Advertisement

GSi Compliant RAS for Public Private Sector Partnership

Conference paper
  • 1.1k Downloads
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 99)

Abstract

With the current trend of moving intelligent services and administration towards the public private partnership, and the security controls that are currently in place, the shareable data modeling initiative has become a controversial issue. Existing applications often rely on isolation or trusted networks for their access control or security, whereas untrusted wide area networks pay little attention to the authenticity, integrity or confidentiality of the data they transport. In this paper, we examine the issues that must be considered when providing network access to an existing probation service environment. We describe how we intend to implement the proposed solution in one probation service application. We describe the architecture that allows remote access to the legacy application, providing it with encrypted communications and strongly authenticated access control but without requiring any modifications to the underlying application.

Keywords

RAS Secure Mobile Working Security Standards 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Gerk, E.: Overview of Certification Systems – X.509, CA, PGP and SKIP. Meta-Certificate Group (1998)Google Scholar
  2. 2.
    Andress “Surviving Security” How to Integrate People, Process, and Technology, 2nd edn. Auerbach Publications A CRC Press Company, Boca Raton, London, New York, Washington, D.C.Google Scholar
  3. 3.
    Scambray, J.: Hacking Exposed (April 2, 2001)Google Scholar
  4. 4.
    Burr, W.E.: Public Key Infrastructure Technical Specification. NIST (1997)Google Scholar
  5. 5.
    King, C.: Building a Corporate PKI. INFOSEC Engineering (1999)Google Scholar
  6. 6.
    Warwick, F., Baum, M.: Secure Electronic Commerce – Building Infrastructure for Digital Signatures and Encryption. Prentice Hall (1997)Google Scholar
  7. 7.
    Fraser, R.: Information Governance & Technology Policies - Remote Access Procedure (October 2009)Google Scholar
  8. 8.
    CESG: National Technical Authority for Information Assurance, http://www.cesg.gov.uk/index.shtml

Copyright information

© ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2012

Authors and Affiliations

  1. 1.Head of IT Developments and Technical InnovationsLondon Probation TrustLondonUK
  2. 2.School of Computing IT and EngineeringUniversity of East LondonLondonUK

Personalised recommendations