Inclusive Security Models To Building E-Government Trust

A. Supriyanto, Dwi Agus Diartono, B. Hartono, Herny Februariyanti
{"title":"Inclusive Security Models To Building E-Government Trust","authors":"A. Supriyanto, Dwi Agus Diartono, B. Hartono, Herny Februariyanti","doi":"10.1109/ICICoS48119.2019.8982457","DOIUrl":null,"url":null,"abstract":"The low attention to security and privacy causes some problems on data and information that can lead to a lack of public trust in e-Gov service. Security threats are not only included in technical issues but also non-technical issues and therefore, it needs the implementation of inclusive security. The application of inclusive security to e-Gov needs to develop a model involving security and privacy requirements as a trusted security solution. The method used is the elicitation of security and privacy requirements in a security perspective. Identification is carried out on security and privacy properties, then security and privacy relationships are determined. The next step is developing the design of an inclusive security model on e-Gov. The last step is doing an analysis of e-Gov service activities and the role of inclusive security. The results of this study identified security and privacy requirements for building inclusive security. Identification of security requirements involves properties such as confidentiality (C), integrity (I), availability (A). Meanwhile, privacy requirement involves authentication (Au), authorization (Az), and Non-repudiation (Nr) properties. Furthermore, an inclusive security design model on e-Gov requires trust of internet (ToI) and trust of government (ToG) as an e-Gov service provider. Access control is needed to provide solutions to e-Gov service activities.","PeriodicalId":105407,"journal":{"name":"2019 3rd International Conference on Informatics and Computational Sciences (ICICoS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 3rd International Conference on Informatics and Computational Sciences (ICICoS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICoS48119.2019.8982457","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

The low attention to security and privacy causes some problems on data and information that can lead to a lack of public trust in e-Gov service. Security threats are not only included in technical issues but also non-technical issues and therefore, it needs the implementation of inclusive security. The application of inclusive security to e-Gov needs to develop a model involving security and privacy requirements as a trusted security solution. The method used is the elicitation of security and privacy requirements in a security perspective. Identification is carried out on security and privacy properties, then security and privacy relationships are determined. The next step is developing the design of an inclusive security model on e-Gov. The last step is doing an analysis of e-Gov service activities and the role of inclusive security. The results of this study identified security and privacy requirements for building inclusive security. Identification of security requirements involves properties such as confidentiality (C), integrity (I), availability (A). Meanwhile, privacy requirement involves authentication (Au), authorization (Az), and Non-repudiation (Nr) properties. Furthermore, an inclusive security design model on e-Gov requires trust of internet (ToI) and trust of government (ToG) as an e-Gov service provider. Access control is needed to provide solutions to e-Gov service activities.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
构建电子政务信任的包容性安全模型
对安全和隐私的不重视导致了数据和信息上的一些问题,这些问题可能导致公众对电子政务服务缺乏信任。安全威胁既包括技术问题,也包括非技术问题,因此需要实施包容性安全。将包容性安全应用于电子政务需要开发一个包含安全和隐私要求的模型,作为可信赖的安全解决方案。所使用的方法是从安全角度引出安全和隐私需求。首先对安全和隐私属性进行识别,然后确定安全和隐私关系。下一步是开发电子政务的包容性安全模型的设计。最后一步是对电子政务服务活动和包容性安全的作用进行分析。本研究的结果确定了构建包容性安全的安全和隐私要求。安全需求的识别涉及保密性(C)、完整性(I)、可用性(A)等属性。同时,隐私需求涉及认证(Au)、授权(Az)和不可否认性(Nr)属性。此外,电子政务的包容性安全设计模型需要对互联网(ToI)和政府(ToG)作为电子政务服务提供者的信任。访问控制是为电子政务服务活动提供解决方案所必需的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Analysis of GPGPU-Based Brute-Force and Dictionary Attack on SHA-1 Password Hash Ranking of Game Mechanics for Gamification in Mobile Payment Using AHP-TOPSIS: Uses and Gratification Perspective An Assesment of Knowledge Sharing System: SCeLE Universitas Indonesia Improved Line Operator for Retinal Blood Vessel Segmentation Classification of Abnormality in Chest X-Ray Images by Transfer Learning of CheXNet
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1