Securing e-Government

7Citations
Citations of this article
301Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper is engaged in research in security, peculiarities and implementations of security requirements within governmental structures. Based on three interaction points (citizen to government C2G, government to government G2G and government to citizen G2C) appropriate examples were chosen, security implementations analyzed and special attributes investigated. It points out some restrictions and difficulties while building up a secure public system. © Springer-Verlag Berlin Heidelberg 2004.

Cite

CITATION STYLE

APA

Hof, S., & Reichstädter, P. (2004). Securing e-Government. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3183, 336–341. https://doi.org/10.1007/978-3-540-30078-6_56

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free