Abstract
In the paper are presented solutions for securing the core University Business Processes. A Method for identification which Business processes are critical for security point of view, on which is required to pay more attention for its securing. For securing of the elected Business processes is developed a new security system – Extended Certification Authority. Special Secure eDocument Management Architecture is developed, on which base are developed the solutions for securing the following University Business processes - Delegation of exam permissions to lecturers, Recording exam marks, and Exchange management documents.
Chapter PDF
Similar content being viewed by others
Keywords
References
O’Higgins, B.: What is the Difference Between a Public-Key Infrastructure and a Certification Authority? http://www.opengroup.org/comm/the_message/magazine/mmv4n2/pki.htm
Shirbu, M., Chuang, J.: Distributed Authentication in Kerberos using Public key cryptography, http://people.ischool.berkeley.edu/~chuang/pubs/pkda.pdf
Bass de Graeff, Business processes Security, Unisys, http://www.unisys.com/unisys/ri/wp/detail.jsp?id=17600051
Kisimov, V.: Dynamic Business-managed Information systems, Sofia, Bulgaria (2008) ISBN 978-954-323-444-8
Garfamy, R.: Supplier selection and Business process improvement, doctoral thesis, Autonomous University of Barcelona (2005)
Lee, J., Choi, J.: Process selection for Business Process Management in a mobile telecommunications company, University of Illinois at Urbana-Champaign, USA. International Journal of Information Technologies and Management 8(4), 382–399 (2009)
RFC 2459, Internet X.509 Public Key Infrastructure Certificate and CRL Profile, http://www.ietf.org/rfc/rfc2459.txt
National RFC 3281, An Internet Attribute Certificate Profile for Authorization, http://www.faqs.org/rfcs/rfc3281.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 IFIP International Federation for Information Processing
About this paper
Cite this paper
Ivanov, V., Tzaneva, M., Murdjeva, A., Kisimov, V. (2011). Securing the Core University Business Processes. In: Camenisch, J., Kisimov, V., Dubovitskaya, M. (eds) Open Research Problems in Network Security. iNetSec 2010. Lecture Notes in Computer Science, vol 6555. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19228-9_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-19228-9_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-19227-2
Online ISBN: 978-3-642-19228-9
eBook Packages: Computer ScienceComputer Science (R0)