E-government is the application of computer and network technology to integrate the government's management and services on the Internet to achieve national administrative organization structure and work flow optimization, reorganization, beyond time, space and departmental restrictions on physical separation, to provide efficient and comprehensive, transparent and standardized, convenient and consistent with international standards of social management and information services for the public. However, there are various e-government potential security threats. In this paper we use the “Predicate Object” representation of technology to solve the security and sensitivity protection problems in e-government and demonstrate the safety of electronic monitoring data on this basis.
[1]
Li Lei.
Research Development of Access Control Model
,
2010
.
[2]
Gail-Joon Ahn,et al.
Role-based authorization constraints specification
,
2000,
TSEC.
[3]
D. Elliott Bell,et al.
Secure Computer System: Unified Exposition and Multics Interpretation
,
1976
.
[4]
Sabrina De Capitani di Vimercati,et al.
Access Control: Policies, Models, and Mechanisms
,
2000,
FOSAD.
[5]
Ravi S. Sandhu,et al.
Role-Based Access Control Models
,
1996,
Computer.