Skip to content Skip to navigation
University of Warwick
  • Study
  • |
  • Research
  • |
  • Business
  • |
  • Alumni
  • |
  • News
  • |
  • About

University of Warwick
Publications service & WRAP

Highlight your research

  • WRAP
    • Home
    • Search WRAP
    • Browse by Warwick Author
    • Browse WRAP by Year
    • Browse WRAP by Subject
    • Browse WRAP by Department
    • Browse WRAP by Funder
    • Browse Theses by Department
  • Publications Service
    • Home
    • Search Publications Service
    • Browse by Warwick Author
    • Browse Publications service by Year
    • Browse Publications service by Subject
    • Browse Publications service by Department
    • Browse Publications service by Funder
  • Help & Advice
University of Warwick

The Library

  • Login
  • Admin

An evaluation of BOF4WSS and the security negotiations model and tool used to support it

Tools
- Tools
+ Tools

Nurse, Jason R. C. and Sinclair, Jane (2010) An evaluation of BOF4WSS and the security negotiations model and tool used to support it. International Journal on Advances in Security, Volume 3 (Number 3-4). pp. 184-201.

[img]
Preview
PDF
WRAP_Sincalir_security2010_nurse_sinclair.pdf - Published Version - Requires a PDF viewer.

Download (421Kb) | Preview
Official URL: http://www.iariajournals.org/security/tocv3n34.htm...

Request Changes to record.

Abstract

As online collaboration between businesses increases, securing these interactions becomes of utmost importance. Not only must entities protect themselves and their electronic collaborations, but they must also ensure compliance to a plethora of security-related laws and industry standards. Our research has focused in detail on the cross-enterprise security problems faced by collaborating businesses. Apart from our most recent work which investigates a novel model and tool to support e-businesses’ security negotiations, we previously defined a comprehensive development methodology to aid companies in creating secure and trusted interactions. This paper aims to advance those proposals by presenting and discussing a key stage of their evaluation. This stage uses interviews with industry-based security professionals from the field, to gather critical, objective feedback on the use and suitability of the proposals in fulfilling their aims.

Item Type: Journal Article
Subjects: Q Science > QA Mathematics > QA76 Electronic computers. Computer science. Computer software
Divisions: Faculty of Science > Computer Science
Library of Congress Subject Headings (LCSH): Business enterprises -- Computer networks -- Security measures, Electronic commerce -- Security measures
Journal or Publication Title: International Journal on Advances in Security
Publisher: IARIA
ISSN: 1942-2636
Official Date: 2010
Dates:
DateEvent
2010Published
Volume: Volume 3
Number: Number 3-4
Page Range: pp. 184-201
Status: Peer Reviewed
Publication Status: Published
Access rights to Published version: Restricted or Subscription Access

Request changes or add full text files to a record

Repository staff actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics

twitter

Email us: publications@live.warwick.ac.uk
Contact Details
About Us