E-government security is a key problem to restrict the construction and development of E-government systems in any
country over the world. E-Government security models are widely used in the implementation and development of e- government
systems. Due to the deference situation of the countries over the world there are various security models applied in each country. This
paper reviews different security models in e-government in order to determine important parameters for e-government strategic
planning.
Machine to machine (M2M) is a broad label that can be used to describe any technology that enables networked devices to exchange information and perform actions without the manual assistance of humans.
Primarily M2M and IoT are similar in upper layer such as hardware, networking or devices. But they differ in system architecture, types of applications and underlying Technologies.
This will be helpful for GTU IOT subject course understanding too!
If you like the video please subscribe to our channel and turn notifications on for future videos.
Follow us on:
Website: http://www.edtechnology.in/
Instagram: https://www.instagram.com/ed.tech/
Facebook: https://www.facebook.com/Edtech18/
Machine to machine (M2M) is a broad label that can be used to describe any technology that enables networked devices to exchange information and perform actions without the manual assistance of humans.
Primarily M2M and IoT are similar in upper layer such as hardware, networking or devices. But they differ in system architecture, types of applications and underlying Technologies.
This will be helpful for GTU IOT subject course understanding too!
If you like the video please subscribe to our channel and turn notifications on for future videos.
Follow us on:
Website: http://www.edtechnology.in/
Instagram: https://www.instagram.com/ed.tech/
Facebook: https://www.facebook.com/Edtech18/
Provides a simple and unambiguous taxonomy of three service models
- Software as a service (SaaS)
- Platform as a service (PaaS)
- Infrastructure as a service (IaaS)
(Private cloud, Community cloud, Public cloud, and Hybrid cloud)
Smart Energy Management moving from Smart metering management to Smart Grid management, leveraging IoT platforms and ecosystem of application vendors, and smart connectivity
Security Model for Hierarchical Clustered Wireless Sensor NetworksCSCJournals
The proposed security system for the Wireless Sensor Network (WSN) is based on the WSN security design goal that ‘to design a completely secure WSN, security must be integrated into every node of the system’. This paper discusses on two main components of the security framework viz. the secure key management module and the secure routing scheme. The incorporation of security mechanism during the routing protocol design phase is the main focus of this paper. The proposed security framework viz. ‘Secure and Hierarchical, a Routing Protocol’ (SHARP) is designed for the wireless sensor network applications which is deployed particularly for data collection purpose in a battlefield where the security aspect of the network cannot be compromised at any cost. SHARP consists of three basic integrated modules and each module performs a well defined task to make the whole security framework a complete system on its own.
A Proposed Security Model for Web Enabled Business Process Management SystemCSCJournals
Many organizations in industry and civilian government start deploying Business Process Management systems (BPMS) and technology in their IT applications. This could lead to a dramatic operational efficiency improvement on their business and administrative environments. With these atmospheres, the security issue is becoming a much more important challenge in the BPMS literature. The Role-Based Access Control (RBAC) model has been accepted as a promise security model solution and standard. RBAC is able to accomplish the central administration of an organizational specific security policy. It is also able to meet the secure processing needs of many commercial and civilian government organizations. In spite of these facts, RBAC model is not reliable when applying to the BPMS without further modifications and extensions. RBAC is modified to fit with Service oriented (SRBAC), but still not reliable enough to handle BPMS. Authors of that research proposed a security model based on SRBAC model to be more reliable when using with BPMS. Authors of that research named that proposed security model as Improved Role Based Access Control (IRBAC). The IRBAC model is directly applicable to the BPMS. Authors defined a graphical representation and technical implementation of the IRBAC model. This IRBAC model is tested using simple case study. The test compares between the IRBAC model and SRBAC model where IRBAC is implemented in two cases (IRBAC with caching and IRBAC with no caching). The test results show the validity and performability of the IRBAC model.
