Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
422704 | Electronic Notes in Theoretical Computer Science | 2007 | 12 Pages |
Abstract
Nowadays many companies understand the benefit of outsourcing. Yet, in current outsourcing practices, clients usually focus primarily on business objectives and security is negotiated only for communication links. It is however not determined how data must be protected after transmission. Strong protection of a communication link is of little value if data can be easily stolen or corrupted while on a supplier's server. The problem raises a number of related challenges such as: identification of metrics which are more suitable for security-level negotiation, client and contractor perspective and security guarantees in service composition scenarios. These challenges and some others are discussed in depth in the article.
Related Topics
Physical Sciences and Engineering
Computer Science
Computational Theory and Mathematics