Abstract
The aim of e-Government projects is bringing the appropriate services within an authority as close to the citizens as possible. Due to interdisciplinary cooperation the formerly ambitious project “e-Government” has become a fairly well introduced platform. This paper focuses on the security aspects and the different views within e-Government projects towards their relations. The first part presents an overview of the security fields and refines them into their different aspects, while trying to cover the whole range of security within a holistic view. Because of the complexity of security, as it contains diverse aspects that all have to be considered, the second part focuses on the single security area “data protection”, which with its weaknesses and its strengths serves as an example. Data protection regards such diverse issues such as encryption, access rights as well as the corresponding security awareness of the employees handling the data. This also involves the corresponding backup and recovery strategies, as well as the data storage itself.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Wimmer, M., von Bredow, B.: Ein ganzheitliches Sicherheitskonzept für den Bereich von eGovernment. In: Horster, P. (ed.) Enterprise Security. IT Verlag (2002)
Kunz, P.: IT Sicherheitsmanagement als Grundlage für erfolgreiches e-Business. In: Horster, P.(ed.) Elektronische Geschäftsprozesse. IT Verlag (2001)
Hübner, M.: Sicherheitsarchitekturen für elektronische Geschäftsprozesse. In: Horster, P.(ed.) Elektronische Geschäftsprozesse. IT Verlag (2001)
Rohde, M.: IT- Sicherheit als Motor im e-Government. In: Horster, P.(ed.) Elektronische Geschäftsprozesse. IT Verlag (2001)
Wapper, S.: Whyless.com Ein neues Sicherheitskonzept. In: Horster, P.(ed.) Enterprise Security. IT Verlag (2002)
Wohlmacher, P.: Digitale Signaturen und Sicherheitsinfrstrukturen. IT Verlag (2001)
Fuhrberger, K., Häger, D., Wolf, S.: Internetsicherheit, Browser, Firewalls und Verschlüsselung. Hanser Verlag (2001), ISBN 3-446-21725-8
Scheier, R.L.: Firewalls still lack multivendor management (2002), searchSecurity.com
Schulzki-Haddouti, C.: Automatisch gesichert; Zentral Firmen-E-Mails verschlüsseln und Datenflüsse steuern c’t 25/2003
Saarenpää, A., et al.: Data Security and Law. perspectives on the Legal Regulation of Data Security, http://www.urova.fi/home/oiffi/julkaisut/datasec.htm
Peter, P., Bernd, B., Petra, W.: Chipkarten als Sicherheitswerkzeug in einem regionalen klinischen Tumorregister. In: Horster, P. (ed.) Chipkarten – Grundlagen, Realisierungen, Sicherheitsaspekte, Anwendungen, pp. 45–58. Vieweg Verlag (1998)
Zängerle, P.: Sicherheit ist konstruierbar. IT-Security-Spezial 1/2002
Remote Access VPN und IPSec: Höchste Datensicherheit. IT Security 1_02 (2002)
Mazzucca, M.: Email Security, pp. 24–30, SC (8/2001)
Jak, M.: DigiNotar, e-Government Business Case Study Dual Gate, In: Proc. of ISSE (2002)
Schild, R.: Sichere Firmenzugänge über öffentliche Netze durch VPN und PKI- Technologien, in Sicherheit in Informationssystemen, In: Karagiannis, D. (ed.) Proc. SIS 2002 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hof, S. (2003). Security Aspects within e-Government. In: Traunmüller, R. (eds) Electronic Government. EGOV 2003. Lecture Notes in Computer Science, vol 2739. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10929179_48
Download citation
DOI: https://doi.org/10.1007/10929179_48
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40845-1
Online ISBN: 978-3-540-45239-3
eBook Packages: Springer Book Archive