Skip to main content

Arguments for a Holistic and Open Approach to Secure e-Government

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((volume 2456))

Abstract

Security is widely acknowledged as one of the most important aspect for a successful e-Government implementation ([1], [2], [3]). Every month, new vulnerabilities and attacks are discovered and published. New security standards, patches, “fashionable” abbreviations pop up almost daily. How should a user trust the security and integrity of an e-Government portal in such an environment? This contribution starts with an overview of the technical as well as social aspects of security for an e-Government portal. They are introduced one by one and it is shown how to tackle them by emphasizing their drawbacks as well as their differences to the better-known world of e-Business. The paper finishes with by pointing out the requirements for the next generation e- Government platforms by proposing a simple and uniform approach security in its whole picture.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. J. von Lucke, H. Reinermann. Speyerer Definition von Electronic Government; http://foev.dhv-speyer.de/ruvii

  2. Maria Wimmer and Bianca von Bredow. 2001. E-Government: Aspects of Security on Different Layers. In Proc. of the International Workshop “On the Way to Electronic Government”, IEEE Computer Society Press, Los Alamitos, CA, pp. 350–358

    Google Scholar 

  3. Maria Wimmer and Bianca von Bredow. 2002. A Holistic Approach for Providing Security Solutions in e-Government. In Proc. of the HICSS 35. (ISBN 0-7695-1435-9)

    Google Scholar 

  4. Gerhard Weck. 2001. Zertifikate, Protokolle und Normen, Stolpersteine auf dem Weg zu einer PKI. In Patrick Horster (eds.). Elektronische Geschäftsprozesse, pp. 132–154 (ISBN 3-936052-00-X)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hof, S. (2002). Arguments for a Holistic and Open Approach to Secure e-Government. In: Traunmüller, R., Lenk, K. (eds) Electronic Government. Lecture Notes in Computer Science, vol 2456. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46138-8_75

Download citation

  • DOI: https://doi.org/10.1007/3-540-46138-8_75

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-44121-2

  • Online ISBN: 978-3-540-46138-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics