Abstract
This paper is engaged in research in security, peculiarities and implementations of security requirements within governmental structures. Based on three interaction points (citizen to government C2G, government to government G2G and government to citizen G2C) appropriate examples were chosen, security implementations analyzed and special attributes investigated. It points out some restrictions and difficulties while building up a secure public system.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Hörbe, R.: Portal Verbund: White Paper, 28 (February 2002), http://www.cio.gv.at
DOMEA concept, http://www.kbst.bund.de
General Information on ELAK, www.cio.gv.at/elektronischerAkt/ , or www.elakimbund.at
http://www.isb.admin.ch/internet/gever/business/01160/?lang=de
Reichstädter, P.: E-Signatures for Delivery in E-Government. In: Proc. E-Government 2003, pp. 260–265 (2003)
Reichstädter, P., Hollosi, A.: Model and processes of electronic delivery in E-Government, http://www.cio.gv.at/it-infrastructure/delivery/spec
Albrecht, C.C.: How clean is the Future of SOAP? Com. of the ACM 47(2), 66–68 (2004)
Bayardo, R.J., Srikant, R.: Technological Solution for Protecting Privacy. IEEE Computer, 115–118 (September 2003)
Bhatti, R., Bertino, E., Ghafoor, A., Joshi, J.B.D.: XML-Based Specification for Web Services Document Security. IEEE Computer, 41–49 (April 2004)
King, C.M., Dalton, C.E., Osmanoglu, T.E.: Security Architecture, p. 93. RSA Press (2001)
Vaughan-Nichols, S.J.: XML Raises Concerns as it gains Prominence. IEEE Computer, 14–16 (May 2003)
Kleijnen, S., Raju, S.: An Open Web Service Architecture. ACM Queue 1(1), 40–46 (2003)
Görtz, R., Stolp, J.: Sicherheit effektiv integrieren. in IT-Security 01/02-2002, pp. 20-38
Kahmen, M.: Authentifizierung- Wer braucht sie?, in IT-Security 05/, pp. 18–20 (2002)
Mercuri, R.T.: Analyzing Security Costs. Com. Of the ACM 46(6), 15–18 (2003)
Wang, H., Wang, C.: Taxonomy of Security Considerations and Software Quality. Com. Of the ACM 46(6), 75–78 (2003)
Hart, P.E., Liu, Z.: Trust in the Perservation of Digital Information. Com. Of the ACM 46(6), 93–97 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hof, S., Reichstädter, P. (2004). Securing e-Government. In: Traunmüller, R. (eds) Electronic Government. EGOV 2004. Lecture Notes in Computer Science, vol 3183. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30078-6_56
Download citation
DOI: https://doi.org/10.1007/978-3-540-30078-6_56
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22916-2
Online ISBN: 978-3-540-30078-6
eBook Packages: Springer Book Archive