Skip to main content

Security and Privacy Challenges of a Digital Government

  • Chapter
Advances in Digital Government

Part of the book series: Advances in Database Systems ((ADBS,volume 26))

Abstract

A digital government can be viewed as an amalgam of heterogeneous information systems that exchange high-volume information among government agencies and public and private sectors engaged in government business. This gives rise to several daunting multidomain security challenges as well as concern for citizen privacy. The success of a digital government infrastructure depends on how well it meets these challenges and its preparedness against numerous potential threats ranging from simple act of hacking to cyber-terrorism. In this chapter, we outline these crucial security and privacy issues and present various solutions that are available and need to be further investigated.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. S. Ackerman, L. F. Cranor, J. Reagle, “Privacy in e-commerce: examining user scenarios and privacy preferences” Proceedings of the first ACM conference on Electronic commerce, 1999, Pages 1–8.

    Google Scholar 

  2. Y. Alexander, M.S. Swetnam, Cyber Terrorism and Information Warfare I, Assessment of Challenges, Oceana Publisher Inc./Dobbs Ferry, New York, 1999.

    Google Scholar 

  3. E. Bertino, E. Ferrari, V. Atluri, “The Specification and Enforcement of Authorization Constraints in Workflow Management Systems,” ACM Transactions on Information and System Security, Vol. 2, No. 1, Feb. 1999, pp. 65–104.

    Article  Google Scholar 

  4. A. Briney, “Security Focussed”, Information Security Magazine, September, 2000, Pages 40–68.

    Google Scholar 

  5. D. Denning, “Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy”, Internet and International Systems: Information Technology and American Foreign Policy Decisionmaking Workshop, December, 2001.

    Google Scholar 

  6. S. Garfinkel, E. H. Spafford, “Web Security & Commerce,” O’Reilly & Associates, Inc., Sebastapol, CA, 1997.

    Google Scholar 

  7. L. Gong and X. Qian, “Computational Issues in Secure Interoperation”, IEEE Transaction on Software and Engineering, Vol. 22, No. 1, January 1996.

    Google Scholar 

  8. J. Hale, m. Papa, S. Shenoi, “Programmable Security for Object-Oriented Systems”, “Proceedings”, Database Security XII: Status and Prospects, S. Jajodia (eds), Kluwer Academic Publishers, 1998, pp. 109–123.

    Google Scholar 

  9. Q. He, K. Sycara, Z. Su, “A Solution to Open Standard of PKI”, Proceedings of the Third Australian Conference, Eds. —Colin Boyd, Ed Dawson, ACISP’98, Brisbase, Australia, July 13–15, 1998.

    Google Scholar 

  10. H. H. Hosmer, “Metapolicies I”, ACM SIGSAC Data Management Workshop, San Antonio, TX, December, 1991.

    Google Scholar 

  11. “Database Security XII Status and Prospects”, Editor: Sushil Jajodia, IFIP TC1 1 WG11.3 Twelfth International Working Conference on Database Security, July 15–17, 1998, Chalkidiki, Greece.

    Google Scholar 

  12. D. Jonscher, K.R. Dittrich, “Argos —A Configurable Access Control System for Interoperable Environments” Proc. of the IFIP WG 11.3 Ninth Annual Working Conference on Database Security, Rensselaerville, NY, August 1995.

    Google Scholar 

  13. J. B. D. Joshi, W. G. Aref, A. Ghafoor, E. H. Spafford, “Security models for web-based applications”, Communications of the ACM, 44, 2 (Feb. 2001), pages 38–72.

    Article  Google Scholar 

  14. W. E. Kuhnhauser, M. K. Ostrowski, “A Formal Framework to Support Multiple Security Policies”, Proceedings of the 7th Canadian Computer Security Symposium, Ottawa, Canada, May 1995.

    Google Scholar 

  15. S. Osborn, “Database Security Integration using Role-Based Access Control”, IFIP WG11.3 Working Conference on Database Security, Aug. 2000.

    Google Scholar 

  16. R. Power, ““Tangled Web”: Tales of Digital Crime from the Shadows of Cyberspace,” Que/Macmillan Publishing, Aug. 31, 2000.

    Google Scholar 

  17. Proceedings of The Fifth ACM Workshop on Role-based Access Control, Berlin, Germany, July 26–27, 2000

    Google Scholar 

  18. E. D. Shaw, K. G. Ruby, J. M. Post, “The Insider Threat to Information Systems”, Security Awareness Bulletin No. 2-98, published by Department of Defense Security Institute, September 1998.

    Google Scholar 

  19. R. S. Sandhu, E. J. Coyne, H. L. Feinstein, C. E. Youman, “Role-Based Access Control: A Multi-Dimensional View”, Proceedings of the 10th Annual Computer Security Applications Conference, Orlando, FL, December, 5–9, 1994, pages 54–62.

    Google Scholar 

  20. Z. Tari, G. Fernandez, “Security Enforcement in the DOK Federated Database System”, Database Security X: Status and Prospects, P. Samarati, R. Sandhu (eds), Chapman & Hall, 1997, pp. 23–42.

    Google Scholar 

  21. R. K. Thomas, R.S. Sandhu, “Task-based Authorization Controls (TBAC): A family of Models for Active and Enterprise-oriented Authorization management”, Proceedings of the IFIP WG11.3 Workshop on Database Security, Lake Tahoe, California, August 11–13, 1997.

    Google Scholar 

  22. “TV That Watches You: The Prying Eyes of Interactive Television”, A report by Center For Digital Democracy, http://www.democraticmedia.org/privacyreport.pdf, June, 2001.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Kluwer Academic Publishers

About this chapter

Cite this chapter

Joshi, J.B.D., Ghafoor, A., Aref, W.G., Spafford, E.H. (2002). Security and Privacy Challenges of a Digital Government. In: McIver, W.J., Elmagarmid, A.K. (eds) Advances in Digital Government. Advances in Database Systems, vol 26. Springer, Boston, MA. https://doi.org/10.1007/0-306-47374-7_7

Download citation

  • DOI: https://doi.org/10.1007/0-306-47374-7_7

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4020-7067-9

  • Online ISBN: 978-0-306-47374-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics