A Security-Evaluation Framework for Mobile Cross-Border e-Government Solutions

被引:1
作者
Zefferer, Thomas [1 ]
Pruenster, Bernd [1 ]
Kollmann, Christian [1 ]
Corici, Andreea Ancuta [2 ]
Alber, Lukas [3 ,4 ]
Czerny, Roland [3 ,4 ]
Podgorelec, Blaz [3 ,4 ]
机构
[1] A SIT Plus GmbH, Vienna, Austria
[2] Fraunhofer FOKUS Inst, Berlin, Germany
[3] Graz Univ Technol, Inst Appl Informat Proc & Commun IAIK, Graz, Austria
[4] Secure Informat Technol Ctr Austria A SIT, Graz, Austria
来源
TOGETHER IN THE UNSTABLE WORLD: DIGITAL GOVERNMENT AND SOLIDARITY | 2023年
关键词
Security evaluation; Risk analysis; Risk evaluation; Security; e-Government;
D O I
10.1145/3598469.3598529
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Security evaluation is crucial for any security-critical system. In this context, a system can mean technical systems, organizations, or any other entity with certain security requirements. The major challenge in doing risk analysis is the trade-off between completeness and complexity. When done on a more abstract level, certain risks are potentially overlooked. When done on a very detailed level, risk analyses quickly become complex and exceed available resources. To tackle this challenge, various norms and standards propose different security evaluation methodologies. These methodologies vary depending on their target scope. Also, these standards typically remain on a rather abstract level to ensure broad applicability to different systems. In practice, this often complicates the application of these standards to concrete technical systems. In this paper, we tackle this issue by proposing a customized security-evaluation framework tailored to the special characteristics of cross-border e-government services. The proposed framework does not re-invent the wheel but combines aspects and approaches of established norms and standards to cherry-pick from each standard those aspects most beneficial for the given context. We evaluated the proposed framework by applying it to a set of software building blocks, which have been developed in the Horizon-2020 project mGov4EU and leverage mobile cross-border e-government services in Europe. The conducted evaluation shows that the proposed framework facilitates the practical application of security evaluations in the targeted domain and supports evaluators in handling the trade-off between completeness and complexity.
引用
收藏
页码:536 / 543
页数:8
相关论文
共 32 条
  • [11] Enhancing European Interoperability Frameworks to Leverage Mobile Cross-Border Services in Europe
    Corici, Andreea Ancuta
    Zefferer, Thomas
    Podgorelec, Blaz
    Huehnlein, Detlef
    Cucurull, Jordi
    Graux, Hans
    Dedovic, Stefan
    Romanov, Bogdan
    Schmidt, Carsten
    [J]. PROCEEDINGS OF THE 23RD ANNUAL INTERNATIONAL CONFERENCE ON DIGITAL GOVERNMENT RESEARCH, DGO 2022: Intelligent Technologies, Governments and Citizens, 2022, : 41 - 53
  • [12] Information system security management in the new millennium
    Dhillon, G
    Backhouse, J
    [J]. COMMUNICATIONS OF THE ACM, 2000, 43 (07) : 125 - 128
  • [13] A Systematic Method for Risk-Driven Test Case Design Using Annotated Sequence Diagrams
    Erdogan, Gencer
    Refsdal, Atle
    Stolen, Ketil
    [J]. RISK ASSESSMENT AND RISK-DRIVEN TESTING, RISK 2013, 2014, 8418 : 93 - 108
  • [14] EU, 2016, The EU General Data Protection Regulation (GDPR): A Commentary
  • [15] European Union, 2021, PROP REGULATION EURO
  • [16] European Union, 2014, Regulation (EU) No 910/2014 of the European Parliament and of the Council of 23 July 2014 on Electronic Identification and Trust Services for Electronic Transactions in the Internal Market and Repealing Directive 1999/93/EC
  • [17] European Union, 2018, REG EU 2018 1724 EUR
  • [18] Architectural-level risk analysis using UML
    Goseva-Popstojanova, K
    Hassan, A
    Guedem, A
    Abdelmoez, W
    Nassar, DEM
    Ammar, H
    Mili, A
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2003, 29 (10) : 946 - 960
  • [19] Hassan R. G., 2016, International Journal of Computer Trends and Technology (IJCTT), V36, P1, DOI 10.14445/22312803/IJCTTV36P101
  • [20] Haugen O., 2005, SOFTW SYST MODEL, V4, P355