Security considerations in outsourcing IT services.
John A. BlackleyJohn LeachPublished in: Inf. Secur. Tech. Rep. (1996)
Keyphrases
- service providers
- personal data
- service offerings
- security services
- inter domain
- web services
- service management
- network services
- access control
- enterprise network
- intrusion detection
- service quality
- information security
- context aware
- communication protocols
- business continuity
- public key infrastructure
- mobile payment
- security risks
- mobile commerce
- end users
- security policies
- business process
- information systems
- information technology
- network security
- access control mechanism
- identity management
- service composition
- internet service providers
- information services
- key management
- directory service
- security threats
- security issues
- security requirements
- outsourced databases
- network connection
- user privacy
- electronic commerce
- network access
- sensitive data
- transaction costs
- security mechanisms