Skip to main content

Security Aspects within e-Government

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2739))

Abstract

The aim of e-Government projects is bringing the appropriate services within an authority as close to the citizens as possible. Due to interdisciplinary cooperation the formerly ambitious project “e-Government” has become a fairly well introduced platform. This paper focuses on the security aspects and the different views within e-Government projects towards their relations. The first part presents an overview of the security fields and refines them into their different aspects, while trying to cover the whole range of security within a holistic view. Because of the complexity of security, as it contains diverse aspects that all have to be considered, the second part focuses on the single security area “data protection”, which with its weaknesses and its strengths serves as an example. Data protection regards such diverse issues such as encryption, access rights as well as the corresponding security awareness of the employees handling the data. This also involves the corresponding backup and recovery strategies, as well as the data storage itself.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wimmer, M., von Bredow, B.: Ein ganzheitliches Sicherheitskonzept für den Bereich von eGovernment. In: Horster, P. (ed.) Enterprise Security. IT Verlag (2002)

    Google Scholar 

  2. Kunz, P.: IT Sicherheitsmanagement als Grundlage für erfolgreiches e-Business. In: Horster, P.(ed.) Elektronische Geschäftsprozesse. IT Verlag (2001)

    Google Scholar 

  3. Hübner, M.: Sicherheitsarchitekturen für elektronische Geschäftsprozesse. In: Horster, P.(ed.) Elektronische Geschäftsprozesse. IT Verlag (2001)

    Google Scholar 

  4. Rohde, M.: IT- Sicherheit als Motor im e-Government. In: Horster, P.(ed.) Elektronische Geschäftsprozesse. IT Verlag (2001)

    Google Scholar 

  5. Wapper, S.: Whyless.com Ein neues Sicherheitskonzept. In: Horster, P.(ed.) Enterprise Security. IT Verlag (2002)

    Google Scholar 

  6. Wohlmacher, P.: Digitale Signaturen und Sicherheitsinfrstrukturen. IT Verlag (2001)

    Google Scholar 

  7. Fuhrberger, K., Häger, D., Wolf, S.: Internetsicherheit, Browser, Firewalls und Verschlüsselung. Hanser Verlag (2001), ISBN 3-446-21725-8

    Google Scholar 

  8. Scheier, R.L.: Firewalls still lack multivendor management (2002), searchSecurity.com

  9. Schulzki-Haddouti, C.: Automatisch gesichert; Zentral Firmen-E-Mails verschlüsseln und Datenflüsse steuern c’t 25/2003

    Google Scholar 

  10. Saarenpää, A., et al.: Data Security and Law. perspectives on the Legal Regulation of Data Security, http://www.urova.fi/home/oiffi/julkaisut/datasec.htm

  11. Peter, P., Bernd, B., Petra, W.: Chipkarten als Sicherheitswerkzeug in einem regionalen klinischen Tumorregister. In: Horster, P. (ed.) Chipkarten – Grundlagen, Realisierungen, Sicherheitsaspekte, Anwendungen, pp. 45–58. Vieweg Verlag (1998)

    Google Scholar 

  12. Zängerle, P.: Sicherheit ist konstruierbar. IT-Security-Spezial 1/2002

    Google Scholar 

  13. Remote Access VPN und IPSec: Höchste Datensicherheit. IT Security 1_02 (2002)

    Google Scholar 

  14. Mazzucca, M.: Email Security, pp. 24–30, SC (8/2001)

    Google Scholar 

  15. Jak, M.: DigiNotar, e-Government Business Case Study Dual Gate, In: Proc. of ISSE (2002)

    Google Scholar 

  16. Schild, R.: Sichere Firmenzugänge über öffentliche Netze durch VPN und PKI- Technologien, in Sicherheit in Informationssystemen, In: Karagiannis, D. (ed.) Proc. SIS 2002 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hof, S. (2003). Security Aspects within e-Government. In: Traunmüller, R. (eds) Electronic Government. EGOV 2003. Lecture Notes in Computer Science, vol 2739. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10929179_48

Download citation

  • DOI: https://doi.org/10.1007/10929179_48

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40845-1

  • Online ISBN: 978-3-540-45239-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics