GSi Compliant RAS for Public Private Sector Partnership

Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 99)


With the current trend of moving intelligent services and administration towards the public private partnership, and the security controls that are currently in place, the shareable data modeling initiative has become a controversial issue. Existing applications often rely on isolation or trusted networks for their access control or security, whereas untrusted wide area networks pay little attention to the authenticity, integrity or confidentiality of the data they transport. In this paper, we examine the issues that must be considered when providing network access to an existing probation service environment. We describe how we intend to implement the proposed solution in one probation service application. We describe the architecture that allows remote access to the legacy application, providing it with encrypted communications and strongly authenticated access control but without requiring any modifications to the underlying application.


RAS Secure Mobile Working Security Standards 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Gerk, E.: Overview of Certification Systems – X.509, CA, PGP and SKIP. Meta-Certificate Group (1998)Google Scholar
  2. 2.
    Andress “Surviving Security” How to Integrate People, Process, and Technology, 2nd edn. Auerbach Publications A CRC Press Company, Boca Raton, London, New York, Washington, D.C.Google Scholar
  3. 3.
    Scambray, J.: Hacking Exposed (April 2, 2001)Google Scholar
  4. 4.
    Burr, W.E.: Public Key Infrastructure Technical Specification. NIST (1997)Google Scholar
  5. 5.
    King, C.: Building a Corporate PKI. INFOSEC Engineering (1999)Google Scholar
  6. 6.
    Warwick, F., Baum, M.: Secure Electronic Commerce – Building Infrastructure for Digital Signatures and Encryption. Prentice Hall (1997)Google Scholar
  7. 7.
    Fraser, R.: Information Governance & Technology Policies - Remote Access Procedure (October 2009)Google Scholar
  8. 8.
    CESG: National Technical Authority for Information Assurance,

Copyright information

© ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2012

Authors and Affiliations

  1. 1.Head of IT Developments and Technical InnovationsLondon Probation TrustLondonUK
  2. 2.School of Computing IT and EngineeringUniversity of East LondonLondonUK

Personalised recommendations