Skip to main content

Securing e-Government

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3183))

Abstract

This paper is engaged in research in security, peculiarities and implementations of security requirements within governmental structures. Based on three interaction points (citizen to government C2G, government to government G2G and government to citizen G2C) appropriate examples were chosen, security implementations analyzed and special attributes investigated. It points out some restrictions and difficulties while building up a secure public system.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hörbe, R.: Portal Verbund: White Paper, 28 (February 2002), http://www.cio.gv.at

  2. DOMEA concept, http://www.kbst.bund.de

  3. General Information on ELAK, www.cio.gv.at/elektronischerAkt/ , or www.elakimbund.at

  4. http://www.isb.admin.ch/internet/gever/business/01160/?lang=de

  5. http://www.cio.gv.at/it-infrastructure/delivery

  6. Reichstädter, P.: E-Signatures for Delivery in E-Government. In: Proc. E-Government 2003, pp. 260–265 (2003)

    Google Scholar 

  7. Reichstädter, P., Hollosi, A.: Model and processes of electronic delivery in E-Government, http://www.cio.gv.at/it-infrastructure/delivery/spec

  8. Albrecht, C.C.: How clean is the Future of SOAP? Com. of the ACM 47(2), 66–68 (2004)

    Article  Google Scholar 

  9. Bayardo, R.J., Srikant, R.: Technological Solution for Protecting Privacy. IEEE Computer, 115–118 (September 2003)

    Google Scholar 

  10. Bhatti, R., Bertino, E., Ghafoor, A., Joshi, J.B.D.: XML-Based Specification for Web Services Document Security. IEEE Computer, 41–49 (April 2004)

    Google Scholar 

  11. King, C.M., Dalton, C.E., Osmanoglu, T.E.: Security Architecture, p. 93. RSA Press (2001)

    Google Scholar 

  12. Vaughan-Nichols, S.J.: XML Raises Concerns as it gains Prominence. IEEE Computer, 14–16 (May 2003)

    Google Scholar 

  13. Kleijnen, S., Raju, S.: An Open Web Service Architecture. ACM Queue 1(1), 40–46 (2003)

    Article  Google Scholar 

  14. Görtz, R., Stolp, J.: Sicherheit effektiv integrieren. in IT-Security 01/02-2002, pp. 20-38

    Google Scholar 

  15. Kahmen, M.: Authentifizierung- Wer braucht sie?, in IT-Security 05/, pp. 18–20 (2002)

    Google Scholar 

  16. Mercuri, R.T.: Analyzing Security Costs. Com. Of the ACM 46(6), 15–18 (2003)

    Article  Google Scholar 

  17. Wang, H., Wang, C.: Taxonomy of Security Considerations and Software Quality. Com. Of the ACM 46(6), 75–78 (2003)

    Article  Google Scholar 

  18. Hart, P.E., Liu, Z.: Trust in the Perservation of Digital Information. Com. Of the ACM 46(6), 93–97 (2003)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hof, S., Reichstädter, P. (2004). Securing e-Government. In: Traunmüller, R. (eds) Electronic Government. EGOV 2004. Lecture Notes in Computer Science, vol 3183. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30078-6_56

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30078-6_56

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22916-2

  • Online ISBN: 978-3-540-30078-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics