ACM SIGSAC Review - Special issue on Issues '91: data management security and privacy standards
Computational Issues in Secure Interoperation
IEEE Transactions on Software Engineering
Argos—a configurable access control system for interoperable environments
Proceedings of the ninth annual IFIP TC11 WG11.3 working conference on Database security IX : status and prospects: status and prospects
Security enforcement in the DOK federated database system
Proceedings of the tenth annual IFIP TC11/WG11.3 international conference on Database security: volume X : status and prospects: status and prospects
The specification and enforcement of authorization constraints in workflow management systems
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
The NIST model for role-based access control: towards a unified standard
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
A Solution to Open Standard of PKI
ACISP '98 Proceedings of the Third Australasian Conference on Information Security and Privacy
Programmable Security for Object-Oriented Systems
Proceedings of the IFIP TC11 WG 11.3 Twelfth International Working Conference on Database Security XII: Status and Prospects
Role Hierarchies and Constraints for Lattice-Based Access Controls
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
dg.o '00 Proceedings of the 2000 annual national conference on Digital government research
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
ACM fellow profile: Eugene H. Spafford
ACM SIGSOFT Software Engineering Notes
Temporal hierarchies and inheritance semantics for GTRBAC
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Administrative scope and role hierarchy operations
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
A Reference Architecture for the Certification of E-Services in a Digital Government Infrastructure
Distributed and Parallel Databases
Web Document Access Control Using Two-Layered Storage Structures with RBAC Server
EurAsia-ICT '02 Proceedings of the First EurAsian Conference on Information and Communication Technology
Administrative scope: A foundation for role-based administrative models
ACM Transactions on Information and System Security (TISSEC)
Dependencies and separation of duty constraints in GTRBAC
Proceedings of the eighth ACM symposium on Access control models and technologies
Taxonomy of security considerations and software quality
Communications of the ACM - E-services: a cornucopia of digital offerings ushers in the next Net-based evolution
Access-Control Language for Multidomain Environments
IEEE Internet Computing
Enterprise access policy enforcement for applications through hybrid models and XSLT technologies
ICEC '04 Proceedings of the 6th international conference on Electronic commerce
ACM Transactions on Information and System Security (TISSEC)
IEEE Transactions on Dependable and Secure Computing
Secure Interoperation in a Multidomain Environment Employing RBAC Policies
IEEE Transactions on Knowledge and Data Engineering
Fine-grained role-based delegation in presence of the hybrid role hierarchy
Proceedings of the eleventh ACM symposium on Access control models and technologies
Efficient Access Control in Wireless Network
WI-IATW '06 Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology
A simple model and a distributed architecture for realizing one-stop e-government
Electronic Commerce Research and Applications
Formal foundations for hybrid hierarchies in GTRBAC
ACM Transactions on Information and System Security (TISSEC)
GPE4CGSP: interoperability between heterogeneous grid infrastructures
CHINA HPC '07 Proceedings of the 2007 Asian technology information program's (ATIP's) 3rd workshop on High performance computing in China: solution approaches to impediments for high performance computing
Security Violation Detection for RBAC Based Interoperation in Distributed Environment
IEICE - Transactions on Information and Systems
Role-Based and Service-Oriented Security Management in the E-Government Environment
EGOV '09 Proceedings of the 8th International Conference on Electronic Government
Preliminary security specification for New Zealand's igovt system
AISC '09 Proceedings of the Seventh Australasian Conference on Information Security - Volume 98
2010 Information Security Curriculum Development Conference
Proceedings of the 13th Annual International Conference on Digital Government Research
Hi-index | 4.10 |
Designing security systems for a digital government's multidomain environment requires balancing between providing convenient access and monitoring permissions. Information Age technologies provide enormous opportunities for a government to transform its functions into the digital arena. The authors view a digital government as an amalgam of heterogeneous information systems that exchange high-volume information among government agencies and public and private sectors engaged in government business. Several US government agencies have adopted information technologies and spear-headed the search for improved services and decision-making processes. These agencies aim to modernize the government's fragmented service-centric information infrastructure. The accumulating evidence indicates that electronically improving information flow and the decision-making process provides increased efficiency, streamlined functionalities, and more effective use of government resources.