52
Views
3
CrossRef citations to date
0
Altmetric
Development and Implementation Processes

An it Architecture for Nimble Organizations: Managing Access from Cyberspace

Notes

  • Handy , Charles . 1995 . Thinking About…: Trust and the Virtual Organization . Harvard Business Review , 73 ( 3 )
  • Kocharekar , R. 2001 . K-Commerce: Knowledge-Based Commerce Architecture with Convergence of E-Commerce and Knowledge Management . Information Systems Management , 10 ( 2 ) : 29 – 34 . The following article describes how knowledge acquisition and business processes span across organization's boundaries:
  • Geng , Xianjun , Hang , Yun and Whinston , Andrew B. 2002 . Defending Wireless Infrastructure against the Challenge of DdoS Attacks . Mobile Networks and Applications , 7 ( 2 ) June : 213
  • Gooch , D. J. , Hubbard , S. D. , Moore , M. W. and Hill , J. 2001 . Firewalls – Evolve or Die . BT Technology Journal , 19 ( 3 ) July : 89 The following article describes the use of the VPN and firewalls in secure information access over the Internet:
  • Roth , M. A. , Wolfson , D. C. , Kleewein , J. C. and Nelin , C. J. 2002 . Information Integration: A New Generation of Information Technology . IBM Systems Journal , 41 ( 4 ) : 563
  • Higgins , Huong Ngo . 1999 . Corporate System Security: Towards an Integrated Management Approach . Information Management & Computer Security , 7 ( 5 ) : 217 A comprehensive, but not so holistic (architected) approach is also discussed in the following article:
  • Udo , Godwin J. 2001 . Privacy and Security Concerns as Major Barrier for E-Commerce: A Survey Study . Information Management & Computer Security , 9 ( 4 ) : 165 Privacy and security are the number-one reasons why customers are not purchasing on the Internet, according to a recent survey:
  • Sandhu , R. , Ferraiolo , D. F. and Kuhn , D. R. The NIST Model for Role Based Access Control: Towards a Unified Standard . Proceedings, 5th ACM Workshop on Role Based Access Control . first public draft of proposal for an RBAC standard
  • Bosworth , K. P. and Tedeschi , N. 2001 . Public Key Infrastructure—The Next Generation . BT Technology Journal , 19 ( 3 ) July : 44 The following article provides a good overview of the public key infrastructure and its overall acceptance:
  • Web Services Activity Home Page from W3C http://www.w3.org/2002/ws/
  • Hondo , M. , Nagaratnam , N. and Nadalin , A. 2002 . Securing Web Services . IBM Systems Journal , 41 ( 2 ) : 228
  • Furnell , Steven M. and Dowland , Paul S. 2000 . A Conceptual Architecture for Real-Time Intrusion monitoring . Information Management & Computer Security , 8 ( 2 ) : 65
  • Daughtrey , Taz . Emerging Issues in Information Security Management . Quality Congress, ASQ's Annual Quality Congress Proceedings . pp. 406 Milwaukee
  • Home page of OASIS Security Services Technical Committee: http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=security
  • Home page for OASIS XACML Technical Committee: http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=xacml
  • Home page for OASIS Provisioning Services Technical Committee: http://www.oasis-open. org/committees/tc_home.php?wg_abbrev=provision
  • Products based on Liberty Alliance's specifications for an interoperable federated identity management framework are already available on the market. Home page for Liberty Alliance: http://www.projectliberty.org/
  • Bradenburger , Adam and Nalebuff , Barry . 1995 . The Right Game: Use Game Theory to Shape Strategy . Harvard Business Review , 73 ( 4 )
  • Kocharekar , Raju . 2001 . Without the Speed Limit, but Within the Limit: Managing Knowledge in Organizations . Information Strategy , 17 ( 3 ) : 10 – 15 . The following article discusses the nature of information goods from economic utility perspectives and its implications for organizations:

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.