Identification and Confidentiality for E-Government View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2003

AUTHORS

Reinhard Posch , Herbert Leitold

ABSTRACT

The omnipresence of personal computers (PCs) and the Internet has encouraged public authorities to provide citizens with means of using information and communication technologies (ICT) to contact the public services. In such e-Government environments security is a major concern. In particular the unequivocal identification of the citizen that requests services from the authorities and the confidentiality of the data that is communicated during the transactions are major concerns.In this paper we describe how the Austrian federal government meets the security challenges that appear when advancing to e-Government. The strategic decisions and organizational structures that have been implemented to achieve coherent solutions are described. The main vehicles employed are electronic signatures and identification based on the citizen registration system. The Austrian citizen card concept that builds an underlying security infrastructure based on smart card technology is presented. The paper discusses how identification is provided with respect to data protection requirements. Regarding confidentiality we describe a model consisting of three security levels to meet the security demands of the different application domains. Moreover a concept is presented that relies upon open interfaces to achieve technology-neutrality and forward-compatibility. An example of an e-Government application is given to illustrate the flexibility of the concepts that have been followed. More... »

PAGES

267-279

Book

TITLE

Certification and Security in E-Services

ISBN

978-1-4757-4737-9
978-0-387-35696-9

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-0-387-35696-9_17

DOI

http://dx.doi.org/10.1007/978-0-387-35696-9_17

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1026529979


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information Systems", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Chief Information Officer (CIO), Republic of Austria", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Chief Information Officer (CIO), Republic of Austria"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Posch", 
        "givenName": "Reinhard", 
        "id": "sg:person.011236005071.18", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011236005071.18"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Secure Information Technology Center, Austria", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Secure Information Technology Center, Austria"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Leitold", 
        "givenName": "Herbert", 
        "id": "sg:person.012516432633.90", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012516432633.90"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2003", 
    "datePublishedReg": "2003-01-01", 
    "description": "The omnipresence of personal computers (PCs) and the Internet has encouraged public authorities to provide citizens with means of using information and communication technologies (ICT) to contact the public services. In such e-Government environments security is a major concern. In particular the unequivocal identification of the citizen that requests services from the authorities and the confidentiality of the data that is communicated during the transactions are major concerns.In this paper we describe how the Austrian federal government meets the security challenges that appear when advancing to e-Government. The strategic decisions and organizational structures that have been implemented to achieve coherent solutions are described. The main vehicles employed are electronic signatures and identification based on the citizen registration system. The Austrian citizen card concept that builds an underlying security infrastructure based on smart card technology is presented. The paper discusses how identification is provided with respect to data protection requirements. Regarding confidentiality we describe a model consisting of three security levels to meet the security demands of the different application domains. Moreover a concept is presented that relies upon open interfaces to achieve technology-neutrality and forward-compatibility. An example of an e-Government application is given to illustrate the flexibility of the concepts that have been followed.", 
    "editor": [
      {
        "familyName": "Nardelli", 
        "givenName": "Enrico", 
        "type": "Person"
      }, 
      {
        "familyName": "Posadziejewski", 
        "givenName": "Sabina", 
        "type": "Person"
      }, 
      {
        "familyName": "Talamo", 
        "givenName": "Maurizio", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-0-387-35696-9_17", 
    "inLanguage": "en", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-1-4757-4737-9", 
        "978-0-387-35696-9"
      ], 
      "name": "Certification and Security in E-Services", 
      "type": "Book"
    }, 
    "keywords": [
      "personal computer", 
      "different application domains", 
      "smart card technology", 
      "data protection requirements", 
      "security infrastructure", 
      "application domains", 
      "open interfaces", 
      "security demands", 
      "card technology", 
      "security level", 
      "government applications", 
      "security challenges", 
      "Austrian federal government", 
      "communication technologies", 
      "electronic signatures", 
      "confidentiality", 
      "protection requirements", 
      "major concern", 
      "strategic decisions", 
      "coherent solution", 
      "services", 
      "technology", 
      "Internet", 
      "computer", 
      "security", 
      "infrastructure", 
      "organizational structure", 
      "transactions", 
      "concept", 
      "public services", 
      "registration system", 
      "requirements", 
      "main vehicle", 
      "information", 
      "flexibility", 
      "interface", 
      "vehicles", 
      "applications", 
      "challenges", 
      "decisions", 
      "system", 
      "omnipresence", 
      "domain", 
      "identification", 
      "demand", 
      "citizens", 
      "public authorities", 
      "solution", 
      "example", 
      "concern", 
      "model", 
      "data", 
      "signatures", 
      "authorities", 
      "means", 
      "government", 
      "respect", 
      "federal government", 
      "structure", 
      "levels", 
      "unequivocal identification", 
      "paper"
    ], 
    "name": "Identification and Confidentiality for E-Government", 
    "pagination": "267-279", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1026529979"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-0-387-35696-9_17"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-0-387-35696-9_17", 
      "https://app.dimensions.ai/details/publication/pub.1026529979"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-05-20T07:43", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220519/entities/gbq_results/chapter/chapter_189.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-0-387-35696-9_17"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35696-9_17'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35696-9_17'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35696-9_17'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35696-9_17'


