Abstract
Why have e-business trust and security often been evasive and unsuccessful? This keynote paper attempts to answer this question by looking at an autonomic approach to communications services for on-line businesses. It reviews the issues and challenges, and presents a rationale for security, privacy, interception, forensics of digital evidence and trust in an autonomic communications and computing environment. A combination of security, privacy enhancing technologies, trustworthy computing interfaces and techniques, advocacy, and greater understanding of the socio-economic and technical aspects of this new electronic phenomena must be covered to establish a sound e-business operating environment on a global level. Some possible solutions pertaining to this environment are also reviewed and examples of some key research areas outlined. Finally a brief overview of directions for innovative research is presented and followed by concluding remarks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Chao, D.L., Forrest, S.: Information Immune Systems. Genetic Programming and Evolvable Machines 4(4), 311–331 (2003)
Chess, D.M., Plamer, C.C., White, S.R.: Security in an autonomic computing environment. IBM Systems Journal 42(1), 107–118 (2003)
Daniels, T.E.: Reference Models for the Concealment and Observation of Origin Identity in Store-and-Forward Networks. Ph.D. dissertation, Purdue University (2002)
Gopalakrishna, R., Spafford, E.H.: A framework for distributed intrusion detection using interest driven cooperating agents. Presented at the 4th International Symposium on Recent Advances in Intrusion Detection (RAID 2001) (2001)
Hofmeyr, S.A., Forrest, S.: Architecture for an artificial immune system. Evolutionary Computation 7(1), 1289–1296 (2000)
Kephart, J.O., Chess, D.M.: The vision of autonomic computing. IEEE Computer 36(1), 41–50 (2003)
The Open Group, CDSA Explained, 2nd edn. Electronic publication (2001)
Patel, A., Ciardhuáin, S.Ó.: The impact of forensic computing on telecommunications. IEEE Communications 38(11), 64–67 (2000)
Shanmugasundaram, K., Memon, N., Savant, A.: ForNet: A distributed forensic network. In: Gorodetsky, V., Popyack, L.J., Skormin, V.A. (eds.) MMM-ACNS 2003. LNCS, vol. 2776, pp. 1–16. Springer, Heidelberg (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Patel, A. (2004). Developing Secure, Trusted and Auditable Services for e-Business: An Autonomic Computing Approach. In: Katsikas, S., Lopez, J., Pernul, G. (eds) Trust and Privacy in Digital Business. TrustBus 2004. Lecture Notes in Computer Science, vol 3184. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30079-3_1
Download citation
DOI: https://doi.org/10.1007/978-3-540-30079-3_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22919-3
Online ISBN: 978-3-540-30079-3
eBook Packages: Springer Book Archive