{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:49:21Z","timestamp":1725536961621},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642035159"},{"type":"electronic","value":"9783642035166"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03516-6_31","type":"book-chapter","created":{"date-parts":[[2009,8,28]],"date-time":"2009-08-28T12:23:58Z","timestamp":1251462238000},"page":"364-375","source":"Crossref","is-referenced-by-count":0,"title":["Role-Based and Service-Oriented Security Management in the E-Government Environment"],"prefix":"10.1007","author":[{"given":"Chien-Chih","family":"Yu","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"31_CR1","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.jsis.2007.12.002","volume":"17","author":"F. Belanger","year":"2008","unstructured":"Belanger, F., Carter, L.: Trust and Risk in e-Government Adoption. Journal of Strategic Information Systems\u00a017(2), 165\u2013176 (2008)","journal-title":"Journal of Strategic Information Systems"},{"key":"31_CR2","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.entcs.2007.01.060","volume":"183","author":"D. Cansell","year":"2007","unstructured":"Cansell, D., Gibson, J.P., Mery, D.: Refinement: A Constructive Approach to Formal Software Design for a Secure e-Voting Interface. Electronic Notes in Theoretical Computer Science\u00a0183, 39\u201355 (2007)","journal-title":"Electronic Notes in Theoretical Computer Science"},{"issue":"5","key":"31_CR3","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1002\/int.20212","volume":"22","author":"E. Chang","year":"2007","unstructured":"Chang, E., Dillon, T.S., Hussain, F.: Trust Ontologies for e-Service Environments. International Journal of Intelligent Systems\u00a022(5), 519\u2013545 (2007)","journal-title":"International Journal of Intelligent Systems"},{"issue":"2","key":"31_CR4","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1057\/palgrave.ejis.3000674","volume":"16","author":"M. Grimsley","year":"2007","unstructured":"Grimsley, M., Meehan, A.: E-government Information Systems: Evaluation-led Design for Public Value and Client Trust. European Journal of Information Systems\u00a016(2), 134\u2013148 (2007)","journal-title":"European Journal of Information Systems"},{"key":"31_CR5","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1002\/int.20206","volume":"22","author":"X. Guo","year":"2007","unstructured":"Guo, X., Lu, J.: Intelligent E-Government Services with Personalized Recommendation Techniques. International Journal of Intelligent Systems\u00a022, 401\u2013417 (2007)","journal-title":"International Journal of Intelligent Systems"},{"issue":"4","key":"31_CR6","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1201\/1086.1065898X\/45528.14.4.20050901\/90087.5","volume":"14","author":"R. Jaamour","year":"2005","unstructured":"Jaamour, R.: Securing Web Services. Information System Security\u00a014(4), 36\u201344 (2005)","journal-title":"Information System Security"},{"issue":"2","key":"31_CR7","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/2.901169","volume":"34","author":"J.B.D. Joshi","year":"2001","unstructured":"Joshi, J.B.D., Ghafoor, A., Aref, W., Spafford, E.H.: Digital Government Security Infrastructure Design Challenges. IEEE Computer\u00a034(2), 66\u201372 (2001)","journal-title":"IEEE Computer"},{"issue":"2","key":"31_CR8","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1016\/j.elerap.2004.09.002","volume":"4","author":"A. Kaliontzoglou","year":"2005","unstructured":"Kaliontzoglou, A., Sklavos, P., Karantjias, T., Polemi, D.: A Secure e-Government Platform Architecture for Small to Medium Sized Public Organizations. Electronic Commerce Research and Applications\u00a04(2), 174\u2013186 (2005)","journal-title":"Electronic Commerce Research and Applications"},{"issue":"7","key":"31_CR9","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1145\/1272516.1272521","volume":"50","author":"S. Kesh","year":"2007","unstructured":"Kesh, S., Ratnasingam, P.: A Knowledge Architecture for IT Security. Communications of the ACM\u00a050(7), 103\u2013108 (2007)","journal-title":"Communications of the ACM"},{"issue":"8","key":"31_CR10","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/1278201.1278202","volume":"30","author":"A. Kobsa","year":"2007","unstructured":"Kobsa, A.: Privacy-enhanced Personalization. Communications of the ACM\u00a030(8), 24\u201333 (2007)","journal-title":"Communications of the ACM"},{"issue":"3","key":"31_CR11","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1016\/j.cose.2006.11.002","volume":"26","author":"B. Ksiezopolski","year":"2007","unstructured":"Ksiezopolski, B., Kotulski, Z.: Adaptable Security Mechanism for Dynamic Environments. Computers & Security\u00a026(3), 246\u2013255 (2007)","journal-title":"Computers & Security"},{"issue":"16","key":"31_CR12","doi-asserted-by":"publisher","first-page":"1873","DOI":"10.1016\/S0140-3664(03)00082-3","volume":"26","author":"C. Lambrinoudakis","year":"2003","unstructured":"Lambrinoudakis, C., Gritzalis, S., Dridi, F., Pernul, G.: Security Requirements for e-Government