E-Government information security in the web environment based on Role Based Access Control technology

被引:0
|
作者
Zeng Zhongping [1 ]
Chen Tao [1 ]
Zhang Yi [1 ]
机构
[1] Huazhong Univ Sci & Technol, Coll Publ Adm, Wuhan 430074, Peoples R China
基金
中国国家自然科学基金;
关键词
E-government; information security; role based access control;
D O I
10.1109/ISBIM.2008.246
中图分类号
F [经济];
学科分类号
02 ;
摘要
Information communication technology (ICT) has penetrated the government sector due to their increased functionality, low cost, high reliability and easy-to-use nature. However, in such E-government applications the privacy and security of the transmitted information must be preserved. Also different civil servant involved in the government must have different access privileges to the government information. Today, with the development of E-government projects, more and more government information is stored in government website, office automation system based on the database technology. Meanwhile, E-government projects are engaging in aggregating numerous types of information by interacting with Web services technology. It is necessary to utilize access control technology to improve E-government security. In this paper, we present a framework of role based access control model on the base of E-government construction situation analysis. The framework will provide helpful advice and information for E-government information security plan.
引用
收藏
页码:210 / +
页数:2
相关论文
共 50 条
  • [21] The Impact of Privacy and Security Concerns, Trust in Technology and Information Quality on Trust in E-Government and Intention to Use E-Government
    Mohajerani, Somayeh
    Shahrekordi, Sharareh Zarean
    Azarlo, Mitra
    2015 9TH INTERNATIONAL CONFERENCE ON E-COMMERCE IN DEVELOPING COUNTRIES: WITH FOCUS ON E-BUSINESS (ECDC), 2015,
  • [22] E-Government Web services and Security of Personally Identifiable Information in Developing Nations
    Adedayo, Love
    Butakov, Sergey
    Ruhl, Ron
    Lindskog, Dale
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 623 - 629
  • [23] The e-government information model based on GPR
    Li, Zhigang
    Yang, Fengyue
    PROMOTING BUSINESS ANALYTICS AND QUANTITATIVE MANAGEMENT OF TECHNOLOGY: 4TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND QUANTITATIVE MANAGEMENT (ITQM 2016), 2016, 91 : 193 - 200
  • [24] Information security evaluation of e-government systems
    Cheng, Xiaorong
    Li, Mei
    Zhao, Huilan
    DCABES 2007 Proceedings, Vols I and II, 2007, : 532 - 535
  • [25] A CA-based security e-government system
    Cong, Shiquan
    Fang, Zhiyi
    Zhang, Chao
    Liu, Xiaonan
    Zhang, Yingrui
    2006 10TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, PROCEEDINGS, VOLS 1 AND 2, 2006, : 941 - 945
  • [26] ON HOW TO STRENGTHEN THE INFORMATION SECURITY OF E-GOVERNMENT
    Liu Wei
    Hu Changlong
    FOURTH INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING (ICCEE 2011), 2011, : 341 - 345
  • [27] Information Security in E-Government: Legal Aspects
    Politanskyi, Viacheslav
    Lukianov, Dmytro
    Ponomarova, Hanna
    Gyliaka, Oleh
    CUESTIONES POLITICAS, 2021, 39 (69): : 361 - 372
  • [28] Constructing Intranet for the security E-government based on ArcIMS
    Lai, Jiajun
    Xu, Yang
    Li, Yuhong
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2006, 13 : 36 - 40
  • [29] An enfrastructure for e-government based on semantic web services
    Lu, LM
    Zhu, GJ
    Chen, JX
    2004 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, 2004, : 483 - 486
  • [30] Designing a system for E-government based on web services
    Han, Hai-bin
    Kong, Zao-jie
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON PUBLIC ADMINISTRATION (3RD), VOL I, 2007, : 541 - 545