{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T05:55:48Z","timestamp":1725602148388},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642228773"},{"type":"electronic","value":"9783642228780"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22878-0_30","type":"book-chapter","created":{"date-parts":[[2011,8,24]],"date-time":"2011-08-24T01:15:57Z","timestamp":1314148557000},"page":"355-366","source":"Crossref","is-referenced-by-count":3,"title":["Exploring Information Security Issues in Public Sector Inter-organizational Collaboration"],"prefix":"10.1007","author":[{"given":"Anne Fleur","family":"van Veenstra","sequence":"first","affiliation":[]},{"given":"Marco","family":"Ramilli","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-1-4419-7533-1_10","volume-title":"Practical Studies in E-Government: Best Practices from Around the World","author":"A.F. Veenstra Van","year":"2011","unstructured":"Van Veenstra, A.F., Janssen, M.: Architectural Principles for Orchestration of Cross-Organizational Service Delivery: Case Studies from the Netherlands. In: Assar, S., Boughzala, I., Boydens, I. (eds.) Practical Studies in E-Government: Best Practices from Around the World, pp. 167\u2013185. Springer, New York (2011)"},{"issue":"3","key":"30_CR2","doi-asserted-by":"publisher","first-page":"31","DOI":"10.4018\/jegr.2010070103","volume":"6","author":"K. Dunkerley","year":"2010","unstructured":"Dunkerley, K., Tejay, G.: Theorizing information security success: Towards secure e-Government. International Journal of Electronic Government Research\u00a06(3), 31\u201341 (2010)","journal-title":"International Journal of Electronic Government Research"},{"key":"30_CR3","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/S0963-8687(02)00018-5","volume":"11","author":"F. Belanger","year":"2002","unstructured":"Belanger, F., Hiller, J.S., Smith, W.J.: Trustworthiness in electronic commerce: the role of privacy, security, and site attributes. Journal of Strategic Information Systems\u00a011, 245\u2013270 (2002)","journal-title":"Journal of Strategic Information Systems"},{"issue":"1","key":"30_CR4","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1108\/17506161011028777","volume":"4","author":"L. Carter","year":"2010","unstructured":"Carter, L., McBride, A.: Information privacy concerns and e-government: a research agenda. Transforming Government: People, Process and Policy\u00a04(1), 10\u201313 (2010)","journal-title":"Transforming Government: People, Process and Policy"},{"key":"30_CR5","unstructured":"Rezgui, A., Wen, Z., Bouguettaya, A.: Enforcing Privacy in Interoperable E-Government Applications. In: Proceedings of the 2002 Annual Conference on Digital Government Research (dg.o) (2002)"},{"issue":"2","key":"30_CR6","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1504\/EG.2009.024443","volume":"6","author":"V. Bryl","year":"2009","unstructured":"Bryl, V., Dalpiaz, F., Ferrario, R., Mattioli, A., Villafiorita, A.: Evaluating procedural alternatives: A case study in e-voting. Electronic Government\u00a06(2), 213\u2013231 (2009)","journal-title":"Electronic Government"},{"issue":"5","key":"30_CR7","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1111\/j.1540-6210.2004.00400.x","volume":"64","author":"D.P. Moynihan","year":"2004","unstructured":"Moynihan, D.P.: Building Secure Elections: E-Voting, Security and Systems Theory. Public Administration Review\u00a064(5), 515\u2013528 (2004)","journal-title":"Public Administration Review"},{"key":"30_CR8","unstructured":"Ramilli, M.: Designing A New Electronic Voting System: Towards electronic voting systems. Lambert, Saarbr\u00fccken, Germany (2010)"},{"issue":"3","key":"30_CR9","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1504\/EG.2007.014162","volume":"4","author":"A.D. Smith","year":"2007","unstructured":"Smith, A.D.: Securing e-voting as a legitimate option for e-governance. Electronic Government\u00a04(3), 269\u2013289 (2007)","journal-title":"Electronic Government"},{"key":"30_CR10","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.giq.2009.07.004","volume":"27","author":"J.J. Zhao","year":"2010","unstructured":"Zhao, J.J., Zhao, S.Y.: Opportunities and threats: A security assessment of state e-government websites. Government Information Quarterly\u00a027, 49\u201356 (2010)","journal-title":"Government Information Quarterly"},{"key":"30_CR11","volume-title":"Proceedings of the Third International Workshop on Software Engineering for Secure Systems (SESS 2007)","author":"T. Heyman","year":"2007","unstructured":"Heyman, T., Yskout, K., Scandariato, R., Joosen, W.: An Analysis of the Security Patterns Landscape. In: Proceedings of the Third International Workshop on Software Engineering for Secure Systems (SESS 2007). IEEE Computer Society, Washington, DC (2007)"},{"key":"30_CR12","unstructured":"Araujo, I., Weiss, M.: Linking patterns and non-functional requirements. In: Proceedings of the ninth Conference on Pattern Language of Programs, PLoP (2003)"},{"key":"30_CR13","first-page":"57","volume-title":"Proceedings of the IFIP WG11.3 Working Conference on Database Security VII","author":"E.B. Fernandez","year":"1994","unstructured":"Fernandez, E.B., Wu, J., Fernandez, M.H.: User group structures in object-oriented database authorization. In: Proceedings of the IFIP WG11.3 Working Conference on Database Security VII, pp. 57\u201376. North-Holland Publishing Co., Amsterdam (1994)"},{"key":"30_CR14","unstructured":"Lehtonen, J.P.: A pattern language for key management. In: Proceedings of the eight Conference on Pattern Language of Programs, PLoP (2002)"},{"key":"30_CR15","volume-title":"Pattern-Oriented Software Architecture, Patterns for Concurrent and Networked","author":"D. Schmidt","year":"2000","unstructured":"Schmidt, D., Stal, M., Rohnert, H., Buschmann, F.: Pattern-Oriented Software Architecture, Patterns for Concurrent and Networked, vol.\u00a02. Wiley, Hoboken (2000)"},{"key":"30_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/b11930","volume-title":"Security Engineering with Patterns: Origins, Theoretical Models, and New Applications","author":"M. Schumacher","year":"2003","unstructured":"Schumacher, M.: Security Engineering with Patterns: Origins, Theoretical Models, and New Applications. Springer, New York (2003)"},{"key":"30_CR17","unstructured":"Flanders, E.B.F.: Data lter architecture pattern. In: Proceedings of the fifth Conference on Pattern Language of Programs, PLoP (1999)"},{"key":"30_CR18","unstructured":"Yoder, J., Barcalow, J.: Architectural patterns for enabling application security, Monticello, Illinois, USA (1997)"},{"key":"30_CR19","unstructured":"Braga, A., Rubira, C., Dahab, R.: Tropyc: A pattern language for cryptographic object-oriented software. In: Harrison, N., Foote, B., Rohnert, H. (eds.) Pattern Languages of Program Design, \u00a0ch.16, vol. 4 (1998)"},{"key":"30_CR20","unstructured":"Fern, E.B., Pan, R.: A pattern language for security models. In: Proceedings of the seventh Conference on Pattern Languages of Programs, PloP (2001)"},{"key":"30_CR21","volume-title":"Proceedings of the Third International Workshop on Software Engineering for Secure Systems (SESS 2007)","author":"T. Heyman","year":"2007","unstructured":"Heyman, T., Yskout, K., Scandariato, R., Joosen, W.: An analysis of the security patterns landscape. In: Proceedings of the Third International Workshop on Software Engineering for Secure Systems (SESS 2007), IEEE Computer Society, Washington, DC, USA (2007)"},{"key":"30_CR22","first-page":"325","volume-title":"Proceedings of the IFIP TC11WG11.3, Eleventh International Conference on Database Security XI: Status and Prospects","author":"E.W.G. Pernul","year":"1998","unstructured":"Pernul, E.W.G., Tjoa, A.M.: Access controls by object-oriented concepts. In: Proceedings of the IFIP TC11WG11.3, Eleventh International Conference on Database Security XI: Status and Prospects, pp. 325\u2013340. Chapman & Hall, Ltd, London (1998)"},{"key":"30_CR23","unstructured":"Fern, E.B., Sinibaldi, J.C.: More patterns for operating systems access control. In: Proceedings of the Eight European Conference on Patterns Language of Programming, EuroPLoP (2003)"},{"key":"30_CR24","unstructured":"Kodituwakku, S.R., Bertok, P., Zhao, L.: Aplrac: A pattern language for designing and implementing role-based access control. In: Proceedings of the Sixth European Conference on Pattern Languages of Programs, EuroPLoP (2001)"},{"key":"30_CR25","volume-title":"Proceedings of the Fourth ACM Workshop on Role-based Access Control, RBAC 1999","author":"L. Giuri","year":"1999","unstructured":"Giuri, L.: Role-based access control on the web using java. In: Proceedings of the Fourth ACM Workshop on Role-based Access Control, RBAC 1999. ACM, New York (1999)"},{"key":"30_CR26","volume-title":"Security Patterns: Integrating Security and Systems Engineering","author":"M. Schumacher","year":"2006","unstructured":"Schumacher, M., Fernandez-Buglioni, E., Hybertson, D., Buschmann, F., Sommerland, P.: Security Patterns: Integrating Security and Systems Engineering. John Wiley & Sons, Hoboken (2006)"}],"container-title":["Lecture Notes in Computer Science","Electronic Government"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22878-0_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,31]],"date-time":"2019-03-31T20:52:22Z","timestamp":1554065542000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22878-0_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642228773","9783642228780"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22878-0_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}