E-BUSINESS SECURITY DESIGN USING PROCESS SECURITY REQUIREMENTS SEPTET

S. Nachtigal

2007

Abstract

In the e-business environment, the traditional business models for information systems security are no longer appropriate, and fit neither the new organisational environment nor the new organisational security needs. Existing security tools and mechanisms, developed upon the traditional perimeter security paradigm, and based on hardware and software products, are not sufficient since they do not relate to specific parameters that characterise the business process. The modern business environment needs different security approach. Based on such a new approach, which is e-process security design paradigm, a methodology to provide security for an e-business organisation is presented here. The methodology makes use of the newly introduced security requirements septet for e-business process.

Download


Paper Citation


in Harvard Style

Nachtigal S. (2007). E-BUSINESS SECURITY DESIGN USING PROCESS SECURITY REQUIREMENTS SEPTET . In Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007) ISBN 978-989-8111-12-8, pages 408-413. DOI: 10.5220/0002128304080413

in Bibtex Style

@conference{secrypt07,
author={S. Nachtigal},
title={E-BUSINESS SECURITY DESIGN USING PROCESS SECURITY REQUIREMENTS SEPTET},
booktitle={Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)},
year={2007},
pages={408-413},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002128304080413},
isbn={978-989-8111-12-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)
TI - E-BUSINESS SECURITY DESIGN USING PROCESS SECURITY REQUIREMENTS SEPTET
SN - 978-989-8111-12-8
AU - Nachtigal S.
PY - 2007
SP - 408
EP - 413
DO - 10.5220/0002128304080413