 

This table displays all metadata directly associated to this object as RDF triples.

141 TRIPLES      23 PREDICATES      88 URIs      81 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-0-387-35696-9_17 schema:about anzsrc-for:08
2 anzsrc-for:0806
3 schema:author N6c7ca23a9e3d413bba318566a7f5c392
4 schema:datePublished 2003
5 schema:datePublishedReg 2003-01-01
6 schema:description The omnipresence of personal computers (PCs) and the Internet has encouraged public authorities to provide citizens with means of using information and communication technologies (ICT) to contact the public services. In such e-Government environments security is a major concern. In particular the unequivocal identification of the citizen that requests services from the authorities and the confidentiality of the data that is communicated during the transactions are major concerns.In this paper we describe how the Austrian federal government meets the security challenges that appear when advancing to e-Government. The strategic decisions and organizational structures that have been implemented to achieve coherent solutions are described. The main vehicles employed are electronic signatures and identification based on the citizen registration system. The Austrian citizen card concept that builds an underlying security infrastructure based on smart card technology is presented. The paper discusses how identification is provided with respect to data protection requirements. Regarding confidentiality we describe a model consisting of three security levels to meet the security demands of the different application domains. Moreover a concept is presented that relies upon open interfaces to achieve technology-neutrality and forward-compatibility. An example of an e-Government application is given to illustrate the flexibility of the concepts that have been followed.
7 schema:editor N5de425b4471b43889e77fe6cbbc0e292
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree true
11 schema:isPartOf Nc2308ef7e18e4659b050d43b06b0a089
12 schema:keywords Austrian federal government
13 Internet
14 application domains
15 applications
16 authorities
17 card technology
18 challenges
19 citizens
20 coherent solution
21 communication technologies
22 computer
23 concept
24 concern
25 confidentiality
26 data
27 data protection requirements
28 decisions
29 demand
30 different application domains
31 domain
32 electronic signatures
33 example
34 federal government
35 flexibility
36 government
37 government applications
38 identification
39 information
40 infrastructure
41 interface
42 levels
43 main vehicle
44 major concern
45 means
46 model
47 omnipresence
48 open interfaces
49 organizational structure
50 paper
51 personal computer
52 protection requirements
53 public authorities
54 public services
55 registration system
56 requirements
57 respect
58 security
59 security challenges
60 security demands
61 security infrastructure
62 security level
63 services
64 signatures
65 smart card technology
66 solution
67 strategic decisions
68 structure
69 system
70 technology
71 transactions
72 unequivocal identification
73 vehicles
74 schema:name Identification and Confidentiality for E-Government
75 schema:pagination 267-279
