Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy

被引:60
作者
Lambrinoudakis, C [1 ]
Gritzalis, S
Dridi, F
Pernul, G
机构
[1] Univ Aegean, Dept Informat & Commun Syst Engn, GR-83200 Samos, Greece
[2] Univ Essen Gesamthsch, Dept Informat Syst, D-45141 Essen, Germany
关键词
e-government; security requirements; public key infrastructure;
D O I
10.1016/S0140-3664(03)00082-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The concept of one-stop on-line government is not science fiction any more. On the contrary, the high reliability and performance of communication links, combined with architectural models that facilitate transparent access to distributed computational and storage resources, propel the development of integrated e-govemment platforms that support increased citizen mobility. The price we have to pay is the complexity introduced in the design of the security mechanisms required for protecting several heterogeneous information systems-each one supporting some of the services offered through the e-govemment integrated environment-and ensuring user privacy. This paper demonstrates that the security services offered by Public Key Infrastructure (PKI) can be employed for fulfilling most of the identified security requirements for an integrated e-government platform. The list of security requirements has been compiled by adopting an organisational framework that facilitates the classification of e-govemment services according to the security requirements they exhibit. The proposed approach has been applied, as a case study, to the e-govemment system 'Webocrat', identifying its security requirements and then designing a PKI-based security architecture for fulfilling them. (C) 2003 Elsevier B.V. All rights reserved.
引用
收藏
页码:1873 / 1883
页数:11
相关论文
共 16 条
[1]  
Denning D., 1998, INTERNET BESIEGED CO
[2]  
DRIDI F, 2001, P EUR C E GOV TRIN C
[3]  
DRIDI F, 2001, P 1 C PROF WISS ERF
[4]   The anatomy of the grid: Enabling scalable virtual organizations [J].
Foster, I ;
Kesselman, C ;
Tuecke, S .
INTERNATIONAL JOURNAL OF HIGH PERFORMANCE COMPUTING APPLICATIONS, 2001, 15 (03) :200-222
[5]  
FOSTER I, 2002, IEEE COMPUTER JUN
[6]  
GRITZALIS S, 2002, P INT C PAR DISTR PR
[7]  
GRITZALIS S, 2000, COMPUTERS SECURITY J, V19
[8]  
IKONOMOPOULOS S, 2002, P IFIP TC11 17 INT C, P507
[9]  
JOSHI J, 2001, IEEE COMPUTER, V34
[10]  
*KEYST PROJ, 1998, KEYSTONE DEL 9 1 FIN