首页 | 本学科首页   官方微博 | 高级检索  
     


Security and privacy in business networking
Authors:Sven Wohlgemuth  Stefan Sackmann  Noboru Sonehara  A Min Tjoa
Affiliation:1. CASED, System Security Lab, Mornewegstr. 32, 64293, Darmstadt, Germany
2. Martin Luther University Halle Wittenberg, Universit?tsring 3, 06108, Halle/Saale, Germany
3. National Institute of Informatics, Information and Society Research Division, 2-1-2 Hitotsubashi, Chiyoda-ku, Tokyo, 101-8430, Japan
4. Vienna University of Technology, Institute for Software Technology, Favoritenstr. 9-11/188, 1040, Wien, Austria
Abstract:Business networking relies on application-specific quantity and quality of information in order to support social infrastructures in, e.g., energy allocation coordinated by smart grids, healthcare services with electronic health records, traffic management with personal sensors, RFID in retail and logistics, or integration of individuals’ social network information into good, services, and rescue operations. Due to the increasing reliance of networking applications on sharing ICT services, dependencies threaten privacy, security, and reliability of information and, thus, innovative business applications in smart societies. Resilience is becoming a new security approach, since it takes dependencies into account and aims at achieving equilibriums in case of opposite requirements. This special issue on 'Security and Privacy in Business Networking' contributes to the journal 'Electronic Markets' by introducing a different view on achieving acceptable secure business networking applications in spite of threats due to covert channels. This view is on adapting resilience to enforcement of IT security in business networking applications. Our analysis shows that privacy is an evidence to measure and improve trustworthy relationships and reliable interactions between participants of business processes and their IT systems. The articles of this special issue, which have been accepted after a double-blind peer review, contribute to this view on interdisciplinary security engineering in regard to the stages of security and privacy requirements analysis, enforcement of resulting security requirements for an information exchange, testing with a privacy-preserving detection of policy violations, and knowledge management for the purpose of keeping business processes resilient.
Keywords:
本文献已被 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号