Global Security, Safety and Sustainability & e-Democracy. 7th International and 4th e-Democracy, Joint Conferences, ICGS3/e-Democracy 2011, Thessaloniki, Greece, August 24-26, 2011, Revised Selected Papers

Research Article

GSi Compliant RAS for Public Private Sector Partnership

Download
428 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-33448-1_10,
        author={Fawzi Fawzi and Rabih Bashroush and Hamid Jahankhani},
        title={GSi Compliant RAS for Public Private Sector Partnership},
        proceedings={Global Security, Safety and Sustainability \& e-Democracy. 7th International and 4th e-Democracy, Joint Conferences, ICGS3/e-Democracy 2011, Thessaloniki, Greece, August 24-26, 2011, Revised Selected Papers},
        proceedings_a={ICGS3 \& E-DEMOCRACY},
        year={2012},
        month={10},
        keywords={RAS Secure Mobile Working Security Standards},
        doi={10.1007/978-3-642-33448-1_10}
    }
    
  • Fawzi Fawzi
    Rabih Bashroush
    Hamid Jahankhani
    Year: 2012
    GSi Compliant RAS for Public Private Sector Partnership
    ICGS3 & E-DEMOCRACY
    Springer
    DOI: 10.1007/978-3-642-33448-1_10
Fawzi Fawzi,*, Rabih Bashroush1,*, Hamid Jahankhani1,*
  • 1: University of East London
*Contact email: fawzi@uel.ac.uk, rabih@uel.ac.uk, hamid2@uel.ac.uk

Abstract

With the current trend of moving intelligent services and administration towards the public private partnership, and the security controls that are currently in place, the shareable data modeling initiative has become a controversial issue. Existing applications often rely on isolation or trusted networks for their access control or security, whereas untrusted wide area networks pay little attention to the authenticity, integrity or confidentiality of the data they transport. In this paper, we examine the issues that must be considered when providing network access to an existing probation service environment. We describe how we intend to implement the proposed solution in one probation service application. We describe the architecture that allows remote access to the legacy application, providing it with encrypted communications and strongly authenticated access control but without requiring any modifications to the underlying application.