Collaborative Information Systems vs Information Security
Iulia Mirescu
Iulia.mirescu@ici.ro
National Institute for Research & Development of Informatics – ICI Bucharest
Abstract: The modern era is characterized by multi-communication. In the Internet age, where you can find about three billion of IPs, which represents the physical counter of the users connected to the Internet at a time, we can find information of all spheres of activity, corresponding to different information demands. In this avalanche of information should be considered two points: the quality of the connection (communication hardware and software parameters) that included the absence of any intruder of any kind, which means the act of communication security and the second element, is the environment of the communication in which all participants are more or less employees. About collaboration systems and some ways of ensuring proper management of information security environment we will talk about in this paper.
Key words: communication systems, collaborative systems, security management of information and informatic systems, private communication network.
REFERENCES:
- CIUREA, C.: A Metrics Approach for Collaborative Systems, ASE.
- BENABEN, F.; TOUZI, J.; RAJSIRI, V.; PINGUAD, H.: Collaborative Information System Design. Centre de Genie Industriel.
- IVAN, I.; CIUREA.,: Using Very Large Volume Data Sets for Collaborative Sys-tems Study. Informatica Economică Journal [Online] http://revistaie.ase.ro/content/49/003%20-%20Ivan, %20Ciurea.pdf
- IVAN, I.; CIUREA, C.: Quality characteristics of collaborative systems. În , The Second Interna-tional Conferences on Advances in Computer-Human Interactions, vol. I, Cancun, Mexico, 2009, pp. 164-168.
- SILAGHI, G. C.: Collaborative Multi-Agent Systems – Conception, design and Cluj-Napoca: Risoprint Publishing House, 2005.
- NIŢCHI, Ş.; NIŢCHI, R.; MIHĂILĂ, A.: Some Remarks on Collaborative Systems Framework. Informatica Economică Journal, http://revistaie.ase.ro/content/43/20-nitchi.pdf
- ISO Standards for Interoperability: a Comparison proceedings of INTEROP-ESA’05, Kosanke, K, Geneva, Swiss, February 21-25 2005, Springer-Verlag; pp. 55-64.
- BERNUS, P.; SCHMIDT, G.: Architectures of information systems. Springer Verlag, 199
- MORLEY, C.: La modélisation des processus : typologie et proposition utilisant UML. Actes des journées ADELI : processus et systèmes d’information, Paris, France, 2002.
- LAURAS, M.; PARROD, N.; TELLE, O.: Proposition de référentiel pour la notion d’entente industrielle: trois approches dans le domaine de la gestion des chaînes logistiques. Revue Française de Génie Industrie l, 2003, vol. 22, nr. 4, pp. 5-29.
- REIX, R.: Systèmes d’information et management des organisations, 4th éd., Vuibert 2002.
- VERNADAT, F.: Techniques de modélisation en entreprise: application aux processus opérationnels. Edition Economica, 1999.
- AUBERT, B.; DUSSART, A.: Systèmes d’Information Inter-Organisationnels. Rapport Bourgogne: march 2002, CIRANO.
- BERTHIER, D.; MORLEY, C.; MAURICE-DEMOURIOUX, M.: Enrichissement de la modélisation des processus métiers par le paradigme des systèmes multi-agents: Revue Systèmes d’information, 2005, vol. 10, no. 3, pp. 25-45.
- TOUZI, J.; BÉNABEN, F.; PINGAUD, H.: Une approche de la conception d’un système d’information d’entreprise par la représentation des processus. GDR MACS Congress groupe de travail ECI, Paris, France, March 2005.
- VERWOERD, T., HUNT, R.: Intrusion detection techniques and approaches. Computer Communications, 25, 2002, pp. 1356–1365.
- Safe VPN: IPSec Virtual Private Networks in depth, CISCO Corp., Cisco, 2001 White paper avialable at http://www.cisco.com/application/pdf/en/us/guest/netsol/ ns128/c654/cdccont_0900aecd800b05ad.pdf.
- HUNT, R.: Internet/intranet firewall security – Policy, architecture and transaction services. Computer Communications, 21, 1998. pp. 1107–1123.
- MC HUGH, J.; CHRISTIE, A.; ALLEN, J.: Defending yourself: the role of intrusion detection systems. IEEE Software, September/October 2000, 2000, pp. 42–51.
- HUNT, R.: Technological infrastructure for PKI and digital certification. Computer Communication, 24, 2001, pp. 1460–1471.
- NEUMAN, B. C.; TS’O, T.: Kerberos: An Authentication Service for Computer Networks., IEEE Commnication, September 1994, 32, 9, 1994, pp. 33–38.
- IBM Tivoli Access Manager for e-business, IBM Corp., 2003. Available at http://www.redbooks.ibm.com/redpapers/pdfs/redp3677.pdf
- Access Master SSO – Technical overview, Evidian Corp., 2001. Available at http://www.evidian.com/evifiles/edocs/SSOTechnicalOverview.pdf
- SAMARATI, P., AMMANN, P., JAJODIA, S.: Maintaining replicated authorizations in distributed database systems. Data & Knowledge Engineering, February 1996, pp. 55–84.
- LEVITIN, A. V.; REDMAN, T. C.; SLOAN: Data as a resource: properties, implications and prescriptions, Management Review, fall 1998, 1998, pp. 89–101.
- SAFE: A Security Blueprint for Enterprise Networks, CISCO Corp, 2000 White paper avilable at http://www.cisco.com/warp/public/cc/so/cuso/epso/sqfr/safe_wp.htm
- Privacy online: a report to congress, FTC (Federal Trade Commission), 1998. Report. Available at http://www.ftc.gov/reports/privacy3/priv-23.htm
- BIENNIER, F., FAVREL, J.: Secure collaborative information system for enterprise alliances: a workflow based approach. ETFA’01 Proceedings, 2, 2001, pp. 33–41.
- FISHER-HÜBNER, S.: IT-security and privacy. Lecture Notes in Computer Science, 1958, 2001, pp. 35-106.
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.