Skip to main content

Developing Secure, Trusted and Auditable Services for e-Business: An Autonomic Computing Approach

  • Conference paper
Trust and Privacy in Digital Business (TrustBus 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3184))

  • 504 Accesses

Abstract

Why have e-business trust and security often been evasive and unsuccessful? This keynote paper attempts to answer this question by looking at an autonomic approach to communications services for on-line businesses. It reviews the issues and challenges, and presents a rationale for security, privacy, interception, forensics of digital evidence and trust in an autonomic communications and computing environment. A combination of security, privacy enhancing technologies, trustworthy computing interfaces and techniques, advocacy, and greater understanding of the socio-economic and technical aspects of this new electronic phenomena must be covered to establish a sound e-business operating environment on a global level. Some possible solutions pertaining to this environment are also reviewed and examples of some key research areas outlined. Finally a brief overview of directions for innovative research is presented and followed by concluding remarks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chao, D.L., Forrest, S.: Information Immune Systems. Genetic Programming and Evolvable Machines 4(4), 311–331 (2003)

    Article  Google Scholar 

  2. Chess, D.M., Plamer, C.C., White, S.R.: Security in an autonomic computing environment. IBM Systems Journal 42(1), 107–118 (2003)

    Article  Google Scholar 

  3. Daniels, T.E.: Reference Models for the Concealment and Observation of Origin Identity in Store-and-Forward Networks. Ph.D. dissertation, Purdue University (2002)

    Google Scholar 

  4. Gopalakrishna, R., Spafford, E.H.: A framework for distributed intrusion detection using interest driven cooperating agents. Presented at the 4th International Symposium on Recent Advances in Intrusion Detection (RAID 2001) (2001)

    Google Scholar 

  5. Hofmeyr, S.A., Forrest, S.: Architecture for an artificial immune system. Evolutionary Computation 7(1), 1289–1296 (2000)

    Google Scholar 

  6. Kephart, J.O., Chess, D.M.: The vision of autonomic computing. IEEE Computer 36(1), 41–50 (2003)

    Google Scholar 

  7. The Open Group, CDSA Explained, 2nd edn. Electronic publication (2001)

    Google Scholar 

  8. Patel, A., Ciardhuáin, S.Ó.: The impact of forensic computing on telecommunications. IEEE Communications 38(11), 64–67 (2000)

    Article  Google Scholar 

  9. Shanmugasundaram, K., Memon, N., Savant, A.: ForNet: A distributed forensic network. In: Gorodetsky, V., Popyack, L.J., Skormin, V.A. (eds.) MMM-ACNS 2003. LNCS, vol. 2776, pp. 1–16. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Patel, A. (2004). Developing Secure, Trusted and Auditable Services for e-Business: An Autonomic Computing Approach. In: Katsikas, S., Lopez, J., Pernul, G. (eds) Trust and Privacy in Digital Business. TrustBus 2004. Lecture Notes in Computer Science, vol 3184. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30079-3_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30079-3_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22919-3

  • Online ISBN: 978-3-540-30079-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics