英文摘要
|
Enterprise resource planning (ERP) systems are rapidly being combined with "big data" analytics processes and publicly available "open data sets", which are usually outside the arena of the enterprise, to expand activity through better service to current clients as well as identifying new opportunities. Moreover, these activities are now largely based around relevant software systems hosted in a "cloud computing" environment. However, the over 50-year old phrase related to mistrust in computer systems, namely "garbage in, garbage out" or "GIGO", is used to describe problems of unqualified and unquestioning dependency on information systems. However, a more relevant GIGO interpretation arose sometime later, namely "garbage in, gospel out" signifying that with large scale information systems based around ERP and open datasets as well as "big data" analytics, particularly in a cloud environment, the ability to verify the authenticity and integrity of the data sets used may be almost impossible. In turn, this may easily result in decision making based upon questionable results which are unverifiable. Illicit "impersonation" of and modifications to legitimate data sets may become a reality while at the same time the ability to audit any derived results of analysis may be an important requirement, particularly in the public sector. The pressing need for enhancement of identity, reliability, authenticity and audit services, including naming and addressing services, in this emerging environment is discussed in this paper. Some current and appropriate technologies currently being offered are also examined. However, severe limitations in addressing the problems identified are found and the paper proposes further necessary research work for the area. (Note: This paper is based on an earlier unpublished paper/presentation "Identity, Addressing, Authenticity and Audit Requirements for Trust in ERP, Analytics and Big/Open Data in a 'Cloud' Computing Environment: A Review and Proposal" presented to the Department of Accounting and IT, College of Management, National Chung Chen University, 20 November 2013.)
|
参考文献
|
-
Wikipedia 2013. "Wikipedia, the free encyclopedia " in Garbage in, garbage out, Wikipedia.
-
Mockapetris, P. 1983. "RFC 882 Domain Names -Concepts and Facilities," Internet Engineering Task Force..
-
Open Knolwedge Foundation "The open source data portal software.".
-
Davis, P., and Reed, D. "OASIS Extensible Resource Identifier (XRI).".
-
Réseaux IP Européens "RIPE ENUM Working group, ."
-
Eastlake, D., and Kaufman, C. 1997. " Domain Name System Security Extensions.".
-
Van der Berg, R. 2010. "ENUM: Dragging telephone numbers into the Internet Age.".
-
Department of Defense 1985. "Trusted Computer System Evaluation Criteria (TCSEC), USA 1983/1985, DoD 5200.28-STD Supersedes CSC-STD-00l-83, dated l5 Aug 83, Library No. S225,7ll, 26 December 1985 "..
-
Queensl and Government 2013. "Queensland Government data.".
-
Rodriguez, A. 2008. "RESTful Web services: The basics," IBM..
-
Almeida, F.,Lourenço, J.(2011).Security Issues in Unified Communications.International journal of research and reviews in computer science,2(2),403.
-
Armbrust, M.,Fox, A.,Griffith, R.,Joseph, A. D.,Katz, R.,Konwinski, A.,Lee, G.,Patterson, D.,Rabkin, A.,Stoica, I.(2010).A view of cloud computing.Communications of the ACM,53(4),50-58.
-
Barnes, R.(2012).Domain Name Authentication with DNSSEC and DANE.The Internet Protocol Journal,15
-
Bradely, T.,Shah, S.(2010).Unified Communications for Dummies.Wiley Publishing Inc..
-
Celesti, A.,Villari, M.,Puliafito, A.(2010).Ecosystem of Cloud Naming Systems: an Approach for the Management and Integration of Independent Cloud Name Spaces.Network Computing and Applications (NCA), 2010 Ninth IEEE International Symposium on Network Computing and Applications
-
Croll, P.,Henricksen, M.,Caelli, W.,Liu, V.(2007).Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records.12th World Congress on Health (Medical) Informatics, Medinfo2007,Brisbane Australia:
-
Dong, Y.,Yajuan, Q.,Hongke, Z.,Huachun, Z.,Bo, W.(2006).URNS: A new name service for uniform network resource location.Wireless, Mobile and Multimedia Networks, 2006 IET International Conference on
-
Goode, B.(2002).Voice over Internet protocol (VoIP).Proceedings of the IEEE,90(9),1495-1517.
