Identification and Confidentiality for E-Government View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2003

AUTHORS

Reinhard Posch , Herbert Leitold

ABSTRACT

The omnipresence of personal computers (PCs) and the Internet has encouraged public authorities to provide citizens with means of using information and communication technologies (ICT) to contact the public services. In such e-Government environments security is a major concern. In particular the unequivocal identification of the citizen that requests services from the authorities and the confidentiality of the data that is communicated during the transactions are major concerns.In this paper we describe how the Austrian federal government meets the security challenges that appear when advancing to e-Government. The strategic decisions and organizational structures that have been implemented to achieve coherent solutions are described. The main vehicles employed are electronic signatures and identification based on the citizen registration system. The Austrian citizen card concept that builds an underlying security infrastructure based on smart card technology is presented. The paper discusses how identification is provided with respect to data protection requirements. Regarding confidentiality we describe a model consisting of three security levels to meet the security demands of the different application domains. Moreover a concept is presented that relies upon open interfaces to achieve technology-neutrality and forward-compatibility. An example of an e-Government application is given to illustrate the flexibility of the concepts that have been followed. More... »

PAGES

267-279

Book

TITLE

Certification and Security in E-Services

ISBN

978-1-4757-4737-9
978-0-387-35696-9

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-0-387-35696-9_17

DOI

http://dx.doi.org/10.1007/978-0-387-35696-9_17

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1026529979


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information Systems", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Chief Information Officer (CIO), Republic of Austria", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Chief Information Officer (CIO), Republic of Austria"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Posch", 
        "givenName": "Reinhard", 
        "id": "sg:person.011236005071.18", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011236005071.18"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Secure Information Technology Center, Austria", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Secure Information Technology Center, Austria"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Leitold", 
        "givenName": "Herbert", 
        "id": "sg:person.012516432633.90", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012516432633.90"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2003", 
    "datePublishedReg": "2003-01-01", 
    "description": "The omnipresence of personal computers (PCs) and the Internet has encouraged public authorities to provide citizens with means of using information and communication technologies (ICT) to contact the public services. In such e-Government environments security is a major concern. In particular the unequivocal identification of the citizen that requests services from the authorities and the confidentiality of the data that is communicated during the transactions are major concerns.In this paper we describe how the Austrian federal government meets the security challenges that appear when advancing to e-Government. The strategic decisions and organizational structures that have been implemented to achieve coherent solutions are described. The main vehicles employed are electronic signatures and identification based on the citizen registration system. The Austrian citizen card concept that builds an underlying security infrastructure based on smart card technology is presented. The paper discusses how identification is provided with respect to data protection requirements. Regarding confidentiality we describe a model consisting of three security levels to meet the security demands of the different application domains. Moreover a concept is presented that relies upon open interfaces to achieve technology-neutrality and forward-compatibility. An example of an e-Government application is given to illustrate the flexibility of the concepts that have been followed.", 
    "editor": [
      {
        "familyName": "Nardelli", 
        "givenName": "Enrico", 
        "type": "Person"
      }, 
      {
        "familyName": "Posadziejewski", 
        "givenName": "Sabina", 
        "type": "Person"
      }, 
      {
        "familyName": "Talamo", 
        "givenName": "Maurizio", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-0-387-35696-9_17", 
    "inLanguage": "en", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-1-4757-4737-9", 
        "978-0-387-35696-9"
      ], 
      "name": "Certification and Security in E-Services", 
      "type": "Book"
    }, 
    "keywords": [
      "personal computer", 
      "different application domains", 
      "smart card technology", 
      "data protection requirements", 
      "security infrastructure", 
      "application domains", 
      "security demands", 
      "open interfaces", 
      "security level", 
      "card technology", 
      "security challenges", 
      "government applications", 
      "communication technologies", 
      "Austrian federal government", 
      "electronic signatures", 
      "confidentiality", 
      "protection requirements", 
      "major concern", 
      "coherent solution", 
      "strategic decisions", 
      "services", 
      "technology", 
      "Internet", 
      "computer", 
      "security", 
      "infrastructure", 
      "transactions", 
      "concept", 
      "organizational structure", 
      "requirements", 
      "main vehicle", 
      "registration system", 
      "flexibility", 
      "information", 
      "interface", 
      "vehicle", 
      "applications", 
      "public services", 
      "challenges", 
      "system", 
      "domain", 
      "decisions", 
      "omnipresence", 
      "identification", 
      "demand", 
      "example", 
      "solution", 
      "model", 
      "citizens", 
      "concern", 
      "signatures", 
      "data", 
      "public authorities", 
      "authorities", 
      "means", 
      "respect", 
      "government", 
      "federal government", 
      "structure", 
      "levels", 
      "unequivocal identification", 
      "paper", 
      "citizen registration system", 
      "Austrian citizen card concept", 
      "citizen card concept", 
      "card concept"
    ], 
    "name": "Identification and Confidentiality for E-Government", 
    "pagination": "267-279", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1026529979"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-0-387-35696-9_17"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-0-387-35696-9_17", 
      "https://app.dimensions.ai/details/publication/pub.1026529979"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-01-01T19:22", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220101/entities/gbq_results/chapter/chapter_395.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-0-387-35696-9_17"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35696-9_17'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35696-9_17'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35696-9_17'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35696-9_17'


