Strategy for IT security in E-enterprise environment

Rosslin John Robles, Young Sik Jeong, Hyuk Park Jong, Tai Hoon Kim

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

In an e-enterprise, the tight coupling between business process and the underlying information technology infrastructure amplifies the effect of hardware and software security failures. This accentuates the need for comprehensive security management of the infrastructure. This paper outlined the challenges posed by fulfilling myriad security requirements throughout the various stages of enterprise integration. To better categorize these requirements, the set of security domains that comprise the security profile of the e-enterprise have been specified. The set of security metrics used to quantify various aspects of security for an e-enterprise are also identified.

Original languageEnglish
Title of host publicationProceedings - 2008 International Symposium on Ubiquitous Multimedia Computing, UMC 2008
Pages214-217
Number of pages4
DOIs
StatePublished - 2008
Event2008 International Symposium on Ubiquitous Multimedia Computing, UMC 2008 - Hobart, TAS, Australia
Duration: 13 Oct 200815 Oct 2008

Publication series

NameProceedings - 2008 International Symposium on Ubiquitous Multimedia Computing, UMC 2008

Conference

Conference2008 International Symposium on Ubiquitous Multimedia Computing, UMC 2008
Country/TerritoryAustralia
CityHobart, TAS
Period13/10/0815/10/08

Fingerprint

Dive into the research topics of 'Strategy for IT security in E-enterprise environment'. Together they form a unique fingerprint.

Cite this