1 / 11

Venue: Bolzano Author(s): Nineta Polemi ( dpolemi@unipi.gr )

eMayor Clustering Event. ICGOV2005 Panel Session: Secure eGovernment Services. Venue: Bolzano Author(s): Nineta Polemi ( dpolemi@unipi.gr ) Organisations: University of Pireus Date: 4/3/05 . Objectives of the session. Share experience Identify barriers / open problems

ratley
Télécharger la présentation

Venue: Bolzano Author(s): Nineta Polemi ( dpolemi@unipi.gr )

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. eMayor Clustering Event ICGOV2005 Panel Session: Secure eGovernment Services Venue: Bolzano Author(s): Nineta Polemi (dpolemi@unipi.gr) Organisations: University of Pireus Date: 4/3/05

  2. Objectives of the session • Share experience • Identify barriers / open problems • Propose research topics / directions • Propose ways to promote national & international collaborations

  3. Organisational Issues • the cross-certification of these entities. This is still an open • Egovernment can not be approached in a unified manner (different requirements for different types of governmental organisations) • Taxonomy of e-government organisations and services (national, pan European), business models • Reengineer and standardize work flows • Development of a new culture for governance in public services, including new mindsets and sets of values, new behaviors.

  4. Security needs should be unified from both users and e-government providers perspectives • Invest in training for the secure use of e-government services • Best practices on successful secure e-government services need to be collected and further exploited.

  5. Technological Issues • /next generation “pre-packaged” user friendly, interoperable, secure, affordable, e/m-government services & identity management systems • XML based browsers for mobile devices, mobile Web Services messaging and security & cryptography on mobile Web Services. Design and development of libraries for mobile Web Services messaging • Design and development of mobile Web Services Security & Cryptography libraries and toolkits. Automated generation and comparison of security and privacy policies. • Quality Assurance of e-government systems, services and architectures need to be exploited (Common Criteria may provide the necessary process)

  6. The development of knowledge representation techniques and methodologies for a multimedia content repository, development of user interface design and management tools meeting the requirements of the information architecture methodology. • Frameworks for combining privacy requirements and e-government processes and services • Evaluation & validation for security architectures • Enhance biometrics in order to cope with new challenges • Tools for implementing and auditing security policies in the governmental sector • Software solutions for provision of anonymity, reference implementations

  7. Common methodologies for management tools of governmental repositories. • User interfaces coping with the local specificities.

  8. Legal/ Policy/Standards • Security, Privacy, Application Policies (for the e-government applications). • Legal validation of IT architectures, services and cross border documents in governmental flows. • Cross-border identity management • Standardisation of work flows, services, XML schemata for e-government, security (OASIS, W3C, NISSG) • Political acceptance

  9. Harmonise standardization efforts in secure e-government services • Standardisation bodies need to collect and consider citizens and e-government providers view points. • Standardisation efforts are needed in the area of privacy, policies, IDS, verification and validation.

  10. E-Mayor Clustering Projects • eMayor • OPRAS • FIDIS • BIOSEC • Intelcities • GUIDE • Secure E-Justice • SELIS

  11. Objectives of Clustering Actions • RoadMap Workshops (update the list of open research themes for secure e-government). Denmark2003 (IST2003), Greece 2004 (ebusiness forum), Italy2005 (TCGOV2005),…. • Collective Standardisation efforts • Collaboration of researchers (not duplication of work)

More Related