Building Innovative Secure and Interoperable e-government Services

2008 ◽  
pp. 228-256
Author(s):  
A. Kaliontzoglou ◽  
T. Karantjias ◽  
D. Polemi

Research into initiatives worldwide shows that although some of the legal and or-ganizational barriers for the adoption of new technologies in e-government have been lifted, there are still not many implementations of actual e-government ser-vices that have been designed based on a common and systematic approach. The prevailing requirements for e-government services, interoperability and security, pose major challenges to e-government architects and it is now being slowly un-derstood that Web services in combination with public key infrastructures may provide the necessary solutions. In this context, this chapter presents three innova-tive e-government services based on these technologies, focusing on their security and interoperability aspects. The goal of the chapter is to demonstrate the ser-vices’ specifications and use cases so that they may act as examples for further re-search and development.

Author(s):  
A. Kaliontzoglou ◽  
T. Karantjias ◽  
D. Polemi

Research into initiatives worldwide shows that although some of the legal and organizational barriers for the adoption of new technologies in e-government have been lifted, there are still not many implementations of actual e-government services that have been designed based on a common and systematic approach. The most prevailing requirements for e-government services, interoperability and security, pose major challenges to e-government architects and it is now being slowly understood that Web Services in combination with Public Key Infrastructures may provide the necessary solutions. In this context, this paper presents three innovative e-government services based on these technologies, fo-cusing on their security and interoperability aspects. The goal of the paper is to demonstrate the services’ specifications and use cases so that they may act as ex-amples for further research and development.


2011 ◽  
pp. 1769-1795
Author(s):  
A. Kaliontzoglou ◽  
T. Karantjias ◽  
D. Polemi

Research into initiatives worldwide shows that although some of the legal and organizational barriers for the adoption of new technologies in e-government have been lifted, there are still not many implementations of actual e-government services that have been designed based on a common and systematic approach. The most prevailing requirements for e-government services, interoperability and security, pose major challenges to e-government architects and it is now being slowly understood that Web Services in combination with Public Key Infrastructures may provide the necessary solutions. In this context, this paper presents three innovative e-government services based on these technologies, fo-cusing on their security and interoperability aspects. The goal of the paper is to demonstrate the services’ specifications and use cases so that they may act as ex-amples for further research and development.


2021 ◽  
Vol 13 (4) ◽  
pp. 2304
Author(s):  
Maria Francesca Milazzo ◽  
Giuseppa Ancione ◽  
Giancarlo Consolo

The European Directive on Safety and Health at Work and the following normatives have the scope to provide high levels of health and safety at work, based on some general principles managing activities and including the risk assessment to continuously improve processes and workplaces. However, the working area changes and brings new risks and challenges for workers. Several of them are associated with new technologies, which determine complex human–machine interactions, leading to an increased mental and emotional strain. To reduce these emerging risks, their understanding and assessment are important. Although great efforts have already been made, there is still a lack of conceptual frameworks for analytically assessing human–machine interaction. This paper proposes a systematic approach that, beyond including the classification in domains to explain the complexity of the human–machine interaction, accounts for the information processing of the human brain. Its validation is shown in a major accident hazard industry where a smart safety device supporting crane related operations is used. The investigation is based on the construction of a questionnaire for the collection of answers about the feeling of crane operators when using the device and the evaluation of the Cronbach’s alpha to measure of the reliability of the assessment.


Author(s):  
Viktor Boiko ◽  
Mykola Vasylenko ◽  
Serhii Kukharenko

The article deals with the issues of establishing cybersecurity in the EU and its member-states at the legislative level as viewed from the point of a systematic approach. The authors identified problematic aspects of improving cybersecurity quality and conditions. They analyzed the impact of the EU member states legislation on cy-bersecurity. The article as well considers the process of ICT development and pre-sents the ways of creating new challenges by means of new technologies. Key words: cybersecurity, cyber resilience, regulatory instruments, EU legislation, innovations.


Author(s):  
Lei Chen ◽  
Wen-Chen Hu ◽  
Ming Yang ◽  
Lei Zhang

E-mail services are the method of sending and receiving electronic messages over communication networks. Web services on the other hand provide a channel of accessing interlinked hypermeida via the World Wide Web. As these two methods of network communications turn into the most popular services over the Internet, applied cryptography and secure authentication protocols become indispensable in securing confidential data over public networks. In this chapter, we first review a number of cryptographic ciphers widely used in secure communication protocols. We then discuss and compare the popular trust system Web of Trust, the certificate standard X.509, and the standard for public key systems Public Key Infrastructure (PKI). Two secure e-mail standards, OpenPGP and S/MIME, are examined and compared. The de facto standard cryptographic protocol for e-commerce, Secure Socket Layer (SSL) / Transport Layer Security (TLS), and XML Security Standards for secure web services are also discussed.


2008 ◽  
pp. 257-297 ◽  
Author(s):  
Asif Akram ◽  
Rob Allen ◽  
Sanjay Chaudhary ◽  
Prateek Jain ◽  
Zakir Laliwala

This chapter presents a ‘Case Study’ based on the distributed market. The requirements of this Grid Business Process are more demanding than any typical business process deployed within a single organization or enterprise. Recently different specifications built on top of Web service standards have originated from the Grid paradigm to address limitations of stateless Web services. These emerging specifications are evaluated in the first part of the chapter to capture requirements of a dynamic business process i.e. Business Process Grid. In second part of the chapter, a case study with different use cases is presented to simulate various scenarios. The abstract discussion and requirements of the case study is followed by the actual implementation. The implementation is meant for the proof-of-concept rather than fully functional application.


Sign in / Sign up

Export Citation Format

Share Document