1.ABSTRACT :
Sharing, comparing and negotiating
security related actions and requirements across businesses has always been a
complicated matter. Issues arise due to semantic gaps, disparity in security
documentation and formats, and incomplete security-related information during
negotiations, to say the least. As collaborations amongst e-businesses in
particular increase, there is a growing, implicit need to address these issues
and ease companies’ deliberations on security. Our research has investigated
this topic in substantial detail, and in this
we present a novel solution model and tool for supporting businesses
through these tasks. Initial evaluation results and feedback from interviewed
security professionals affirm the use and suitability of our proposals in
supporting the security actions negotiation process.
2.EXISTING
SYSTEM :
Issues arise due to semantic gaps,
disparity in security documentation and formats, and incomplete
security-related information during negotiations, to say the least. As
collaborations amongst e-businesses in particular increase, there is a growing,
implicit need to address these issues and ease companies’ deliberations on
security. Previously the work contributed to this area by defining the
Business-Oriented Framework for enhancing Web Services Security for e-business
(BOF4WSS) [1]. BOF4WSS’
uniqueness stems from
its emphasis on a detailed cross enterprise development methodology, to aid
collaborating e-businesses in jointly creating secure and trusted interactions.
By
EBIOS as a security action could be created to directly address constraints
(e.g., operational, financial), regulations, or security rules and policies.
3.
PROPOSED SYSTEM :
A novel
solution model and tool to support the negotiation of security actions in
e-business collaborations is provided. Although developed to accompany BOF4WSS,
these proposals are likely to have further applications in supporting one-off,
cross-enterprise business-based interactions,
or even internal
company negotiations.
The
prime aim of this model is to outline a notional base on which a tool that
would actually support the negotiation of
security actions
across companies, could be implemented.
The Model,contains four components:
1)Security Actions Analysis,
2)Ontology Design,
3)Language Definition and
4)Risk Catalogue Creation
A tool called the Security Actions
Specification and Comparison System(SASaCS) is introduced which embodies the
Encoding and Comparison systems above. The SASaCS tool represents the
culmination of this work, in that, it is the software implementation of the
Solution Model. SASaCS consists of all the practical components necessary to
support the presentation, sharing, comparison and negotiation of security
actions across companies. The tool is explained with two of its features:
i) The Data Entry interface and
ii) The Encoding system.
These aspects were chosen because
they allow novel parts of SASaCS to be highlighted, and set the platform for
evaluation.
4.HARDWARE REQUIREMENTS:
•
System :
Pentium IV 2.4 GHz.
•
Hard Disk :
40 GB.
•
Floppy Drive : 1.44 MB.
•
Monitor :
15 VGA Colour.
•
Mouse :
Logitech.
•
Ram :
256 MB.
5.SOFTWARE REQUIREMENTS:
•
Operating
System : - Windows XP Professional.
•
Front
End :
- Asp .Net 2.0.
•
Coding
Language : - Visual C# .Net.
No comments:
Post a Comment