|
National Security
Reference:
Lipuntsov, Y.P.
Identifi cation management in the electronic states: data security and inviolability of private
life.
// National Security.
2011. ¹ 6.
P. 18-27.
URL: https://en.nbpublish.com/library_read_article.php?id=58985
Lipuntsov, Y.P. Identifi cation management in the electronic states: data security and inviolability of private
life.
Abstract:
The task of creating trust environment for citizens’ interaction with departmental applications, their active participation
in various information communities is a priority for the infrastructure of e-government. Identifi cation system and the
system of electronic services should be a mechanism to protect the entire set of personal data, so none of the participants
was not authorized the potential to get a complete picture of all operations of the individual user.
Keywords:
management, identifi cation, state security, data, life, system, mechanism, the user.
References
1. SKAO Sotsial'naya karta Astrakhanskoy oblasti www.sbrf.ru/common/img/uploaded/sbjr/10-10/083.pdf
2. SKM Sotsial'naya karta moskvicha http://www.soccard.ru/
3. FUO UEE Federal'naya upolnomochennaya organizatsiya OAO «Universal'naya elektronnaya karta» http://
4. www.uecard.ru/
5. Acquisti and Grossklags, 2008 A. Acquisti and J. Grossklags, What can behavioral economics teach us about
6. privacy? Digital privacy: Theory, technologies, and practices, Auerbach Publications, New York and London
7. (2008), pp. 363–377.
8. Feijoo et al., 2009 C. Feijoo, C. Pascu, G. Misuraca and W. Lusoli, ‘The Next Paradigm Shift in the Mobile
9. Ecosystem: Mobile Social Computing and the Increasing Relevance of Users’, in Communications & Strategies,
10. n.75 (2009), pp. 57–77 3 rd quarter 2009.
11. Fraunhofer 2011, Der Fraunhofer-Innovationscluster Sichere Identität http://www.sichere-identitaet.
12. de/en/future-themes/people
13. Hildebrandt, 2009 M. Hildebrandt, Behavioural biometric profi ling and transparency enhancing tools, project
14. deliverable, of the future of identity in the information society, FIDIS, European Commission (2009) www.
15. fi dis.net.
16. Hoepner 2011, Hoepner Petra, Identity management Workshop: Russian-German Center for Interoperable
17. eGovernment Systems, Berlin 10th January 2011 rezhim dostupa http://www.gosbook.ru/node/27731
18. [01.09.2011]
19. Jaokar and Gatti, 2009 A. Jaokar and A. Gatti, Understanding the impact of open mobile: Implications for
20. telecoms/devices, web, social networks, media and personal privacy, Futuretext Limited (2009).
21. NSS 2010 National Security Strategy, The White House May 2010, p 27 Web 17 Dec 2010 http://www.whitehouse.
22. gov/sites/default/fi les/rss_viewer/national_security_strategy.pdf
23. NSTIC 2010 National strategy for trusted identities in cyberspace www.dhs.gov/xlibrary/assets/ns_tic.pdf
24. TU 2010 Technische Universität Berlin http://www.ztg.tu-berlin.de/online-authentisierung.shtml
25. Zittrain, 2008 J. Zittrain, The future of the internet—And how to stop it, Caravan Books (2008).
|