. NIST (1997)
King, C.: Building a Corporate PKI. INFOSEC Engineering (1999)
Warwick, F., Baum, M.: Secure Electronic Commerce – Building Infrastructure for Digital Signatures and Encryption. Prentice Hall (1997)
Fraser, R.: Information Governance & Technology Policies - Remote Access Procedure (October 2009)
CESG: National Technical Authority for Information Assurance, http://www.cesg.gov.uk/index.shtml
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Fawzi, F., Bashroush, R., Jahankhani, H. (2012). GSi Compliant RAS for Public Private Sector Partnership. In: Georgiadis, C.K., Jahankhani, H., Pimenidis, E., Bashroush, R., Al-Nemrat, A. (eds) Global Security, Safety and Sustainability & e-Democracy. e-Democracy ICGS3 2011 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 99. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33448-1_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-33448-1_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33447-4
Online ISBN: 978-3-642-33448-1
eBook Packages: Computer ScienceComputer Science (R0)