Security Aware Development of E-Government Systems

Security Aware Development of E-Government Systems

Daniel Serrano (University of Málaga, Spain), Antonio Maña (University of Málaga, Spain), Gimena Pujol (University of Málaga, Spain), David Donnan (Thales Services – Theresis, France) and Joseph Latanicki (Thales Services – Theresis, France)
DOI: 10.4018/978-1-60566-240-4.ch015
OnDemand PDF Download:


University of Málaga, Spain; University of Málaga, Spain; University of Málaga, Spain; Thales Services – Theresis, France; Thales Services – Theresis, France
Chapter Preview


Electronic government (e-Gov) systems facilitate the interaction between government agencies and other entities (citizens, businesses or even other government agencies) by providing means for the delivery of information and services online via the Internet. Many governmental units across the world have embraced the digital revolution and placed a wide range of materials on the web, from publications to databases. There is a great deal of variation in the services available on national government websites. E-Gov in the information age gives rise to new forms of relationship with government agencies. The public administration is shedding its bureaucratic character and is transforming into an efficient, service-oriented provider of services. However, the unregulated and open nature of the Internet has prompted many to question the privacy and security of government websites and e-services. Several surveys have concluded that these issues are at the top of the list of concerns about e-Gov. Having visible statements outlining what the site is doing regarding privacy and security are valuable assets for reassuring a sceptical population and encouraging citizens to make use of e-Gov services and information, but of course this is not enough. The establishment of robust methods for the development and deployment of secure e-Gov systems is essential for such systems to gain wider acceptance. Other additional characteristics that complicate the development of secure e-Gov systems are their very large scale and the intrinsic heterogeneity (which concerns users, access channels and devices, sensitivity of information and services, etc.). Regarding the IMPRESS users we can distinguish two profiles. Firstly, secure application developers; they profit by use of the improved development process presented as IMPRESS. Secondly, applications users will profit by using more secure and dependable applications; this fact improves users’ trust-perception.

This chapter presents a system development process that is especially well-suited for future multi-channel e-Gov applications. As mentioned, two essential aspects of these systems are their stringent security and privacy requirements and the fact that they serve very large populations of users who use heterogeneous access channels and devices. These characteristics require solutions that are able to adapt themselves to changing environments, which complicates the development process, especially with regards to the provision of security. The development process proposed in this chapter is called IMPRESS (Integrated Mda-based PRocess for Engineering Secure Sytems) Serrano (2007). IMPRESS draws together the areas of software and systems engineering, security engineering, and formal methods for the design and analysis of secure systems. In this manner, formal methods, a cornerstone for rigorous security engineering, is made available within the software engineering process for the average system engineer. Our main goals for the development of IMPRESS was to provide support for software engineers in the specification of their security requirements, the validation of their models against such security requirements, and the integration of proven security solutions in their models. We took into account the characteristics and security requirements of highly sensitive applications such e-Gov ones. This chapter introduces the IMPRESS approach and it presents how secure e-Gov applications can be developed using it. We illustrate the application of the process using an example based on a tax declaration application. The development of e-Gov systems based on our proposal has the advantages of the independence of the work of security experts from the development of the application itself. In this way, software developers can concentrate in the specific functional requirements of their applications. The security requirements will be fulfilled by the integration of proven solutions into their models.

The Secure System Development Based on MDA presented in this chapter, builds on:

  • The Serenity Project results, SerenityProject (2006)

  • The MDA model transformation approach, Soley (2002)

  • The Software Factory approach, Greenfield (2004)

Complete Chapter List

Search this Book:
Editorial Advisory Board
Table of Contents
J. Satyanarayana
Susheel Chhabra, Muneesh Kumar
Susheel Chhabra, Muneesh Kumar
Chapter 1
Hai Thi Thanh Nguyen, Toshio Obi
The incorporation of e-business models into e-government applications is an additional approach in building the citizen-centric strategy. The value... Sample PDF
Government Transformation: The First Step to Integrate E-Business into E-Government
Chapter 2
Vasiliki Moumtzi, Marios Chatzidimitriou, Adamantios Koumpis
Work reported in this chapter relates with work carried out in the context of the European IST Project SemanticGov ( The... Sample PDF
Collaborative E-Gov Networks: The Case of the Semantic-Gov Project
Chapter 3
S. Siddharth, Rajat K. Baisya, Gupta
This case study examines the growth of e-governance in financial treasuries in India and examines the growth of computerization among treasuries... Sample PDF
Treasury Computerization in India: A Case Study
Chapter 4
Petter Gottschalk, Hans Solli-Sæther
Improved interoperability between public organizations as well as between public and private organizations is of critical importance to make... Sample PDF
Interoperability in E-Government: Stages of Growth
Chapter 5
Tagelsir Mohamed Gasmelseid
The adoption of e-government projects is growing both in scale and context across the world. While the implementation of such projects is increasing... Sample PDF
Towards an Organizationally Enabled E-Government Enterprise Architecture
Chapter 6
Tuyen Thanh Nguyen, Donald Elkin Schauder
This chapter explores preconditions for the successful development of e-government in Vietnam, particularly the readiness of the population to... Sample PDF
Understanding Citizens' E-Readiness as a Precondition to Building a Responsive E-Government: A Case Study of Vietnam1
Chapter 7
Kalpana Chauhan, K. B.C. Saxena
Customer Relationship Management (CRM), primarily a concept of the private sector for its multi-benefit approach, is catching up fast in public... Sample PDF
CRM in E-Government: Issues and Challenges
Chapter 8
Susana Berenice Vidrio Barón
Human Computer Interaction is a relatively new field. It has borrowed theories, techniques, and tools from such diverse disciplines such as computer... Sample PDF
Human-Computer Interaction: National Culture and Electronic Government Website Usability
Chapter 9
Shefali Nandan
Successful implementation of e-government programs, policies, and effective service delivery to citizens is faced with many obstacles related to... Sample PDF
E-Government: Good Deliverance through Effective Performance Management
Chapter 10
Jeffrey Roy
The emergence of the Internet has given rise to internal connectivity and external, online delivery as centrepieces of both the public and private... Sample PDF
The Governance of Integrated Service Delivery in Canada: An Examination of Service Canada's New Business Model
Chapter 11
Sangeeta Sharma
The changing economic scenario is redefining the socio-cultural dynamics. The notional domains of conventional concepts are changing and therefore... Sample PDF
Breaking Mind Inertia for Humane Business through E-Governance
Chapter 12
Peter Demediuk, Rolf Solli
Modern society will only reach its potential when citizens individually and collectively are able to use their knowledge and capabilities to shape... Sample PDF
E-Participation in Local Government Decision Making: Swedish and Australian Case Studies
Chapter 13
Pauline Ratnasingam
E-government has gained a lot of attention and public interests of government, technology providers, and researchers. Despite the growing awareness... Sample PDF
The Role of Knowledge Management Security Requirements for E-Government
Chapter 14
Sanjay Nayyar, Vinayshil Gautam, M. P. Gupta
The railroads sector in the developing countries like the other services sectors (i.e. electricity, post, and telegraphs, health, and transport) are... Sample PDF
A Study of Information Systems in Indian Railways with Specific Reference to Konkan Railway Application Package
Chapter 15
Daniel Serrano, Antonio Maña, Gimena Pujol, David Donnan, Joseph Latanicki
University of Málaga, Spain; University of Málaga, Spain; University of Málaga, Spain; Thales Services – Theresis, France; Thales Services –... Sample PDF
Security Aware Development of E-Government Systems
About the Contributors