An extended security framework for e-government

被引:3
作者
Al-Ahmad, Walid [1 ]
Al-Kaabi, Reem [2 ]
机构
[1] NYiT Amman, Amman, Jordan
[2] AABFS Amman, Amman, Jordan
来源
ISI 2008: 2008 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS | 2008年
关键词
e-government; security framework; security goals; security policies;
D O I
10.1109/ISI.2008.4565091
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Many governments have delivered their services in ways that meet the desires of the citizens and businesses they serve, enabling them to interact securely in places and at times that are convenient for them. E-government is one of the most important achievements of the Internet. Successfully implementing e-government requires a level of trust on the part of all transaction parties. There are several security techniques and tools that have been developed in the scope of e-commerce. However, development of secure e-government systems requires a comprehensive model for security that can by implemented during the life cycle of the project. This paper introduces all enhanced security framework that is designed especially for e-government systems. Such a security framework is an essential tool that can be used by decision makers and designers of e-government systems.
引用
收藏
页码:294 / +
页数:2
相关论文
共 50 条
[21]   A knowledge flow framework for e-government in Iran [J].
Tajgardoon, Mohammad Ghaem ;
Shalmani, Mohammad Taghi Manzuri ;
Habibi, Jafar .
INFORMATION DEVELOPMENT, 2016, 32 (04) :1216-1227
[22]   A Framework to Analyze the Alignment of E-Government Projects [J].
Bouaziz, Fatma ;
Chaabouni, Jamil .
INTERNATIONAL JOURNAL OF ELECTRONIC GOVERNMENT RESEARCH, 2012, 8 (02) :75-90
[23]   An Integrated Framework for Benchmarking e-Government Projects [J].
Hatsu, Sylvester ;
Ketcha Ngassam, Ernest .
2017 IST-AFRICA WEEK CONFERENCE (IST-AFRICA), 2017,
[24]   A Theoretical E-government Portals' Benchmarking Framework [J].
Fath-Allah, Abdoullah ;
Cheikhi, Laila ;
Al-Qutaish, Rafa E. ;
Idri, Ali .
2015 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA), 2015,
[25]   E-government Security Management: Key Factors and Countermeasure [J].
Wang Jin-fu .
FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, :483-486
[26]   Design and realization of security guarantee system of E-Government [J].
Yang, Qi-Feng ;
Tao, Mei .
2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, :12513-12517
[27]   How to Design the E-government Information Security Legislation [J].
Liu Bangfan ;
Tao Tao ;
Zhang Bei .
MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 :5367-+
[28]   RESEARCH ON E-GOVERNMENT INFORMATION SECURITY PROBLEMS AND COUNTERMEASURES [J].
He Huanhuan .
PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING (ICACTE 2009), VOLS 1 AND 2, 2009, :1413-1419
[29]   Security design model of E-government collaborative platform [J].
Su, JD ;
Guo, HQ ;
Yu, SS .
DCABES 2004, Proceedings, Vols, 1 and 2, 2004, :998-1001
[30]   Data Mining Applications in E-Government Information Security [J].
Yuan, Tongwei ;
Chen, Peng .
2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING, 2012, 29 :235-240