A Security-Evaluation Framework for Mobile Cross-Border e-Government Solutions

Thomas Zefferer, Bernd Prunster, Christian Kollmann, A. Corici, Lukas Alber, Roland Czerny, Blaž Podgorelec
{"title":"A Security-Evaluation Framework for Mobile Cross-Border e-Government Solutions","authors":"Thomas Zefferer, Bernd Prunster, Christian Kollmann, A. Corici, Lukas Alber, Roland Czerny, Blaž Podgorelec","doi":"10.1145/3598469.3598529","DOIUrl":null,"url":null,"abstract":"Security evaluation is crucial for any security-critical system. In this context, a system can mean technical systems, organizations, or any other entity with certain security requirements. The major challenge in doing risk analysis is the trade-off between completeness and complexity. When done on a more abstract level, certain risks are potentially overlooked. When done on a very detailed level, risk analyses quickly become complex and exceed available resources. To tackle this challenge, various norms and standards propose different security evaluation methodologies. These methodologies vary depending on their target scope. Also, these standards typically remain on a rather abstract level to ensure broad applicability to different systems. In practice, this often complicates the application of these standards to concrete technical systems. In this paper, we tackle this issue by proposing a customized security-evaluation framework tailored to the special characteristics of cross-border e-government services. The proposed framework does not re-invent the wheel but combines aspects and approaches of established norms and standards to cherry-pick from each standard those aspects most beneficial for the given context. We evaluated the proposed framework by applying it to a set of software building blocks, which have been developed in the Horizon-2020 project mGov4EU and leverage mobile cross-border e-government services in Europe. The conducted evaluation shows that the proposed framework facilitates the practical application of security evaluations in the targeted domain and supports evaluators in handling the trade-off between completeness and complexity.","PeriodicalId":401026,"journal":{"name":"Proceedings of the 24th Annual International Conference on Digital Government Research","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 24th Annual International Conference on Digital Government Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3598469.3598529","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Security evaluation is crucial for any security-critical system. In this context, a system can mean technical systems, organizations, or any other entity with certain security requirements. The major challenge in doing risk analysis is the trade-off between completeness and complexity. When done on a more abstract level, certain risks are potentially overlooked. When done on a very detailed level, risk analyses quickly become complex and exceed available resources. To tackle this challenge, various norms and standards propose different security evaluation methodologies. These methodologies vary depending on their target scope. Also, these standards typically remain on a rather abstract level to ensure broad applicability to different systems. In practice, this often complicates the application of these standards to concrete technical systems. In this paper, we tackle this issue by proposing a customized security-evaluation framework tailored to the special characteristics of cross-border e-government services. The proposed framework does not re-invent the wheel but combines aspects and approaches of established norms and standards to cherry-pick from each standard those aspects most beneficial for the given context. We evaluated the proposed framework by applying it to a set of software building blocks, which have been developed in the Horizon-2020 project mGov4EU and leverage mobile cross-border e-government services in Europe. The conducted evaluation shows that the proposed framework facilitates the practical application of security evaluations in the targeted domain and supports evaluators in handling the trade-off between completeness and complexity.
移动跨境电子政务解决方案的安全评估框架
安全评估对于任何安全关键型系统都是至关重要的。在此上下文中,系统可以指技术系统、组织或具有某些安全需求的任何其他实体。进行风险分析的主要挑战是在完整性和复杂性之间进行权衡。当在更抽象的层面上进行时,某些风险可能会被忽略。当在非常详细的层面上进行时,风险分析很快就会变得复杂,并且超出可用资源的范围。为了应对这一挑战,各种规范和标准提出了不同的安全评估方法。这些方法因其目标范围而异。此外,这些标准通常保持在相当抽象的级别上,以确保广泛适用于不同的系统。在实践中,这往往使这些标准在具体技术系统中的应用复杂化。本文针对跨境电子政务服务的特点,提出了一种定制化的安全评估框架。提议的框架没有重新发明轮子,而是结合了已建立的规范和标准的方面和方法,从每个标准中挑选最有利于给定上下文的方面。我们通过将提议的框架应用于一组软件构建块来评估它,这些构建块是在Horizon-2020项目mGov4EU中开发的,并利用欧洲的移动跨境电子政务服务。评估结果表明,所提出的框架促进了安全评估在目标领域的实际应用,并支持评估人员在完整性和复杂性之间进行权衡。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信