Inclusive Security Models To Building E-Government Trust
Title | Inclusive Security Models To Building E-Government Trust |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Supriyanto, Aji, Diartono, Dwi Agus, Hartono, Budi, Februariyanti, Herny |
Conference Name | 2019 3rd International Conference on Informatics and Computational Sciences (ICICoS) |
Date Published | Oct. 2019 |
Publisher | IEEE |
ISBN Number | 978-1-7281-4610-2 |
Keywords | Access Control, authentication, authorisation, Authorization, Collaboration, cybersecurity, data privacy, e-gov, E-Government, e-government trust, government data processing, Human Behavior, inclusive security, inclusive security model, Internet, message authentication, nonrepudiation properties, policy-based governance, privacy, privacy properties, privacy relationships, Privacy Requirements, pubcrawl, resilience, Resiliency, security perspective, security requirements, security threats, Trust, trust of government, Trusted Computing, trusted security solution |
Abstract | The low attention to security and privacy causes some problems on data and information that can lead to a lack of public trust in e-Gov service. Security threats are not only included in technical issues but also non-technical issues and therefore, it needs the implementation of inclusive security. The application of inclusive security to e-Gov needs to develop a model involving security and privacy requirements as a trusted security solution. The method used is the elicitation of security and privacy requirements in a security perspective. Identification is carried out on security and privacy properties, then security and privacy relationships are determined. The next step is developing the design of an inclusive security model on e-Gov. The last step is doing an analysis of e-Gov service activities and the role of inclusive security. The results of this study identified security and privacy requirements for building inclusive security. Identification of security requirements involves properties such as confidentiality (C), integrity (I), availability (A). Meanwhile, privacy requirement involves authentication (Au), authorization (Az), and Non-repudiation (Nr) properties. Furthermore, an inclusive security design model on e-Gov requires trust of internet (ToI) and trust of government (ToG) as an e-Gov service provider. Access control is needed to provide solutions to e-Gov service activities. |
URL | https://ieeexplore.ieee.org/document/8982457/ |
DOI | 10.1109/ICICoS48119.2019.8982457 |
Citation Key | supriyanto_inclusive_2019 |
- nonrepudiation properties
- trusted security solution
- Trusted Computing
- trust of government
- trust
- security threats
- security requirements
- security perspective
- Resiliency
- resilience
- pubcrawl
- Privacy Requirements
- privacy relationships
- privacy properties
- privacy
- policy-based governance
- Access Control
- message authentication
- internet
- inclusive security model
- inclusive security
- Human behavior
- government data processing
- e-government trust
- E-Government
- e-gov
- data privacy
- Cybersecurity
- collaboration
- authorization
- authorisation
- authentication