Use Cases for Identity Management in E-Government
E-government identity management systems aren't usually straightforward to implement. Culture and history strongly affect what might be acceptable to citizens in particular circumstances, with levels of trust being a key factor. The authors discuss these issues and present a use case from New Z...
Gespeichert in:
Veröffentlicht in: | IEEE security & privacy 2008-03, Vol.6 (2), p.51-57 |
---|---|
Hauptverfasser: | , , |
Format: | Magazinearticle |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 57 |
---|---|
container_issue | 2 |
container_start_page | 51 |
container_title | IEEE security & privacy |
container_volume | 6 |
creator | McKenzie, Robin Crompton, Malcolm Wallis, Colin |
description | E-government identity management systems aren't usually straightforward to implement. Culture and history strongly affect what might be acceptable to citizens in particular circumstances, with levels of trust being a key factor. The authors discuss these issues and present a use case from New Zealand. |
doi_str_mv | 10.1109/MSP.2008.51 |
format | Magazinearticle |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_912303506</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4489850</ieee_id><sourcerecordid>1671244541</sourcerecordid><originalsourceid>FETCH-LOGICAL-c313t-8830b97345cfc9db0a7edb7b42b1f5448375e6e413498b2911658430ecd6dcb33</originalsourceid><addsrcrecordid>eNpdkMFLwzAUxoMoOKcnj16KJ0E632uSNjnKmHOwoaA7hyR9lY6t1aQT9t_bMvHg6b0Pfnx8_Bi7Rpgggn5Yvb1OMgA1kXjCRiilSgWI_HT4BaSF1vycXcS4AcgQpRoxXEdKpjZSTKo2JIuSmq7uDsnKNvaDdn1K6iaZpfP2m0Iz5Et2VtltpKvfO2brp9n79DldvswX08dl6jnyLlWKg9MFF9JXXpcObEGlK5zIHFZSCMULSTkJ5EIrl2nEXCrBgXyZl95xPmZ3x97P0H7tKXZmV0dP261tqN1Hg3mBmRCybxiz23_opt2Hpl9nNGYcuIS8h-6PkA9tjIEq8xnqnQ0Hg2AGe6a3ZwZ7Rg6VN0e6JqI_sp-tlQT-A1N5Z9U</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>magazinearticle</recordtype><pqid>912303506</pqid></control><display><type>magazinearticle</type><title>Use Cases for Identity Management in E-Government</title><source>IEEE Electronic Library (IEL)</source><creator>McKenzie, Robin ; Crompton, Malcolm ; Wallis, Colin</creator><creatorcontrib>McKenzie, Robin ; Crompton, Malcolm ; Wallis, Colin</creatorcontrib><description>E-government identity management systems aren't usually straightforward to implement. Culture and history strongly affect what might be acceptable to citizens in particular circumstances, with levels of trust being a key factor. The authors discuss these issues and present a use case from New Zealand.</description><identifier>ISSN: 1540-7993</identifier><identifier>EISSN: 1558-4046</identifier><identifier>DOI: 10.1109/MSP.2008.51</identifier><identifier>CODEN: ISPMCN</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Acceptability ; accountability ; Australia ; authentication ; citizen centric ; citizen control ; Cultural differences ; Culture ; digital identity ; e-government ; Electronic government ; Finance ; History ; Identity management ; identity management system ; Identity management systems ; identity verification ; Information security ; Law enforcement ; Management ; Management systems ; National security ; Privacy ; risk ; SAML ; Security ; single sign on ; Terrorism ; use case ; user centric ; user control</subject><ispartof>IEEE security & privacy, 2008-03, Vol.6 (2), p.51-57</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2008</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c313t-8830b97345cfc9db0a7edb7b42b1f5448375e6e413498b2911658430ecd6dcb33</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4489850$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>780,784,796,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4489850$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>McKenzie, Robin</creatorcontrib><creatorcontrib>Crompton, Malcolm</creatorcontrib><creatorcontrib>Wallis, Colin</creatorcontrib><title>Use Cases for Identity Management in E-Government</title><title>IEEE security & privacy</title><addtitle>SECP-M</addtitle><description>E-government identity management systems aren't usually straightforward to implement. Culture and history strongly affect what might be acceptable to citizens in particular circumstances, with levels of trust being a key factor. The authors discuss these issues and present a use case from New Zealand.