| Download ( PDF | 224kB) |
Towards a Risk Management Perspective on AAIs
Schläger, Christian und Nowey, Thomas (2006) Towards a Risk Management Perspective on AAIs. In: Fischer-Hübner, Simone und Furnell, Steven und Lambrinoudakis, Costas, (eds.) Trust and Privacy in Digital Business: Session 2: Security and Risk Management. TrustBus 2006, Krakau, Polen, 04.-08.September 2006. Lecture Notes in Computer Science, 4083. Springer, Heidelberg, S. 41-50. ISBN 978-3-540-37750-4.Veröffentlichungsdatum dieses Volltextes: 05 Aug 2009 13:23
Buchkapitel
Zusammenfassung
Authentication and Authorisation Infrastructures (AAIs) support service providers on the internet to outsource security services. Motivations for their usage stem from software engineering and economics. For the latter an assessment of inherent risks is needed. In this work the authors deduct an appropriate, formalistic risk assessment method for AAIs and analyse outsource able security services ...
Authentication and Authorisation Infrastructures (AAIs) support service providers on the internet to outsource security services. Motivations for their usage stem from software engineering and economics. For the latter an assessment of inherent risks is needed. In this work the authors deduct an appropriate, formalistic risk assessment method for AAIs and analyse outsource able security services in comparison to traditional – non AAI involved – service providing. To achieve the assessment of risks various methods for risk management have been analysed and finally a suitable qualitative method has been chosen. As AAIs differ in their potential to cover security services, combinations of these services are compared. The given risk assessment method enables providers to decide on a special infrastructure for their purpose and lets users of AAIs determine if given advantages surpass the immanent risks. This work also enables service providers to estimate costs for such an infrastructure and calculate potential savings.
Alternative Links zum Volltext
Beteiligte Einrichtungen
Details
| Dokumentenart | Buchkapitel | ||||
| ISBN | 978-3-540-37750-4 | ||||
| Buchtitel: | Trust and Privacy in Digital Business: Session 2: Security and Risk Management. TrustBus 2006, Krakau, Polen, 04.-08.September 2006 | ||||
|---|---|---|---|---|---|
| Verlag: | Springer | ||||
| Ort der Veröffentlichung: | Heidelberg | ||||
| Sonstige Reihe: | Lecture Notes in Computer Science | ||||
| Band: | 4083 | ||||
| Seitenbereich: | S. 41-50 | ||||
| Datum | 2006 | ||||
| Institutionen | Wirtschaftswissenschaften > Institut für Wirtschaftsinformatik > Entpflichtete oder im Ruhestand befindliche Professoren > Lehrstuhl für Wirtschaftsinformatik IV - Management der Informationssicherheit (Prof. Dr.-Ing. Hannes Federrath) Wirtschaftswissenschaften > Institut für Wirtschaftsinformatik > Lehrstuhl für Wirtschaftsinformatik I - Informationssysteme (Prof. Dr. Günther Pernul) Informatik und Data Science > Fachbereich Wirtschaftsinformatik > Lehrstuhl für Wirtschaftsinformatik I - Informationssysteme (Prof. Dr. Günther Pernul) | ||||
| Identifikationsnummer |
| ||||
| Stichwörter / Keywords | Security in general (overviews/surveys) | ||||
| Dewey-Dezimal-Klassifikation | 300 Sozialwissenschaften > 330 Wirtschaft | ||||
| Status | Veröffentlicht | ||||
| Begutachtet | Ja, diese Version wurde begutachtet | ||||
| An der Universität Regensburg entstanden | Ja | ||||
| URN der UB Regensburg | urn:nbn:de:bvb:355-epub-4261 | ||||
| Dokumenten-ID | 426 |
Downloadstatistik
Downloadstatistik