Glisson, W.B., Glisson, L.M. and Welland, R. (2007) Secure web application development and global regulation. In: The Second International Conference on Availability, Reliability and Security (ARES'07), Vienna, Austria, 10-13 April 2007, pp. 681-688. ISBN 9780769527758 (doi: 10.1109/ARES.2007.133)
![]()
|
Text
welland3487.pdf 229kB |
Publisher's URL: http://dx.doi.org/10.1109/ARES.2007.133
Abstract
The World Wide Web (WWW) has been predominantly responsible for instigating radical paradigm transformations in today’s global information rich civilizations. Many societies have basic operational economical components that depend on Web enabled systems in order to support daily commercial activities. The acceptance of E-commerce as a valid channel for conducting business coupled with societal integration and dependence on Web enabled technology has instigated the development of local, national, and global efforts to regulate criminal activities on the World Wide Web. This paper makes two contributions. The first contribution is the high-level review of the United States and United Kingdom legislation that has developed from the escalation and integration of the World Wide Web into society. The second contribution is the support for the idea that legislative compatibility, in concert with an organization’s policy compatibility, needs to be acknowledged in secure Web application development methodologies.
Item Type: | Conference Proceedings |
---|---|
Keywords: | Web engineering, web security, web-legislation. |
Status: | Published |
Refereed: | Yes |
Glasgow Author(s) Enlighten ID: | Glisson, Dr William and Welland, Professor Raymond |
Authors: | Glisson, W.B., Glisson, L.M., and Welland, R. |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
College/School: | College of Science and Engineering > School of Computing Science |
Publisher: | IEEE Computer Society |
ISBN: | 9780769527758 |
Copyright Holders: | Copyright © 2007 Institute of Electrical and Electronics Engineers. |
First Published: | First published in The Second International Conference on Availability, Reliability and Security (ARES'07) |
Publisher Policy: | Reproduced in accordance with the copyright policy of the publisher. |
University Staff: Request a correction | Enlighten Editors: Update this record