This paper is engaged in research in security, peculiarities and implementations of security requirements within governmental structures. Based on three interaction points (citizen to government C2G, government to government G2G and government to citizen G2C) appropriate examples were chosen, security implementations analyzed and special attributes investigated. It points out some restrictions and difficulties while building up a secure public system. © Springer-Verlag Berlin Heidelberg 2004.
CITATION STYLE
Hof, S., & Reichstädter, P. (2004). Securing e-Government. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3183, 336–341. https://doi.org/10.1007/978-3-540-30078-6_56
Mendeley helps you to discover research relevant for your work.