Security for Web Service based on Regulatory Compliance

被引:0
|
作者
Chen, Gang [1 ]
机构
[1] Tongji Univ, Shanghai Univ Finance & Econ, Shanghai 200092, Peoples R China
关键词
regulatory compliance; protection; monitor; audit;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Organization, flow and technology are three foundation of Regulatory Compliance. On the foundation there are three dimensionality of frame security for web service based on regulatory compliance: protection, monitor and audit. The blue print of security for web service based on regulatory compliance should describe the right and responsibility for every role, stabilization of basic structure, safety of financial system and comprehensive audit system. The blue print should ascertain range of security, value risk and monitor security, audit security system, report and advice CIO about security. Implement of security for web service based on regulatory compliance includes four processes such as: value and analysis, set .strategy, implement and execution, supervise and renewal.
引用
收藏
页码:1285 / 1288
页数:4
相关论文
共 50 条
  • [1] Proxy-based Web Service Security
    Wu, Jian
    Huang, Zhimin
    [J]. 2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 1282 - 1288
  • [2] Web accessibility: Web standards and regulatory compliance
    Brizee, H. Allen
    [J]. TECHNICAL COMMUNICATION, 2007, 54 (02) : 254 - 256
  • [3] A web based service for patients compliance to disease treatment
    Wang, XH
    Istepanian, RSH
    [J]. PROCEEDINGS OF THE 25TH ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY, VOLS 1-4: A NEW BEGINNING FOR HUMAN HEALTH, 2003, 25 : 1417 - 1420
  • [4] Reliability, compliance, and security in web-based course assessments
    Bonham, Scott
    [J]. PHYSICAL REVIEW SPECIAL TOPICS-PHYSICS EDUCATION RESEARCH, 2008, 4 (01):
  • [5] Web service security
    Damiani, Ernesto
    Gianini, Gabriele
    Maruyama, Hiroshi
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2006, 21 (05): : 323 - 323
  • [6] Regulatory Compliance and Information Security Assurance
    Tashi, Igli
    [J]. 2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 670 - 674
  • [7] Healthcare Security Strategies for Regulatory Compliance and Data Security
    Kwon, Juhee
    Johnson, M. Eric
    [J]. PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 3972 - 3981
  • [8] Security Modeling and Analysis of a SDN Based Web Service
    Eom, Taehoon
    Hong, Jin B.
    Park, Jong Sou
    Kim, Dong Seong
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2015, 2015, 9532 : 746 - 756
  • [9] A Study on Web Service Analysis and Bio-information based Web Service Security Mechanism
    Lee, Seong-Hoon
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (02): : 77 - 86
  • [10] A Security Architecture For Web Service
    Luo Fuqiang
    Xiong Yongfu
    [J]. 2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 499 - 502