Some Technologies for Information Security Protection in Weak-Controlled Computer Systems and Their Applicability for eGovernment Services Users

Abstract : The users of eGovernment services start exchanging documents with administrative authorities, making ePayments, and in such communications the risks of confidential information disclosure and direct financial losses are growing up. The computer systems of these users are weak-controlled and are outside of sphere of well-defined information security protection decisions. The technologies for data protection in case of theft or loss of computers and data devices and in case of data leakage are very important for eGovernment services users and must have appropriate properties to be useful for their security needs. A model of anti-theft technology implementation, which disables stolen computers and can send them data-destructive commands to erase sensitive data, is presented. The technologies for control over the channels which can lead to data leakage protect data by whitelisting or blacklisting some devices or ports, by prohibit and allow some actions and operations, or by transparent encryption of outbound data. Some technologies for control over the leaving data use pre-defined set of sensitive data type definitions. Users can select definitions to apply or can customize some of them according specific conditions or regulations. At the end some conclusions about applicability of anti-theft and sensitive data leakage prevention technologies for protection of information security of eGovernment users was done.
Type de document :
Communication dans un congrès
Jan Camenisch; Valentin Kisimov; Maria Dubovitskaya. 1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. Springer, Lecture Notes in Computer Science, LNCS-6555, pp.117-122, 2011, Open Research Problems in Network Security. 〈10.1007/978-3-642-19228-9_10〉
Liste complète des métadonnées

Littérature citée [3 références]  Voir  Masquer  Télécharger

https://hal.inria.fr/hal-01581339
Contributeur : Hal Ifip <>
Soumis le : lundi 4 septembre 2017 - 15:07:30
Dernière modification le : lundi 4 septembre 2017 - 15:09:11

Fichier

978-3-642-19228-9_10_Chapter.p...
Fichiers produits par l'(les) auteur(s)

Licence


Distributed under a Creative Commons Paternité 4.0 International License

Identifiants

Citation

Anton Palazov. Some Technologies for Information Security Protection in Weak-Controlled Computer Systems and Their Applicability for eGovernment Services Users. Jan Camenisch; Valentin Kisimov; Maria Dubovitskaya. 1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. Springer, Lecture Notes in Computer Science, LNCS-6555, pp.117-122, 2011, Open Research Problems in Network Security. 〈10.1007/978-3-642-19228-9_10〉. 〈hal-01581339〉

Partager

Métriques

Consultations de la notice

71

Téléchargements de fichiers

9