2003
DOI: 10.1016/s0140-3664(03)00082-3
|View full text |Cite
|
Sign up to set email alerts
|

Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
32
0
1

Year Published

2004
2004
2020
2020

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 105 publications
(33 citation statements)
references
References 2 publications
0
32
0
1
Order By: Relevance
“…Vários autores sugerem que há valores democráticos inerentes às TIC empregadas pelo governo, as quais estão transformando as relações Estado--sociedade, pela maior interatividade e ubiquidade (ALONSO; FERNEDA; BIMBER, 2000;CENTER FOR DEMOCRACY AND TECHNOLOGY, 2002;CHADWICK;MAY, 2003;COLEMAN, 1999;DAWES;GREGG;AGOURIS, 2004;EUROPEAN COMMUNITIES, 2003;LUSOLI;WARD, 2005;JAEGER, 2003;KERSTEN, 2003;LAMBRINOUDAKIS et al, 2003;LÉVY, 2004;LÖFSTEDT, 2005;MISURACA, 2009;NATIONAL INFORMATION SOCIETY AGENCY, 2008;PINA;TORRES;ROYO, 2007;REECE, 2006;ROBERTSON;VATRAPU, 2010;STAHL, 2005;STARR, 2010;UNITED NATIONS, 2003;2005a;2005b; Entretanto, enquanto há autores mais otimistas, que vislumbram o retorno à democracia direta, composta por cidadãos fortemente empoderados, há outros, mais pessimistas, que anteveem a emergência da democracia "push-button", com a consequente fragmentação da esfera pública.…”
Section: Lamartine Vieira Braga and Ricardo Corrêa Gomesunclassified
“…Vários autores sugerem que há valores democráticos inerentes às TIC empregadas pelo governo, as quais estão transformando as relações Estado--sociedade, pela maior interatividade e ubiquidade (ALONSO; FERNEDA; BIMBER, 2000;CENTER FOR DEMOCRACY AND TECHNOLOGY, 2002;CHADWICK;MAY, 2003;COLEMAN, 1999;DAWES;GREGG;AGOURIS, 2004;EUROPEAN COMMUNITIES, 2003;LUSOLI;WARD, 2005;JAEGER, 2003;KERSTEN, 2003;LAMBRINOUDAKIS et al, 2003;LÉVY, 2004;LÖFSTEDT, 2005;MISURACA, 2009;NATIONAL INFORMATION SOCIETY AGENCY, 2008;PINA;TORRES;ROYO, 2007;REECE, 2006;ROBERTSON;VATRAPU, 2010;STAHL, 2005;STARR, 2010;UNITED NATIONS, 2003;2005a;2005b; Entretanto, enquanto há autores mais otimistas, que vislumbram o retorno à democracia direta, composta por cidadãos fortemente empoderados, há outros, mais pessimistas, que anteveem a emergência da democracia "push-button", com a consequente fragmentação da esfera pública.…”
Section: Lamartine Vieira Braga and Ricardo Corrêa Gomesunclassified
“…(Liao & Hsiao, 2014) The main security problems in egovernment are confidentiality, information integrity, authentication toward information or copyright protection, non-repudiation, and more. (Lambrinoudakis et al, 2003) ICT based system's security has to provide protection toward the secrecy of the data itself.Security, authentication, and verification must be applied in line with privacy, and the government must ensure on securing the confidentiality of the information. Basically, digital watermarking is a tool to keep the copyright or to authenticate copyright of digital data.…”
Section: Introductionmentioning
confidence: 99%
“…One of the aspects which influence system performance is its security. System security is represented by means of the security attributes [7] which precisely define the system security requirements. Finally, the security requirements are guaranteed by using different types of security measures [5] which are realized by means of cryptographic protocols.…”
Section: Introductionmentioning
confidence: 99%