Information Security On eGovernment As Information-Centric Networks

Main Article Content

Tri Kuntoro Priyambodo
Didit Suprihanto

Abstract

Information security is a major factor in the service of eGovernment. The using of host to host in previous services of eGovernment is considered as lacking in security. Therefore, it needs more security to serve clients more efficiently and to obtain reliable data provided from the host. One of approach ways to solve the previous security services are based on the safety approach on the contents. The approach on content is used to improve the security which has been used. The approach offered in this paper is called Information Centric Network, this approach is one of the alternatives that is used to secure the content on eGovernment, in addition to approaches by using encryption and captcha. Human aspect is also included as one of the factors of eGovernment security itself.

Article Details

How to Cite
[1]
Tri Kuntoro Priyambodo and Didit Suprihanto, “Information Security On eGovernment As Information-Centric Networks”, Int. J. Comput. Eng. Res. Trends, vol. 3, no. 6, pp. 360–365, Jun. 2016.
Section
Research Articles

References

F. Hadi, F.T. Muhaya, “Essentials for the eGovernment Security,” In : International Conference on Information Society (i-Society), 2011, pp.237-240

Y. Prayudi, T.K. Priyambodo, “ Secure and Trusted Environment as a Strategy to Maintain the Integrity and Authenticity of Digital Evidence,”” International Journal of Security and Its Applications, Vol. 9, No. 6, 2015, pp. 299-314.

E. Fraga, “Trends in e-Government: How to Plan, Design, and Measure e-Government,” Government Management Information Sciences (GMIS) Conference, June 17, Santa Fe, New Mexico, U.S.A. 2002

C. Leitner, “eGovernment in Europe: The State of Affairs,” European Institute of Public Administration, Maastricht, the Netherlands, 2003.

J.S. Djumadal, “Implementasi E-Government Sebuah Harapan Penuh Tantangan Di Provinsi Daerah Istimewa Yogyakarta,” e-Indonesia Initiative 2008 (eII2008), Konferensi dan Temu Nasional Teknologi Informasi dan Komunikasi untuk Indonesia, Jakarta 21- 23, Mei, 2008,

T.K. Priyambodo, Y. Prayudi, “A Proposed Strategy for Secure and Trusted Environment in eGovernment,” Springer International Publishing, Advanced Computer and Communication Engineering Technology, Lecture Notes in Electrical Engineering 362, Switzerland, 2016 DOI 10.1007/978-3-319-24584- 3_38, 2016, pp. 449-459.

Moen, N. Klingsheim, K. Inge, F. Simonsen, & K.J. Hole, “Vulnerabilities in E-Government Web portals,” International Journal of Electronic Security and Digital Forensics, 1(1), 2007, pp. 89–100. Retrieved from http://www.nowires.org/Papers-PDF/ICGeS_egov.pdf

M. Alshehri and S. Drew, “eGovernment Fundamentals,” (2010), 35–42.

A. Akbulut, “An investigation of the factors that influence electronic information sharing between state and local agencies,” Louisiana State University. 2003.

M. Sami and M. Mohd, “Best Practices in Egovernment: A review of Some Innovative Models Proposed in Different Countries,” International Journal of Electrical & Computer Sciences IJECS-IJENS, Vol. 12 No. 01, Februari 2012.

A.B. Setiawan, “Implementasi Tata Kelola Keamanan Informasi Nasional Dalam Keranka eGovernment,” Jakarta, 2011.

S. H. Bakry and F. B. Muhaya, “Assessing the Benefits of Egovernment,” Second Kuwait Conference on e-Services and eSystems, 2011.

W. Seifert, “A Primer on E-Government: Sectors, Stages, Opportunities, and Challenges of Online Governance,” Congressional Research Service: The Library of Congress. 2003.

OECD, OECD eGovernment Flagship Report “The eGovernment Imperative,” Public Management Committee, Paris:OECD. 2003.

M. Wimmer and B. Bredow, “A Holistic Approach for Providing Security Solutions in eGovernment,” Proceedings of the 35th Hawaii International Conference on System Sciences. 2002

L. Feng, “Implementing E-government Strategy is Scotland: Current Situation and Emerging Issues,” Journalof Electronic Commerce in Organizations 1(2), 44-6. 2003.

M. Wimmer, C. Codagnone, and M. Janssen, “Future e-Government Research: 13 Research Themes Identified in the eGovRTD2020 Project,” In Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008) (pp. 223–223). Ieee. doi:10.1109/HICSS.2008.179

Abdallah, Hassanein, and Zulkernine, “A Survey of Security Attacks in Information-Centric Networking,” 1553-877X (c) 2015 IEEE.

A. Mahfouth, “Security Aspects of the Information Centric Networks Model,” International Journal of Computer Science and Security (IJCSS), Volume (7) : Issue (2) : 2013.

B. Ahlgren, C. Dannewitz, C. Imbrenda, D. Kutscher, and B. Ohlman, “A Survey of InformationCentric Networking,” IEEE Communications Magazine,. 0163-6804/12/ © 2012 IEEE.

A. Ghodsi, T. Koponen, Raghavan., S. Shenker, A. Singla, and J. Wilcox, “Information-Centric Networking: Seeing the Forest for the Trees,” ACM 978-1-4503-1059-8/11/11. 2011

M. Walfish, H. Balakrishnan, and S. Shenker, Untangling the Web from DNS. In Proc. of NSDI, 2004.

D. Wendlandt, I. Avramopoulos, D. Andersen and J. Rexford, “Don’t Secure Routing Protocols, Secure Data Delivery,” In Proc. of HotNets, 2006.

T.K. Priyambodo and Y. Prayudi, “Information Security Strategy On Mobile Device Based Egovernment,” ARPN Journal of Engineering and Applied Sciences. Vol. 10, No. 2, February 2015.

K. Parsons, A. Mccormac, M. Butavicius and L. Ferguson, “Human Factors and Information Security : Individual, Culture and Security Environment,” Edinburgh, 2010.

J.J. Gonzalez and A. Sawicka, “A framework for human factors in information security,” In:WSEAS International Conference on Information Security, Hardware/Software Codesign, E-Commerce and Computer Networks, 2002, pp. 1871–1877