76 schema:productId N2d3bacf3050044fe867970636bb30434
77 N521a008a88f24c0ca14a2c1509cb8e9b
78 schema:publisher N2f88b384f616423b8321febfd2148609
79 schema:sameAs https://app.dimensions.ai/details/publication/pub.1026529979
80 https://doi.org/10.1007/978-0-387-35696-9_17
81 schema:sdDatePublished 2022-05-20T07:43
82 schema:sdLicense https://scigraph.springernature.com/explorer/license/
83 schema:sdPublisher N0976ebca2f374b25a076c6a8fd89b140
84 schema:url https://doi.org/10.1007/978-0-387-35696-9_17
85 sgo:license sg:explorer/license/
86 sgo:sdDataset chapters
87 rdf:type schema:Chapter
88 N0976ebca2f374b25a076c6a8fd89b140 schema:name Springer Nature - SN SciGraph project
89 rdf:type schema:Organization
90 N2d3bacf3050044fe867970636bb30434 schema:name dimensions_id
91 schema:value pub.1026529979
92 rdf:type schema:PropertyValue
93 N2f88b384f616423b8321febfd2148609 schema:name Springer Nature
94 rdf:type schema:Organisation
95 N521a008a88f24c0ca14a2c1509cb8e9b schema:name doi
96 schema:value 10.1007/978-0-387-35696-9_17
97 rdf:type schema:PropertyValue
98 N5de425b4471b43889e77fe6cbbc0e292 rdf:first Nc2c6b191d3804a238af7292c22af491e
99 rdf:rest Nc238062150a04357a148b61903285fa4
100 N6c7ca23a9e3d413bba318566a7f5c392 rdf:first sg:person.011236005071.18
101 rdf:rest N963fbef8176a4673b65695e05204ad9b
102 N963fbef8176a4673b65695e05204ad9b rdf:first sg:person.012516432633.90
103 rdf:rest rdf:nil
104 Nbd8b616b540e433089c1ee65cc91de6d rdf:first Nd4dc661dc6644c5393a8c1f6791ba651
105 rdf:rest rdf:nil
106 Nc2308ef7e18e4659b050d43b06b0a089 schema:isbn 978-0-387-35696-9
107 978-1-4757-4737-9
108 schema:name Certification and Security in E-Services
109 rdf:type schema:Book
110 Nc238062150a04357a148b61903285fa4 rdf:first Nc8eb5cf848d94526959b1568bb9989b4
111 rdf:rest Nbd8b616b540e433089c1ee65cc91de6d
112 Nc2c6b191d3804a238af7292c22af491e schema:familyName Nardelli
113 schema:givenName Enrico
114 rdf:type schema:Person
115 Nc8eb5cf848d94526959b1568bb9989b4 schema:familyName Posadziejewski
116 schema:givenName Sabina
117 rdf:type schema:Person
118 Nd4dc661dc6644c5393a8c1f6791ba651 schema:familyName Talamo
119 schema:givenName Maurizio
120 rdf:type schema:Person
121 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
122 schema:name Information and Computing Sciences
123 rdf:type schema:DefinedTerm
124 anzsrc-for:0806 schema:inDefinedTermSet anzsrc-for:
125 schema:name Information Systems
126 rdf:type schema:DefinedTerm
127 sg:person.011236005071.18 schema:affiliation grid-institutes:None
128 schema:familyName Posch
129 schema:givenName Reinhard
130 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011236005071.18
131 rdf:type schema:Person
132 sg:person.012516432633.90 schema:affiliation grid-institutes:None
133 schema:familyName Leitold
134 schema:givenName Herbert
135 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012516432633.90
136 rdf:type schema:Person
137 grid-institutes:None schema:alternateName Chief Information Officer (CIO), Republic of Austria
138 Secure Information Technology Center, Austria
139 schema:name Chief Information Officer (CIO), Republic of Austria
140 Secure Information Technology Center, Austria
141 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...