2007
DOI: 10.1016/j.entcs.2006.08.030
|View full text |Cite
|
Sign up to set email alerts
|

Security and Trust in IT Business Outsourcing: a Manifesto

Abstract: Nowadays many companies understand the benefit of outsourcing. Yet, in current outsourcing practices, clients usually focus primarily on business objectives and security is negotiated only for communication links. It is however not determined how data must be protected after transmission. Strong protection of a communication link is of little value if data can be easily stolen or corrupted while on a supplier's server. The problem raises a number of related challenges such as: identification of metrics which a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
24
0

Year Published

2007
2007
2013
2013

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(27 citation statements)
references
References 21 publications
0
24
0
Order By: Relevance
“…As argued in [16] and also in [12,Chap.3], internal security indicators are not appropriate for the client. It should rather use what we termed assurance indicators.…”
Section: Definitionmentioning
confidence: 99%
See 1 more Smart Citation
“…As argued in [16] and also in [12,Chap.3], internal security indicators are not appropriate for the client. It should rather use what we termed assurance indicators.…”
Section: Definitionmentioning
confidence: 99%
“…install antivirus, enforce a policy for using e-mails). To assess the internal security of the BP the contractor can use what we called security indicators such as the frequency of anti-virus updates, the presence of sophisticated access control models and so on [16].…”
Section: Definitionmentioning
confidence: 99%
“…In this work, we introduce behavior compliance control, in which a cloud provider uses methods from dynamic anomaly detection to provide clients trustworthy evidence about the absence of "abnormal" executions caused by incorrect server configurations, version mismatches, hardware glitches or malicious attacks by third parties [20]. Providing such evidence is very important in scenarios where faults or attacks occur through invalid program inputs such as incorrect or compromised configuration files.…”
Section: Introductionmentioning
confidence: 99%
“…These factors include for example the organisation's culture (Allen et al, 2002;Graf and Mudambi, 2005), its ability to manage customer-vendor relationships (Lee, 2001;Kedia and Lahiri, 2007;Goo et al, 2007), security capabilities (Power and Forte, 2005;Hunter, 2003;Karabulut et al, 2007;Kennedy and Clark, 2006;Khalfan, 2004;Todd et al, 2006) and people management (Jensen et al, 2007).…”
Section: Introductionmentioning
confidence: 99%