Privacy Application Infrastructure: Confidential Data Masking

B. Liver, K. Tice
{"title":"Privacy Application Infrastructure: Confidential Data Masking","authors":"B. Liver, K. Tice","doi":"10.1109/CEC.2009.43","DOIUrl":null,"url":null,"abstract":"Handling of confidential and sensitive data is an important issue facing any professional service provider that wishes to use services from a third party company. This paper describes an infrastructure, the Privacy Infrastructure Appliance that was designed to protect confidential information when outsourcing service fulfillment. A comparison is made with an embedded solution that does not use an infrastructure.There are two use cases to consider, one use case is the outsourcing of back-end service fulfillment, such as executing foreign exchange trade orders and the second use case is the outsourcing of back-office activities, such as non-core competence office work. In considering back-end service delivery, we look at the use of computer systems and processes, which are not privy to confidential information. In considering back-office clerical activities, we look at the human component of service fulfillment, the clerical office worker. The clerical office worker that is outsourced, will still use the applications of the outsourcing company, but he is no longer privy to confidential information. This paper describes and contrasts two solutions. An infrastructure that was built to meet confidential information requirements for doing outsourcing of solution delivery systems and an application approach to mask confidential information from outsourced back office workers.","PeriodicalId":384060,"journal":{"name":"2009 IEEE Conference on Commerce and Enterprise Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 IEEE Conference on Commerce and Enterprise Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CEC.2009.43","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

Handling of confidential and sensitive data is an important issue facing any professional service provider that wishes to use services from a third party company. This paper describes an infrastructure, the Privacy Infrastructure Appliance that was designed to protect confidential information when outsourcing service fulfillment. A comparison is made with an embedded solution that does not use an infrastructure.There are two use cases to consider, one use case is the outsourcing of back-end service fulfillment, such as executing foreign exchange trade orders and the second use case is the outsourcing of back-office activities, such as non-core competence office work. In considering back-end service delivery, we look at the use of computer systems and processes, which are not privy to confidential information. In considering back-office clerical activities, we look at the human component of service fulfillment, the clerical office worker. The clerical office worker that is outsourced, will still use the applications of the outsourcing company, but he is no longer privy to confidential information. This paper describes and contrasts two solutions. An infrastructure that was built to meet confidential information requirements for doing outsourcing of solution delivery systems and an application approach to mask confidential information from outsourced back office workers.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
隐私应用程序基础结构:机密数据屏蔽
处理机密和敏感数据是任何希望使用第三方公司服务的专业服务提供商面临的一个重要问题。本文描述了一个基础设施,即隐私基础设施设备,它被设计用于在外包服务实现时保护机密信息。与不使用基础设施的嵌入式解决方案进行比较。有两个用例需要考虑,一个用例是后端服务实现的外包,例如执行外汇交易订单,第二个用例是后台活动的外包,例如非核心竞争力办公室工作。在考虑后端服务交付时,我们会考虑使用不涉及机密信息的计算机系统和流程。在考虑后台办公室文书活动时,我们关注服务实现的人类组成部分,即办公室文书工作人员。被外包的文职人员仍然会使用外包公司的应用程序,但他不再了解机密信息。本文描述并对比了两种解决方案。为满足解决方案交付系统外包的机密信息需求而构建的基础设施,以及对外包后端办公室工作人员屏蔽机密信息的应用程序方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Web-Based Process Portals: Powering Business Process Management within Large Organisations Time-BPMN Process Mining of RFID-Based Supply Chains SARI-SQL: Event Query Language for Event Analysis Decision-Support for Optimizing Supply Chain Formation Based on CSET Model
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1