E-Government information security in the web environment based on Role Based Access Control technology

被引:0
|
作者
Zeng Zhongping [1 ]
Chen Tao [1 ]
Zhang Yi [1 ]
机构
[1] Huazhong Univ Sci & Technol, Coll Publ Adm, Wuhan 430074, Peoples R China
来源
ISBIM: 2008 INTERNATIONAL SEMINAR ON BUSINESS AND INFORMATION MANAGEMENT, VOL 1 | 2009年
基金
中国国家自然科学基金;
关键词
E-government; information security; role based access control;
D O I
10.1109/ISBIM.2008.246
中图分类号
F [经济];
学科分类号
02 ;
摘要
Information communication technology (ICT) has penetrated the government sector due to their increased functionality, low cost, high reliability and easy-to-use nature. However, in such E-government applications the privacy and security of the transmitted information must be preserved. Also different civil servant involved in the government must have different access privileges to the government information. Today, with the development of E-government projects, more and more government information is stored in government website, office automation system based on the database technology. Meanwhile, E-government projects are engaging in aggregating numerous types of information by interacting with Web services technology. It is necessary to utilize access control technology to improve E-government security. In this paper, we present a framework of role based access control model on the base of E-government construction situation analysis. The framework will provide helpful advice and information for E-government information security plan.
引用
收藏
页码:210 / +
页数:2
相关论文
共 50 条
  • [1] The influence of information security on the adoption of web-based integrated information systems: an e-government study in Peru
    Joo, Jaehun
    Hovav, Anat
    INFORMATION TECHNOLOGY FOR DEVELOPMENT, 2016, 22 (01) : 94 - 116
  • [2] Role-Based and Service-Oriented Security Management in the E-Government Environment
    Yu, Chien-Chih
    ELECTRONIC GOVERNMENT, PROCEEDINGS, 2009, 5693 : 364 - 375
  • [3] Discussions of E-government Affairs Information Security of Based on Cloud
    Zhang, Haicheng
    Zhao, Ting
    Liang, Jun
    2016 3RD INTERNATIONAL CONFERENCE ON ECONOMIC, BUSINESS MANAGEMENT AND EDUCATIONAL INNOVATION (EBMEI 2016), PT 3, 2016, 56 : 391 - 394
  • [4] A Role-Based PMI Security Model for E-Government
    WU Li-jun
    WuhanUniversityJournalofNaturalSciences, 2005, (01) : 329 - 332
  • [5] Role-based PMI security model for E-government
    Wu, Li-Jun
    Su, Kai-Le
    Yang, Zhi-Hua
    Wuhan University Journal of Natural Sciences, 2005, 10 (01) : 329 - 332
  • [6] ON HOW TO STRENGTHEN THE INFORMATION SECURITY OF E-GOVERNMENT
    Liu Wei
    Hu Changlong
    FOURTH INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING (ICCEE 2011), 2011, : 341 - 345
  • [7] Information Security in E-Government: Legal Aspects
    Politanskyi, Viacheslav
    Lukianov, Dmytro
    Ponomarova, Hanna
    Gyliaka, Oleh
    CUESTIONES POLITICAS, 2021, 39 (69): : 361 - 372
  • [8] Research of E-government information portal applications based on grid technology
    Fu, XF
    Peng, D
    Xu, HS
    Lu, YS
    Xiao, ST
    PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOLS 1 AND 2, 2005, : 384 - 389
  • [9] E-Government Information Security Risk Assessment Research
    Lei Ping
    Lei Zhanbo
    2010 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING (MSE 2010), VOL 1, 2010, : 1 - 4
  • [10] Data Mining Applications in E-Government Information Security
    Yuan, Tongwei
    Chen, Peng
    2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING, 2012, 29 : 235 - 240