Abstract
Developing and deploying authentication and authorization mechanisms and policies to control the flow of sensitive confidential information being shared between multiple organisations during a collaboration already represent technical and legal challenges.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Žic, J. (2014). Challenges in Establishing Trustworthy Collaborations for Timely Responses to Emergency Animal Disease Incidents. In: Holz, T., Ioannidis, S. (eds) Trust and Trustworthy Computing. Trust 2014. Lecture Notes in Computer Science, vol 8564. Springer, Cham. https://doi.org/10.1007/978-3-319-08593-7_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-08593-7_15
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-08592-0
Online ISBN: 978-3-319-08593-7
eBook Packages: Computer ScienceComputer Science (R0)