2014 First International Conference on eDemocracy &Amp; eGovernment (ICEDEG) 2014
DOI: 10.1109/icedeg.2014.6819952
|View full text |Cite
|
Sign up to set email alerts
|

An authentication and auditing architecture for enhancing security on egovernment services

Abstract: eGovernment deploys governmental information and services for citizens and general society. As the Internet is being used as underlying platform for information exchange, these services are exposed to data tampering and unauthorised access as main threats against citizen privacy. These issues have been usually tackled by applying controls at application level, making authentication stronger and protecting credentials in transit using digital certificates. However, these efforts to enhance security on governmen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 11 publications
0
1
0
Order By: Relevance
“…As stated in IEEE document entitled 'An Authentication and Auditing Architecture for Enhancing Security on eGovernment Services', "…the lack of security at the backend level hinders every effort to find evidence and investigate events related to credential misuse and data tampering". Control measures are wrongly applied at application level, and should be applied at database level instead [7]. It is unlikely that organisations will openly declare that they do not store authentication data to best practise, as doing so poses a grave threat to their user accounts, customer data and system security, not to mention their reputation.…”
Section: Introductionmentioning
confidence: 99%
“…As stated in IEEE document entitled 'An Authentication and Auditing Architecture for Enhancing Security on eGovernment Services', "…the lack of security at the backend level hinders every effort to find evidence and investigate events related to credential misuse and data tampering". Control measures are wrongly applied at application level, and should be applied at database level instead [7]. It is unlikely that organisations will openly declare that they do not store authentication data to best practise, as doing so poses a grave threat to their user accounts, customer data and system security, not to mention their reputation.…”
Section: Introductionmentioning
confidence: 99%