Secure web application development and global regulation

Glisson, W.B., Glisson, L.M. and Welland, R. (2007) Secure web application development and global regulation. In: The Second International Conference on Availability, Reliability and Security (ARES'07), Vienna, Austria, 10-13 April 2007, pp. 681-688. ISBN 9780769527758 (doi: 10.1109/ARES.2007.133)

[img]
Preview
Text
welland3487.pdf

229kB

Publisher's URL: http://dx.doi.org/10.1109/ARES.2007.133

Abstract

The World Wide Web (WWW) has been predominantly responsible for instigating radical paradigm transformations in today’s global information rich civilizations. Many societies have basic operational economical components that depend on Web enabled systems in order to support daily commercial activities. The acceptance of E-commerce as a valid channel for conducting business coupled with societal integration and dependence on Web enabled technology has instigated the development of local, national, and global efforts to regulate criminal activities on the World Wide Web. This paper makes two contributions. The first contribution is the high-level review of the United States and United Kingdom legislation that has developed from the escalation and integration of the World Wide Web into society. The second contribution is the support for the idea that legislative compatibility, in concert with an organization’s policy compatibility, needs to be acknowledged in secure Web application development methodologies.

Item Type:Conference Proceedings
Keywords:Web engineering, web security, web-legislation.
Status:Published
Refereed:Yes
Glasgow Author(s) Enlighten ID:Glisson, Dr William and Welland, Professor Raymond
Authors: Glisson, W.B., Glisson, L.M., and Welland, R.
Subjects:Q Science > QA Mathematics > QA75 Electronic computers. Computer science
College/School:College of Science and Engineering > School of Computing Science
Publisher:IEEE Computer Society
ISBN:9780769527758
Copyright Holders:Copyright © 2007 Institute of Electrical and Electronics Engineers.
First Published:First published in The Second International Conference on Availability, Reliability and Security (ARES'07)
Publisher Policy:Reproduced in accordance with the copyright policy of the publisher.

University Staff: Request a correction | Enlighten Editors: Update this record