 

This table displays all metadata directly associated to this object as RDF triples.

145 TRIPLES      23 PREDICATES      92 URIs      85 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-0-387-35696-9_17 schema:about anzsrc-for:08
2 anzsrc-for:0806
3 schema:author N7564960d1b0044c28b9f5d9ee44eb34e
4 schema:datePublished 2003
5 schema:datePublishedReg 2003-01-01
6 schema:description The omnipresence of personal computers (PCs) and the Internet has encouraged public authorities to provide citizens with means of using information and communication technologies (ICT) to contact the public services. In such e-Government environments security is a major concern. In particular the unequivocal identification of the citizen that requests services from the authorities and the confidentiality of the data that is communicated during the transactions are major concerns.In this paper we describe how the Austrian federal government meets the security challenges that appear when advancing to e-Government. The strategic decisions and organizational structures that have been implemented to achieve coherent solutions are described. The main vehicles employed are electronic signatures and identification based on the citizen registration system. The Austrian citizen card concept that builds an underlying security infrastructure based on smart card technology is presented. The paper discusses how identification is provided with respect to data protection requirements. Regarding confidentiality we describe a model consisting of three security levels to meet the security demands of the different application domains. Moreover a concept is presented that relies upon open interfaces to achieve technology-neutrality and forward-compatibility. An example of an e-Government application is given to illustrate the flexibility of the concepts that have been followed.
7 schema:editor N87b0ff3faaa8475c80ae3d0cc5e9e148
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree true
11 schema:isPartOf Ncf0232ccd9f14ac982392adb9c62d094
12 schema:keywords Austrian citizen card concept
13 Austrian federal government
14 Internet
15 application domains
16 applications
17 authorities
18 card concept
19 card technology
20 challenges
21 citizen card concept
22 citizen registration system
23 citizens
24 coherent solution
25 communication technologies
26 computer
27 concept
28 concern
29 confidentiality
30 data
31 data protection requirements
32 decisions
33 demand
34 different application domains
35 domain
36 electronic signatures
37 example
38 federal government
39 flexibility
40 government
41 government applications
42 identification
43 information
44 infrastructure
45 interface
46 levels
47 main vehicle
48 major concern
49 means
50 model
51 omnipresence
52 open interfaces
53 organizational structure
54 paper
55 personal computer
56 protection requirements
57 public authorities
58 public services
59 registration system
60 requirements
61 respect
62 security
63 security challenges
64 security demands
65 security infrastructure
66 security level
67 services
68 signatures
69 smart card technology
70 solution
71 strategic decisions
72 structure
73 system
74 technology
75 transactions
76 unequivocal identification
77 vehicle
78 schema:name Identification and Confidentiality for E-Government