-
Henricksen, M.,Caelli, W.,Croll, P.(2007).Securing Grid Data Using Mandatory Access Controls.5th Australian Symposium on Grid Computing and e-Research (AusGrid),Ballarat Australia:
-
IBM Corporation(1993).Dictionary of IBM & Computing Technology.
-
Liu, J.,Ansari, N.(2008).Public Switched Telephone Network.John Wiley & Sons.
-
Liu, V.(2011).Brisbane,Queensland University of Technology.
-
Liu, V.,Caelli, W.,May, L.,Croll, P.(2008).Open Trusted Health Informatics Structure.Australasian Workshop on Health Data and Knowledge Management, the Australian Computer Science Week ACM,Wollongong Australia:
-
Liu, V.,Caelli, W.,May, L.,Croll, P.(2007).A Sustainable Approach to Security and Privacy in Health Information Systems.18th Australasian Conference on Information Systems (ACIS),Toowoomba, Australia:
-
Liu, V.,Caelli, W.,May, L.,Croll, P.(2008).Strengthening Legal Compliance for Privacy in Electronic Health Information Systems: A Review and Analysis.The Electronic Journal of Health Informatics (eJHI),3(1),e3.
-
Liu, V.,Caelli, W.,May, L.,Croll, P.,Henricksen, M.(2007).Current Approaches to Secure Health Information Systems are Not Sustainable: an Analysis.12th World Congress on Health (Medical) Informatics, Medinfo,Brisbane, Australia:
-
Liu, V.,Caelli, W.,May, L.,Sahama, T.(2009).Privacy and Security in Open and Trusted Health Information Systems.Third Australasian Workshop on Health Informatics and Knowledge Management (HIKM 2009),Wellington, New Zealand:
-
Liu, V.,Caelli, W.,Smith, J.,May, L.,Lee, M.,Ng, Z.,Foo, J.,Li, W.(2010).Secure Architecture for Australia's Index Based E-health Environment.The Australasian Workshop on Health Informatics and Knowledge Management in conjunction with the 33rd Australasian Computer Science Conference Conferences in Research and Practice in Information Technology (CRPIT),Brisbane, Australia:
-
Liu, V.,Franco, L.,Caelli, W.,May, L.,Sahama, T.(2009).Open and Trusted Information Systems/Health Informatics Access Control (OTHIS/HIAC).the 32nd Australasian Computer Science Conference (ACSC 2009),Wellington, New Zealand:
-
Miller, P.(2010).TCP/IP -the Ultimate Protocol Guide: Complete 2 Volume Set.Brown Walker Press.
-
Miller, P.,Styles, R.,Heath, T.(2008).Open Data Commons, a License for Open Data.LDOW 2008
-
Muller, N.(2002).Desktop Encyclopedia of Telecommunications.McGraw-Hill.
-
Potts, M.(2012).The state of information security.Network Security,7,9-11.
-
Riemer, K.,Taing, D.-I. S.(2009).Unified Communications.Business & Information Systems Engineering,1(4),326-330.
-
Rosenblum, M.,Garfinkel, T.(2005).Virtual machine monitors: current technology and future trends.Computer,38(5),39-47.
-
She, W.,Thuraisingham, B.(2007).Security for Enterprise Resource Planning Systems.Information Systems Security,16(3),152-163.
-
Skalak, S. L.,Golden, T. W.,Clayton, M. M.,Pill, J.S.(2011).Aguidet of orensic accounting investigation.John Wiley & Sons.
-
Weber, R. H.(2010).Internet of Things - New security and privacy challenges.Computer Law & Security Review,26(1),23-30.
|