Advertisement

Security Aspects within e-Government

  • Sonja Hof
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2739)

Abstract

The aim of e-Government projects is bringing the appropriate services within an authority as close to the citizens as possible. Due to interdisciplinary cooperation the formerly ambitious project “e-Government” has become a fairly well introduced platform. This paper focuses on the security aspects and the different views within e-Government projects towards their relations. The first part presents an overview of the security fields and refines them into their different aspects, while trying to cover the whole range of security within a holistic view. Because of the complexity of security, as it contains diverse aspects that all have to be considered, the second part focuses on the single security area “data protection”, which with its weaknesses and its strengths serves as an example. Data protection regards such diverse issues such as encryption, access rights as well as the corresponding security awareness of the employees handling the data. This also involves the corresponding backup and recovery strategies, as well as the data storage itself.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Wimmer, M., von Bredow, B.: Ein ganzheitliches Sicherheitskonzept für den Bereich von eGovernment. In: Horster, P. (ed.) Enterprise Security. IT Verlag (2002)Google Scholar
  2. 2.
    Kunz, P.: IT Sicherheitsmanagement als Grundlage für erfolgreiches e-Business. In: Horster, P.(ed.) Elektronische Geschäftsprozesse. IT Verlag (2001)Google Scholar
  3. 3.
    Hübner, M.: Sicherheitsarchitekturen für elektronische Geschäftsprozesse. In: Horster, P.(ed.) Elektronische Geschäftsprozesse. IT Verlag (2001)Google Scholar
  4. 4.
    Rohde, M.: IT- Sicherheit als Motor im e-Government. In: Horster, P.(ed.) Elektronische Geschäftsprozesse. IT Verlag (2001)Google Scholar
  5. 5.
    Wapper, S.: Whyless.com Ein neues Sicherheitskonzept. In: Horster, P.(ed.) Enterprise Security. IT Verlag (2002)Google Scholar
  6. 6.
    Wohlmacher, P.: Digitale Signaturen und Sicherheitsinfrstrukturen. IT Verlag (2001)Google Scholar
  7. 7.
    Fuhrberger, K., Häger, D., Wolf, S.: Internetsicherheit, Browser, Firewalls und Verschlüsselung. Hanser Verlag (2001), ISBN 3-446-21725-8Google Scholar
  8. 8.
    Scheier, R.L.: Firewalls still lack multivendor management (2002), searchSecurity.com
  9. 9.
    Schulzki-Haddouti, C.: Automatisch gesichert; Zentral Firmen-E-Mails verschlüsseln und Datenflüsse steuern c’t 25/2003Google Scholar
  10. 10.
    Saarenpää, A., et al.: Data Security and Law. perspectives on the Legal Regulation of Data Security, http://www.urova.fi/home/oiffi/julkaisut/datasec.htm
  11. 11.
    Peter, P., Bernd, B., Petra, W.: Chipkarten als Sicherheitswerkzeug in einem regionalen klinischen Tumorregister. In: Horster, P. (ed.) Chipkarten – Grundlagen, Realisierungen, Sicherheitsaspekte, Anwendungen, pp. 45–58. Vieweg Verlag (1998)Google Scholar
  12. 12.
    Zängerle, P.: Sicherheit ist konstruierbar. IT-Security-Spezial 1/2002Google Scholar
  13. 13.
    Remote Access VPN und IPSec: Höchste Datensicherheit. IT Security 1_02 (2002)Google Scholar
  14. 14.
    Mazzucca, M.: Email Security, pp. 24–30, SC (8/2001)Google Scholar
  15. 15.
    Jak, M.: DigiNotar, e-Government Business Case Study Dual Gate, In: Proc. of ISSE (2002)Google Scholar
  16. 16.
    Schild, R.: Sichere Firmenzugänge über öffentliche Netze durch VPN und PKI- Technologien, in Sicherheit in Informationssystemen, In: Karagiannis, D. (ed.) Proc. SIS 2002 (2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Sonja Hof
    • 1
  1. 1.Institute of Applied Computer Science, Division: Business, Administration and SocietyUniversity of LinzAustria

Personalised recommendations