Abstract
The next generation e-Government will be based on Future Internet applications, which can be dynamically composed of complex services, by utilising the mass data being made available in heterogeneous online archives and information sources. Such data can be synthesised as the outcome of a plethora of atomic services, which process and collaboratively handle digital information to facilitate the current business needs of the Public Administration. However, the providers of public services face the problem of maintaining security and preserving data privacy, when integrating this data into dynamically changing composite service environments. In that respect, this chapter presents the application of the design time and runtime capabilities of the Aniketos platform to support the whole data driven secure service development life cycle and ensure trust in service compositions, which can be consumed in value-added public service delivery processes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Meland, P.H., Guerenabarrena, J.B., Llewellyn-Jones, D.: The challenges of secure and trustworthy service composition in the Future Internet. In: Proceeding of 2011 6th International Conference on System of Systems Engineering (SoSE). IEEE Computer Society (2011)
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal L 281, 0031–0050 (November 23, 1995)
EIF - European Interoperability Framework for pan-European eGovernment services, http://ec.europa.eu/idabc
Greek e-Government Interoperability Framework, http://www.e-gif.gov.gr/portal/page/portal/egif/
Paja, E., Choprab, A.K., Giorgini, P.: Trust-based specification of sociotechnical systems. Data & Knowledge Engineering 87, 339–353 (2013), doi:10.1016/j.datak.2012.12.005
Paja, E., Dalpiaz, F., Giorgini, P.: Managing Security Requirements Conflicts in Socio-Technical Systems. In: Ng, W., Storey, V.C., Trujillo, J.C. (eds.) ER 2013. LNCS, vol. 8217, pp. 270–283. Springer, Heidelberg (2013), doi:10.1007/978-3-642-41924-9_23.
Business Process Modelling and Notation (BPMN), http://www.bpmn.org
Brucker, A.D., Malmignati, F., Merabti, M., Shi, Q., Zhou, B.: A Framework for Secure Service Composition. In: Procs. of the International Conference on Social Computing 2013 (SocialCom), pp. 647–652. IEEE (2013), doi:10.1109/SocialCom.2013.97
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Tountopoulos, V., Giannakoudaki, I., Giannakakis, K., Korres, L., Kallipolitis, L. (2014). Supporting Security and Trust in Complex e-Government Services. In: Brucker, A.D., Dalpiaz, F., Giorgini, P., Meland, P.H., Rios, E. (eds) Secure and Trustworthy Service Composition. Lecture Notes in Computer Science, vol 8900. Springer, Cham. https://doi.org/10.1007/978-3-319-13518-2_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-13518-2_15
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-13517-5
Online ISBN: 978-3-319-13518-2
eBook Packages: Computer ScienceComputer Science (R0)