Improving the Security Levels of e-Government Processes within Public Administration through the Establishment of Improved Security Systems

Kö, Andrea; Molnár, Bálint
June 2009
Journal of Computing & Information Technology;Jun2009, Vol. 17 Issue 2, p141
Academic Journal
Processes that are related to the identification and the authentication of persons and other legal entities have been necessarily existing and functioning for a while in public administration and business. Information Society offers new e-services for citizens and businesses, which dramatically change the administration and results in additional challenges, risks and opportunities. Citizen's confidence and trust in services has to be improved, meanwhile several requirements, like personal data and privacy protection and legal requirements have to be satisfied. The usual business process of identification of the corresponding entity is generally based on some trivial control mechanism, typically password identification. In order to keep the trust of the public in the public administration activities, the process for entity identification (both person and legal entity) should be amended, taking in account the business and security consideration. Identity management solutions show intriguing variation of approaches in Europe, they are at a different maturity level of services. Our paper gives an overview about the most frequently cited identity management architectures (namely: Liberty Alliance Architecture, Sibboleth, Government Gateway Model and Austrian Model) and presents an identity management framework (based on the PKI, but improved it), customized for the Hungarian specialities, which offer possibilities to improve the related services quality. We give an overview about the decisive identity management approaches and we suggest an identity management framework (based on the PKI, but improved it), proposed as a general solution. The concrete example as a case study demonstrates a solution customized for the Hungarian specialities. Our paper shows a solution for the improvement of the identity management in e-government processes through the development of security mechanisms making use of the readily available technologies. The improved business and technology processes are demonstrated through the Hungarian solution to the problem as a case study.


Related Articles

  • O'Toole-Zalud report.  // Security: Solutions for Enterprise Security Leaders;Jul97, Vol. 34 Issue 7, p102 

    Reports on trends and events relevant to the security industry. Avoiding security holes in Internet browsers; Automatic identification technologies; Marketing agreement between Integrated Security Systems Inc. and Hirsch Electronics.

  • It's Okay for Fluffy, but…. Grebb, Michael // Bank Technology News;Jun2006 Supplement, Vol. 19, p15 

    The article discusses the idea of implanting radio frequency identification (RFID) chips under the skin of employees. Florida-based VeriChip believes in the practicality of the said concept and it is currently producing implantable RFID chips for medical purposes. However, the idea has also...

  • Eroding privacy. Lydon, Kerry // Security: Solutions for Enterprise Security Leaders;Jul98, Vol. 35 Issue 7, p46 

    Comments on security technologies' invasion of privacy in the United States. Reality that Americans routinely accept personal privacy infringements for security reasons; Assertion on the need for providing limits in certain areas; Right of people to know where and when they are being monitored;...

  • Smart thinking? Thornton, John // Public Finance;Sep2013, Issue 9, p47 

    The article focuses on how to achieve a balance between ensuring security and respecting privacy rights of individuals. It states that a good employer ensures ethical and legal monitoring by installing security systems that provide protective monitoring without invading on employee privacy. It...

  • Know the legalities of biometrics. Turle, Marcus // Computer Weekly;2/20/2007, p26 

    The article presents the author's comments about the use of biometric identification systems by various companies in Europe. The author says that biometric security technology is becoming widely available. He says that companies using the technology must ensure that they are not breaching the...

  • New Visitor ID Solutions.  // Security: Solutions for Enterprise Security Leaders;Feb2008, Vol. 45 Issue 2, p38 

    The article provides information on the products used to identify and manage visitors. Among the products mentioned by the author include, the PassagePoint enterprise-level visitor management solution of STOPware Inc., Brady People ID and TEMPbadge Solution Packs. According to the author, the...

  • Blunkett targets six million passengers in e-borders pilot. Goodwin, Bill // Computer Weekly;10/5/2004, p1 

    The article reports that the government of Great Britain is going to introduce biometric identification cards. The announcement was made by the home secretary David Blunkett. The pilot scheme will electronically log the movements of six million targeted air passengers as they enter or leave...

  • Hot Biometrics Warms Up to Wireless and Beyond.  // Security: Solutions for Enterprise Security Leaders;Aug2000, Vol. 37 Issue 8, p23 

    Focuses on the integration of biometrics in security applications in the United States. Role of biometrics in the wireless world; Use of biometrics in the physical access market; Projection on the marketability of biometrics; Impact of the technology on the public; Implications of biometrics...

  • Data Hoarder Intervention. DeZabala, Ted // Risk Management (00355593);Mar2010, Vol. 57 Issue 2, p16 

    The author suggests steps to be considered by companies suffering from data problem. In his own experience, the author notes that up to half the information that companies collect and maintain is neither needed or used. He suggests data intervention to address the problem. He notes that many...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics