Security and Trust in IT Business Outsourcing: a Manifesto

  • Authors:
  • Y. Karabulut;F. Kerschbaum;F. Massacci;P. Robinson;A. Yautsiukhin

  • Affiliations:
  • SAP Research, Karlsruhe, Germany;SAP Research, Karlsruhe, Germany;DIT, University of Trento Trento, Italy;SAP Research, Karlsruhe, Germany;DIT, University of Trento Trento, Italy

  • Venue:
  • Electronic Notes in Theoretical Computer Science (ENTCS)
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Nowadays many companies understand the benefit of outsourcing. Yet, in current outsourcing practices, clients usually focus primarily on business objectives and security is negotiated only for communication links. It is however not determined how data must be protected after transmission. Strong protection of a communication link is of little value if data can be easily stolen or corrupted while on a supplier's server. The problem raises a number of related challenges such as: identification of metrics which are more suitable for security-level negotiation, client and contractor perspective and security guarantees in service composition scenarios. These challenges and some others are discussed in depth in the article.