Skip to main content
  • Book
  • © 2012

Secure ICT Service Provisioning for Cloud, Mobile and Beyond

A Workable Architectural Approach Balancing Between Buyers and Providers

  • Structured solutions and an overview of safety issues
  • Method in order to match expectations and security features
  • Align safety requirements with standards

Part of the book series: Edition <kes> (EDKES)

Buy it now

Buying options

eBook USD 44.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (8 chapters)

  1. Front Matter

    Pages I-XIII
  2. Introduction

    • Wolfgang Behnsen, Eberhard von Faber
    Pages 1-23
  3. Security, assurance and the division of labor

    • Wolfgang Behnsen, Eberhard von Faber
    Pages 25-42
  4. Approach and framework

    • Wolfgang Behnsen, Eberhard von Faber
    Pages 43-60
  5. Main building blocks

    • Wolfgang Behnsen, Eberhard von Faber
    Pages 61-79
  6. ESARIS Security Taxonomy

    • Wolfgang Behnsen, Eberhard von Faber
    Pages 81-114
  7. ICT production and protecting it in practice

    • Wolfgang Behnsen, Eberhard von Faber
    Pages 115-214
  8. Usage of the ICT Security Standards

    • Wolfgang Behnsen, Eberhard von Faber
    Pages 215-230
  9. Rollout process

    • Wolfgang Behnsen, Eberhard von Faber
    Pages 231-245
  10. Back Matter

    Pages 247-284

About this book

This book introduces a reference architecture that enhances the security of services offered in the information and communication technology (ICT) market. It enables customers to compare offerings and to assess risks when using third-party ICT services including cloud computing and mobile services. Service providers are given a comprehensive blueprint for security implementation and maintenance covering service portfolio management, bid phases and realization projects as well as service delivery management. The architecture is completely modular and hierarchical. It contains a security taxonomy organizing all aspects of modern industrialized ICT production. The book also describes a wealth of security measures derived from real-world challenges in ICT production and service management.

Authors and Affiliations

  • , Security Consulting and Engineering, T-Systems GEI GmbH, Bonn, Germany

    Eberhard Faber

  • , Security Management Production, T-Systems International GmbH, München, Germany

    Wolfgang Behnsen

About the authors

Eberhard von Faber has more than 20 years industrial experience in information security. His workspace at T-Systems is Security Strategy and Executive Consulting. He is also professor at Brandenburg University of Applied Science .

Wolfgang Behnsen is Senior Security Manager at T-Systems. He worked in several roles in information security management. He holds several recognized security certificates and is member of diverse associations.

Bibliographic Information

  • Book Title: Secure ICT Service Provisioning for Cloud, Mobile and Beyond

  • Book Subtitle: A Workable Architectural Approach Balancing Between Buyers and Providers

  • Authors: Eberhard Faber, Wolfgang Behnsen

  • Series Title: Edition <kes>

  • DOI: https://doi.org/10.1007/978-3-658-00069-1

  • Publisher: Springer Vieweg Wiesbaden

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer Fachmedien Wiesbaden 2012

  • eBook ISBN: 978-3-658-00069-1Published: 13 December 2012

  • Series ISSN: 2522-0551

  • Series E-ISSN: 2522-056X

  • Edition Number: 1

  • Number of Pages: XIII, 284

  • Number of Illustrations: 94 illustrations in colour

  • Topics: Systems and Data Security, Security, Management of Computing and Information Systems

Buy it now

Buying options

eBook USD 44.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Other ways to access