</description><subject>Acceptability</subject><subject>accountability</subject><subject>Australia</subject><subject>authentication</subject><subject>citizen centric</subject><subject>citizen control</subject><subject>Cultural differences</subject><subject>Culture</subject><subject>digital identity</subject><subject>e-government</subject><subject>Electronic government</subject><subject>Finance</subject><subject>History</subject><subject>Identity management</subject><subject>identity management system</subject><subject>Identity management systems</subject><subject>identity verification</subject><subject>Information security</subject><subject>Law enforcement</subject><subject>Management</subject><subject>Management systems</subject><subject>National security</subject><subject>Privacy</subject><subject>risk</subject><subject>SAML</subject><subject>Security</subject><subject>single sign on</subject><subject>Terrorism</subject><subject>use case</subject><subject>user centric</subject><subject>user control</subject><issn>1540-7993</issn><issn>1558-4046</issn><fulltext>true</fulltext><rsrctype>magazinearticle</rsrctype><creationdate>2008</creationdate><recordtype>magazinearticle</recordtype><sourceid>RIE</sourceid><recordid>eNpdkMFLwzAUxoMoOKcnj16KJ0E632uSNjnKmHOwoaA7hyR9lY6t1aQT9t_bMvHg6b0Pfnx8_Bi7Rpgggn5Yvb1OMgA1kXjCRiilSgWI_HT4BaSF1vycXcS4AcgQpRoxXEdKpjZSTKo2JIuSmq7uDsnKNvaDdn1K6iaZpfP2m0Iz5Et2VtltpKvfO2brp9n79DldvswX08dl6jnyLlWKg9MFF9JXXpcObEGlK5zIHFZSCMULSTkJ5EIrl2nEXCrBgXyZl95xPmZ3x97P0H7tKXZmV0dP261tqN1Hg3mBmRCybxiz23_opt2Hpl9nNGYcuIS8h-6PkA9tjIEq8xnqnQ0Hg2AGe6a3ZwZ7Rg6VN0e6JqI_sp-tlQT-A1N5Z9U</recordid><startdate>20080301</startdate><enddate>20080301</enddate><creator>McKenzie, Robin</creator><creator>Crompton, Malcolm</creator><creator>Wallis, Colin</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>7SP</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>20080301</creationdate><title>Use Cases for Identity Management in E-Government</title><author>McKenzie, Robin ; Crompton, Malcolm ; Wallis, Colin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c313t-8830b97345cfc9db0a7edb7b42b1f5448375e6e413498b2911658430ecd6dcb33</frbrgroupid><rsrctype>magazinearticle</rsrctype><prefilter>magazinearticle</prefilter><language>eng</language><creationdate>2008</creationdate><topic>Acceptability</topic><topic>accountability</topic><topic>Australia</topic><topic>authentication</topic><topic>citizen centric</topic><topic>citizen control</topic><topic>Cultural differences</topic><topic>Culture</topic><topic>digital identity</topic><topic>e-government</topic><topic>Electronic government</topic><topic>Finance</topic><topic>History</topic><topic>Identity management</topic><topic>identity management system</topic><topic>Identity management systems</topic><topic>identity verification</topic><topic>Information security</topic><topic>Law enforcement</topic><topic>Management</topic><topic>Management systems</topic><topic>National security</topic><topic>Privacy</topic><topic>risk</topic><topic>SAML</topic><topic>Security</topic><topic>single sign on</topic><topic>Terrorism</topic><topic>use case</topic><topic>user centric</topic><topic>user control</topic><toplevel>online_resources</toplevel><creatorcontrib>McKenzie, Robin</creatorcontrib><creatorcontrib>Crompton, Malcolm</creatorcontrib><creatorcontrib>Wallis, Colin</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Electronics & Communications Abstracts</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE security & privacy</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>McKenzie, Robin</au><au>Crompton, Malcolm</au><au>Wallis, Colin</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Use Cases for Identity Management in E-Government</atitle><jtitle>IEEE security & privacy</jtitle><stitle>SECP-M</stitle><date>2008-03-01</date><risdate>2008</risdate><volume>6</volume><issue>2</issue><spage>51</spage><epage>57</epage><pages>51-57</pages><issn>1540-7993</issn><eissn>1558-4046</eissn><coden>ISPMCN</coden><abstract>E-government identity management systems aren't usually straightforward to implement. Culture and history strongly affect what might be acceptable to citizens in particular circumstances, with levels of trust being a key factor. The authors discuss these issues and present a use case from New Zealand.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/MSP.2008.51</doi><tpages>7</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1540-7993 |
ispartof | IEEE security & privacy, 2008-03, Vol.6 (2), p.51-57 |
issn | 1540-7993 1558-4046 |
language | eng |
recordid | cdi_proquest_journals_912303506 |
source | IEEE Electronic Library (IEL) |
subjects | Acceptability accountability Australia authentication citizen centric citizen control Cultural differences Culture digital identity e-government Electronic government Finance History Identity management identity management system Identity management systems identity verification Information security Law enforcement Management Management systems National security Privacy risk SAML Security single sign on Terrorism use case user centric user control |
title | Use Cases for Identity Management in E-Government |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T09%3A19%3A47IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Use%20Cases%20for%20Identity%20Management%20in%20E-Government&rft.jtitle=IEEE%20security%20&%20privacy&rft.au=McKenzie,%20Robin&rft.date=2008-03-01&rft.volume=6&rft.issue=2&rft.spage=51&rft.epage=57&rft.pages=51-57&rft.issn=1540-7993&rft.eissn=1558-4046&rft.coden=ISPMCN&rft_id=info:doi/10.1109/MSP.2008.51&rft_dat=%3Cproquest_RIE%3E1671244541%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=912303506&rft_id=info:pmid/&rft_ieee_id=4489850&rfr_iscdi=true |