首页 | 本学科首页   官方微博 | 高级检索  
     检索      


Authentication,Privacy, and the Federal E-Government
Authors:Stephen H Holden  Lynette I Millett
Institution:1. Department of Information Systems , University of Maryland–Baltimore County , Baltimore, Maryland, USA;2. Computer Science and Telecommunications Board, The National Academies , Washington, DC, USA
Abstract:

As federal agencies move toward more sophisticated e-govern- ment offerings, they must consider both policy and operational requirements for electronic authentication (e-authentication). One important consideration in designing and deploying e-authentica- tion solutions is the balance between access, security, authentication, and privacy. Public law and government-wide policy encourage e-government and e-authentication simultaneously with privacy protection, creating policy and operational tensions for e-government efforts. A review of the relevant laws and policies and analyses of the privacy implications of authentication technologies indicates that federal agencies have at least two analytic frameworks for balancing privacy concerns with e-authentication. A framework offered in the 2003 National Research Council report Who Goes There? and the privacy impact analysis requirements of the E-Government Act of 2002 provide e-government projects with the tools for navigating the path between privacy and openness, required by both e-government law and policy.
Keywords:authentication  e-government  federal law  privacy
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号