79 schema:pagination 267-279
80 schema:productId N3e12c2a970ce4acf9b6fc9b512c92a32
81 N985999ea244e4929ad64fd780f11bbdf
82 schema:publisher N11a097246a1e46fab146624d6c220ada
83 schema:sameAs https://app.dimensions.ai/details/publication/pub.1026529979
84 https://doi.org/10.1007/978-0-387-35696-9_17
85 schema:sdDatePublished 2022-01-01T19:22
86 schema:sdLicense https://scigraph.springernature.com/explorer/license/
87 schema:sdPublisher N58c069b49bf442819db309d1b62b5684
88 schema:url https://doi.org/10.1007/978-0-387-35696-9_17
89 sgo:license sg:explorer/license/
90 sgo:sdDataset chapters
91 rdf:type schema:Chapter
92 N11a097246a1e46fab146624d6c220ada schema:name Springer Nature
93 rdf:type schema:Organisation
94 N2b2165a568d741d19210f273d8cf1675 rdf:first Nbb527ce13e3a4e06bd3c6e5ceafe99b6
95 rdf:rest Na2b3092fdaa34f859d69f5417b3c36f1
96 N3e12c2a970ce4acf9b6fc9b512c92a32 schema:name dimensions_id
97 schema:value pub.1026529979
98 rdf:type schema:PropertyValue
99 N58c069b49bf442819db309d1b62b5684 schema:name Springer Nature - SN SciGraph project
100 rdf:type schema:Organization
101 N5c53bba18b9646b0b8b4028a17cfab8e rdf:first sg:person.012516432633.90
102 rdf:rest rdf:nil
103 N6d672120b1d64bc88e730bb51a76a7f9 schema:familyName Talamo
104 schema:givenName Maurizio
105 rdf:type schema:Person
106 N7564960d1b0044c28b9f5d9ee44eb34e rdf:first sg:person.011236005071.18
107 rdf:rest N5c53bba18b9646b0b8b4028a17cfab8e
108 N87b0ff3faaa8475c80ae3d0cc5e9e148 rdf:first N99637ff885a84caca70eeea22b2d7639
109 rdf:rest N2b2165a568d741d19210f273d8cf1675
110 N985999ea244e4929ad64fd780f11bbdf schema:name doi
111 schema:value 10.1007/978-0-387-35696-9_17
112 rdf:type schema:PropertyValue
113 N99637ff885a84caca70eeea22b2d7639 schema:familyName Nardelli
114 schema:givenName Enrico
115 rdf:type schema:Person
116 Na2b3092fdaa34f859d69f5417b3c36f1 rdf:first N6d672120b1d64bc88e730bb51a76a7f9
117 rdf:rest rdf:nil
118 Nbb527ce13e3a4e06bd3c6e5ceafe99b6 schema:familyName Posadziejewski
119 schema:givenName Sabina
120 rdf:type schema:Person
121 Ncf0232ccd9f14ac982392adb9c62d094 schema:isbn 978-0-387-35696-9
122 978-1-4757-4737-9
123 schema:name Certification and Security in E-Services
124 rdf:type schema:Book
125 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
126 schema:name Information and Computing Sciences
127 rdf:type schema:DefinedTerm
128 anzsrc-for:0806 schema:inDefinedTermSet anzsrc-for:
129 schema:name Information Systems
130 rdf:type schema:DefinedTerm
131 sg:person.011236005071.18 schema:affiliation grid-institutes:None
132 schema:familyName Posch
133 schema:givenName Reinhard
134 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011236005071.18
135 rdf:type schema:Person
136 sg:person.012516432633.90 schema:affiliation grid-institutes:None
137 schema:familyName Leitold
138 schema:givenName Herbert
139 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012516432633.90
140 rdf:type schema:Person
141 grid-institutes:None schema:alternateName Chief Information Officer (CIO), Republic of Austria
142 Secure Information Technology Center, Austria
143 schema:name Chief Information Officer (CIO), Republic of Austria
144 Secure Information Technology Center, Austria
145 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...