메뉴 건너뛰기




Volumn 6846 LNCS, Issue , 2011, Pages 355-366

Exploring information security issues in public sector inter-organizational collaboration

Author keywords

e Government; Information Security; Inter Organizational Collaboration; Security Patterns

Indexed keywords

ACCESS POINTS; CONTROL ACCESS; DATA ACCESS; DATA ACCESS CONTROL; DATA CONTROL; E-GOVERNMENT; INTERORGANIZATIONAL COLLABORATION; MULTIPLE ORGANIZATIONS; NETHERLANDS; ORGANIZATIONAL ASPECTS; PUBLIC ORGANIZATIONS; PUBLIC SECTOR; ROLE-BASED ACCESS CONTROL; SECURITY PATTERNS; SERVICE DELIVERY; TECHNICAL SOLUTIONS; E-GOVERNMENTS; EXTENDED ROLE BASED ACCESS CONTROL;

EID: 80052762448     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-22878-0_30     Document Type: Conference Paper
Times cited : (4)

References (26)
  • 1
    • 80052718732 scopus 로고    scopus 로고
    • Architectural Principles for Orchestration of Cross-Organizational Service Delivery: Case Studies from the Netherlands
    • Assar, S., Boughzala, I., Boydens, I. (eds.) Springer, New York
    • Van Veenstra, A.F., Janssen, M.: Architectural Principles for Orchestration of Cross-Organizational Service Delivery: Case Studies from the Netherlands. In: Assar, S., Boughzala, I., Boydens, I. (eds.) Practical Studies in E-Government: Best Practices from Around the World, pp. 167-185. Springer, New York (2011)
    • (2011) Practical Studies in E-Government: Best Practices from Around the World , pp. 167-185
    • Van Veenstra, A.F.1    Janssen, M.2
  • 3
    • 84867973432 scopus 로고    scopus 로고
    • Trustworthiness in electronic commerce: The role of privacy, security, and site attributes
    • Belanger, F., Hiller, J.S., Smith, W.J.: Trustworthiness in electronic commerce: the role of privacy, security, and site attributes. Journal of Strategic Information Systems 11, 245-270 (2002)
    • (2002) Journal of Strategic Information Systems , vol.11 , pp. 245-270
    • Belanger, F.1    Hiller, J.S.2    Smith, W.J.3
  • 7
    • 4644297648 scopus 로고    scopus 로고
    • Building Secure Elections: E-Voting, Security and Systems Theory
    • Moynihan, D.P.: Building Secure Elections: E-Voting, Security and Systems Theory. Public Administration Review 64(5), 515-528 (2004)
    • (2004) Public Administration Review , vol.64 , Issue.5 , pp. 515-528
    • Moynihan, D.P.1
  • 9
    • 34548043205 scopus 로고    scopus 로고
    • Securing e-voting as a legitimate option for e-governance
    • Smith, A.D.: Securing e-voting as a legitimate option for e-governance. Electronic Government 4(3), 269-289 (2007)
    • (2007) Electronic Government , vol.4 , Issue.3 , pp. 269-289
    • Smith, A.D.1
  • 10
    • 70549093057 scopus 로고    scopus 로고
    • Opportunities and threats: A security assessment of state e-government websites
    • Zhao, J.J., Zhao, S.Y.: Opportunities and threats: A security assessment of state e-government websites. Government Information Quarterly 27, 49-56 (2010)
    • (2010) Government Information Quarterly , vol.27 , pp. 49-56
    • Zhao, J.J.1    Zhao, S.Y.2
  • 19
    • 33751006553 scopus 로고    scopus 로고
    • Tropyc: A pattern language for cryptographic object-oriented software
    • Harrison, N., Foote, B., Rohnert, H. (eds.) ch.16
    • Braga, A., Rubira, C., Dahab, R.: Tropyc: A pattern language for cryptographic object-oriented software. In: Harrison, N., Foote, B., Rohnert, H. (eds.) Pattern Languages of Program Design, ch.16, vol. 4 (1998)
    • (1998) Pattern Languages of Program Design , vol.4
    • Braga, A.1    Rubira, C.2    Dahab, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.