Services: A Methodological Approach for Developing a Common PKI-based Security Policy. Computer Communications\u00a026(16), 1873\u20131883 (2003)","journal-title":"Computer Communications"},{"issue":"10","key":"31_CR13","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1145\/1089107.1089112","volume":"48","author":"S.M. Lee","year":"2005","unstructured":"Lee, S.M., Tan, X., Trimi, S.: Current Practices of Leading e-Government Countries. Communications of the ACM\u00a048(10), 99\u2013104 (2005)","journal-title":"Communications of the ACM"},{"issue":"2\/3","key":"31_CR14","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1108\/09685220410542570","volume":"12","author":"B.B.L. Lim","year":"2004","unstructured":"Lim, B.B.L., Sun, Y., Vila, J.: Incorporating WS-Security into a Web Service-based Portal. Information Management and Computer Security\u00a012(2\/3), 206\u2013216 (2004)","journal-title":"Information Management and Computer Security"},{"issue":"16","key":"31_CR15","doi-asserted-by":"publisher","first-page":"4679","DOI":"10.1016\/j.comnet.2007.06.010","volume":"51","author":"G.V. Lioudakis","year":"2007","unstructured":"Lioudakis, G.V., et al.: A Middleware Architecture for Privacy Protection. Computer Networks\u00a051(16), 4679\u20134696 (2007)","journal-title":"Computer Networks"},{"issue":"4","key":"31_CR16","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1016\/j.giq.2007.08.004","volume":"24","author":"T.A. Pardo","year":"2007","unstructured":"Pardo, T.A., Tayi, G.K.: Interorganizational Information Integration: A Key Enabler for Digital Government. Government Information Quarterly\u00a024(4), 691\u2013715 (2007)","journal-title":"Government Information Quarterly"},{"issue":"4","key":"31_CR17","first-page":"60","volume":"39","author":"R. Saint-Germain","year":"2005","unstructured":"Saint-Germain, R.: Information Security Management Best Practice Based on ISO\/IEC 17799. The Information Management Journal\u00a039(4), 60\u201366 (2005)","journal-title":"The Information Management Journal"},{"issue":"2","key":"31_CR18","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1201\/1078.10580530\/45925.23.2.20060301\/92671.4","volume":"23","author":"S. Smith","year":"2006","unstructured":"Smith, S., Jamieson, R.: Determining Key Factors in E-Government Information System Security. Information Systems Management\u00a023(2), 23\u201332 (2006)","journal-title":"Information Systems Management"},{"issue":"3","key":"31_CR19","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/S1742-6847(05)70272-X","volume":"2","author":"M. Stibbe","year":"2005","unstructured":"Stibbe, M.: E-Government Security. Infosecurity Today\u00a02(3), 8\u201310 (2005)","journal-title":"Infosecurity Today"},{"issue":"1","key":"31_CR20","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1080\/15536548.2005.10855767","volume":"1","author":"R.S. Swart","year":"2005","unstructured":"Swart, R.S., et al.: Dimensions of Network Security Planning for Web Services. Journal of Information Privacy and Security\u00a01(1), 49\u201366 (2005)","journal-title":"Journal of Information Privacy and Security"},{"issue":"1","key":"31_CR21","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.jaccpubpol.2004.12.003","volume":"24","author":"H. Tanaka","year":"2005","unstructured":"Tanaka, H., Matsuura, K., Sudoh, O.: Vulnerability and Information Security Investment: An Empirical Analysis of e-Local Government in Japan. Journal of Accounting and Public Policy\u00a024(1), 37\u201359 (2005)","journal-title":"Journal of Accounting and Public Policy"},{"unstructured":"United Nations: United Nations e-Government Survey 2008: From e-Government to Connected Governance. United Nations Publication (2008), \n                    \n                      http:\/\/unpan1.un.org\/intradoc\/groups\/public\/documents\/UN\/UNPAN028607.pdf","key":"31_CR22"},{"key":"31_CR23","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1016\/S0167-4048(01)00608-3","volume":"20","author":"B. Solms von","year":"2001","unstructured":"von Solms, B.: Information Security - A Multidimensional Discipline. Computers & Security\u00a020, 504\u2013508 (2001)","journal-title":"Computers & Security"},{"key":"31_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/978-3-540-85204-9_14","volume-title":"Electronic Government","author":"C.C. Yu","year":"2008","unstructured":"Yu, C.C.: Building a Value-Centric e-Government Service Framework Based on a Business Model Perspective. In: Wimmer, M.A., Scholl, H.J., Ferro, E. (eds.) EGOV 2008. LNCS, vol.\u00a05184, pp. 160\u2013171. Springer, Heidelberg (2008)"}],"container-title":["Lecture Notes in Computer Science","Electronic Government"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03516-6_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,25]],"date-time":"2019-01-25T13:05:22Z","timestamp":1548421522000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03516-6_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642035159","9783642035166"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03516-6_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}