A Government Framework to Address Identity, Trust and Security in e-Government (53) (original) (raw)
Related papers
Identity and trust are two important elements that surround any service-providing system. They become more critical when such systems operate in distributed environments and deal with sensitive details. This paper explains how a government-trusted digital infrastructure would address both identification and trust requirements and would support the development of citizen-centric government services. The main contribution of the paper is the presentation of a framework adopted by the government of the United Arab Emirates (UAE) that provides a systematic approach to creating a robust information-sharing system within a secure environment. A model is also presented to explain how synergy among institutions is planned to be achieved and how online users would access web-based government services with a single login using a universal smart identity card. Introduction Communication and Internet technologies have transformed the ways that goods and services are produced and delivered today...
The Management of Citizen Identity in Electronic Government
The development of electronic government (eGovernment) systems that enable citizens to transact with governments on-line has brought about a focus on the management of citizen's electronic identity. Identity management (IdM) becomes a key issue in the electronic world where government systems need to prove a citizens' identity in order to provide access to government services. To date, there isn't a standard identity and authentication architecture that governments can easily deploy to support their eGovernment implementations. Citizen users of such systems also need to establish trust and confidence in the on-line service to avoid problems that can arise with phishing or identity theft. Some IdM solutions such as those based on biometrics can not serve all citizens equally and are thus difficult for governments to deploy in a manner which preserves inclusiveness and accessibility of the services. Other issues such as the global mobility of citizens further complicates the issue of remote IdM as citizens may wish to access their respective eGovernment services from any part of the globe. There are clearly many computer security and privacy challenges to creating a globally acceptable solution. In this paper we classify and analyse currently available authentication technologies and their associated risks while presenting key identification and authentication requirements from a government's perspective. Our analysis leads us to suggest specific enhancements to Shared and Federated Authentication System that make impersonation difficult, or impossible.
PKI in Government Digital Identity Management Systems (029)
2012
Despite significant investments in eGovernment, reported experiences show limited and struggling success cases. In the last 15 years, Governments’ efforts have been scattered, as agencies were mainly concerned with the development of informational portals and some basic online services resulting from the automation of a few traditional transactions. In fact, Governments have been cautious in terms of their preferred eGovernment approaches and strategies. A large number of Governments’ services are still provided over the counter and requires the physical presence of citizens. This is in principle due to the fact that existing eGovernment environments lack effective methods through which they can establish trust and avail services over digital networks. This article discusses the need for trust establishment to advance eGovernment in light of the existing and emerging realities. It looks at the evolving forms of identities, namely digital identities and the role of PKI technology in enabling such requirements. The key contribution of this article is that it provides an overview of a large scale national PKI program which was deployed as part of a government identity management infrastructure development scheme in the United Arab Emirates. It provides an insight into the architecture and features of the PKI deployment. It presents how the UAE government planned and set up a national identity validation gateway to support both online and traditional transactions. It also includes some reflections on key management considerations and attempts to make reference to some European initiatives to highlight similarities and differences with the UAE and GCC projects.
The e-Government digital credentials
International Journal of Electronic Governance, 2007
Digital identities, profiles and their management enable online interactions and transactions among people, enterprises, service providers and government institutions. In this paper, after having examined the European identity management policies, we explain the differences between digital identity and digital citizenship and introduce digital credentials. We also discuss how an identity management framework, composed by shared and standardised services supporting authentication procedures, can change within the e-Government domain. The paper concludes by outlining future trends and the potentiality of the extended digital identity in both public and private sectors.
Identity management for e-government services
2008
Identity management systems play a critical role in the field of e-Government and e-Business, as they constitute the basic building blocks enabling secure and reliable access to online services. In this chapter, we highlight the main technical and organizational pitfalls of current approaches to identity management which are either based on a centralized architecture or require adoption of common (technological and organizational) standards.
Reaching Computational Trust: Requirements for Implementing Trusted e-Government
Implementation of e-government requires certain level of transparency and development in order to be successful and trusted. With the improvement of national strategies, regulations and legal framework as a starting point, the competent institutions should take into account security improvements as the most important aspect of achieving trusted e- government. The main goal of achieving the interconnection between different national governmental bodies and services at the transnational level is achieved by exchange of identification and authentication credentials. In this paper the authors introduce the main difficulties the EU countries have in implementing national e-government and achieving the interoperability between e-services.
Building an e-Government e-Trust Infrastructure
American Journal of Applied Sciences, 2006
This paper presents a Trust Model for e-Government implementation. In the first part of the paper, the trust definition from different points of view (psychology, philosophy, linguistic, sociology, and mathematics) was presented. Most people think that to build trust between the government and its customers or citizens, one must start by implementing IT Security and some kinds of Customer Relationship Management (CRM) systems and that will lead to a full customer trust. However, this was not always true; most citizens or customers do not have positive attitudes toward their governments for political reasons, social reasons, and other reasons. The second part of the paper shows the main elements of trust with some examples. The last part discusses the proposed e-Government trust model and shows that trust was a multidimensional issue. Each part was fully integrated with the others in a certain relationship that formulates trust. The main building blocks of trust are: IT security, process automation, policies and procedures, social and culture practices, and legislation. This model represents a suitable guideline for any government who wishes to build or rebuild trust with its customers. It is necessary to use modern technologies to complete the trust architecture.
PKI in Government Identity Management Systems (020)
2011
The purpose of this article is to provide an overview of the PKI project initiated part of the UAE national ID card program. It primarily shows the operational model of the PKI implementation that is indented to integrate the federal government identity management infrastructure with e-government initiatives owners in the country. It also explicates the agreed structure of the major components in relation to key stakeholders; represented by federal and local e-government authorities, financial institutions, and other organizations in both public and private sectors. The content of this article is believed to clarify some of the misconceptions about PKI implementation in national ID schemes, and explain how the project is envisaged to encourage the diffusion of e-government services in the United Arab Emirates. The study concludes that governments in the Middle East region have the trust in PKI technology to support their e-government services and expanding outreach and population trust, if of course accompanied by comprehensive digital laws and policies.
E-government: Aspects of security on different layers
Database and Expert Systems …, 2001
The global IT revolution is growing rapidly. Governments and businesses have to be ready to meet the increased demand of effective and secure online services. Providing secure online services in e-Government requires, however, careful deliberation on different levels and for the distinct domains of e-Government. The first issues on security coming in mind regard of course technical aspects. Here, many concepts and tools have been developed to provide secure transactions, to protect against non-allowed access to information and data, to protect against hacker attacks etc. Yet, security aspects not only regard technical issues. Instead, these need careful investigation from a non technical viewpoint as well. In this contribution, we suggest a holistic concept that integrates security aspects from the strategic level down to the data and information level in order to address different security aspects in a comprehensive way.