IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Open-Source Solution to Secure E-Government Services

Open-Source Solution to Secure E-Government Services
View Sample PDF
Author(s): C. A. Ardagna (Università degli Studi di Milano, Italy)
Copyright: 2007
Pages: 6
Source title: Encyclopedia of Digital Government
Source Author(s)/Editor(s): Ari-Veikko Anttiroiko (University of Tampere, Finland)and Matti Malkia (The Police College of Finland, Finland)
DOI: 10.4018/978-1-59140-789-8.ch197

Purchase

View Open-Source Solution to Secure E-Government Services on the publisher's website for pricing and purchasing information.

Abstract

Nowadays, a global information infrastructure connects remote parties through the use of large scale networks, and many companies focus on developing e-services based on remote resources and on interactions between remote parties. In such a context, e-government (e-gov) systems became of paramount importance for the public administration, and many ongoing development projects are targeted on their implementation, security, and release (Bettini, Jajodia, Sean Wang, & Wijesekera, 2002). For open-source software to play an important role in this scenario, three main technological requirements must be fulfilled: (1) the identification and optimization of de facto standards for building e-gov open-source software components, (2) the adoption of open-source techniques to secure e-gov services and (3) the standard integration of these components into an open-source middleware layer, capable of conveying a completely open-source e-gov solution. This article highlights that e-gov systems should be constructed on an open-source middleware layer, providing full public responsibility in its development. The role of open-source middleware for secure e-gov services deployment is discussed, focusing on implementing a security environment without custom programming. An alternative solution is given and consists of the adoption of a stand-alone architecture that fulfils all security requirements.

Related Content

Serpil Kır Elitaş. © 2023. 11 pages.
Sami Kiraz. © 2023. 14 pages.
Kadir Bendaş. © 2023. 10 pages.
Fatih Değirmenci. © 2023. 15 pages.
Elifnur Terzioğlu. © 2023. 14 pages.
Türker Elitaş. © 2023. 16 pages.
Sudeep Uprety. © 2023. 14 pages.
Body Bottom