Provides a simple and unambiguous taxonomy of three service models
- Software as a service (SaaS)
- Platform as a service (PaaS)
- Infrastructure as a service (IaaS)
(Private cloud, Community cloud, Public cloud, and Hybrid cloud)
Smart Energy Management moving from Smart metering management to Smart Grid management, leveraging IoT platforms and ecosystem of application vendors, and smart connectivity
Security Model for Hierarchical Clustered Wireless Sensor NetworksCSCJournals
The proposed security system for the Wireless Sensor Network (WSN) is based on the WSN security design goal that ‘to design a completely secure WSN, security must be integrated into every node of the system’. This paper discusses on two main components of the security framework viz. the secure key management module and the secure routing scheme. The incorporation of security mechanism during the routing protocol design phase is the main focus of this paper. The proposed security framework viz. ‘Secure and Hierarchical, a Routing Protocol’ (SHARP) is designed for the wireless sensor network applications which is deployed particularly for data collection purpose in a battlefield where the security aspect of the network cannot be compromised at any cost. SHARP consists of three basic integrated modules and each module performs a well defined task to make the whole security framework a complete system on its own.
A Proposed Security Model for Web Enabled Business Process Management SystemCSCJournals
Many organizations in industry and civilian government start deploying Business Process Management systems (BPMS) and technology in their IT applications. This could lead to a dramatic operational efficiency improvement on their business and administrative environments. With these atmospheres, the security issue is becoming a much more important challenge in the BPMS literature. The Role-Based Access Control (RBAC) model has been accepted as a promise security model solution and standard. RBAC is able to accomplish the central administration of an organizational specific security policy. It is also able to meet the secure processing needs of many commercial and civilian government organizations. In spite of these facts, RBAC model is not reliable when applying to the BPMS without further modifications and extensions. RBAC is modified to fit with Service oriented (SRBAC), but still not reliable enough to handle BPMS. Authors of that research proposed a security model based on SRBAC model to be more reliable when using with BPMS. Authors of that research named that proposed security model as Improved Role Based Access Control (IRBAC). The IRBAC model is directly applicable to the BPMS. Authors defined a graphical representation and technical implementation of the IRBAC model. This IRBAC model is tested using simple case study. The test compares between the IRBAC model and SRBAC model where IRBAC is implemented in two cases (IRBAC with caching and IRBAC with no caching). The test results show the validity and performability of the IRBAC model.
Off course E-Governance is required.Today the worlds top 40 countries in terms of corruption free are all E-Governed!!!!!so y not for akka India.Govt has taken many steps in this direction.Though the speed is slow...is it really worth when India has one of the highest percentage of digital illiterates in the world....here comes security IQ of a common citizen into question!!!!
The project work explores in detail, the security issues in a SOA environment and also describes the various approaches to these issues. The different approaches to SOA security (i.e. message level security, security as a service and policy driven security) are not standalone solutions, but can be deployed as mix and match solutions. A SOA security solution can make use of all the approaches to address specific security concerns. Finally the project work describes a generic SOA security model which acts as a reference model to identify security vulnerabilities in enterprise application integration (EAI). These vulnerabilities can then be addressed by the different approaches to security.
Cloud computing technology for egovernment architectureijfcstjournal
The evolution of
cloud computing
has had a significant
effect on our lives and it has brought many benefits.
Cloud computing is a style of computing which is formed from the aggregation and development of
technologies such as grid computing distributed computing, parallel computing and service
-
oriented
archit
ecture
and it
s exciting for governments and private companies, and it has eager them to take
advantage of this technology. Because in this model no needed to additional costs for equipment and
resources to respond to the request of customers, however in t
erms of demand and workload, company
lease and take possession of the required resources, such as servers and virtual sources. In this pa
per, we
studied how to use cloud computing in e
-
government and tried to identify the benefits of the cloud to use in
th
e e
-
government and offer proposals to overcome its shortcomings, encourage and partnership of
governments and people to use this economical
, green
and new technology.
A NOVEL SERVICE ORIENTED ARCHITECTURE (SOA) TO SECURE SERVICES IN E-CITYijsptm
Many cities in the world have moved toward being e-city using IT and there are some who have
implemented it and or seeking out to make it operational. However, experience shows that implementation
of e-city faces Challenges which the effectiveness of e-city, improvement of provided services and security
are the most important part of these challenges. Today, for realization of a perfect e-city, to overcome
faced challenges Such as security issues is an urgent need. Considering that e-city consists of multiple
information systems, it’s the most important challenge to create integration between these systems and
provide its security which service oriented architecture as a computational model and an approach for data
integration could largely overcome these problems. In this paper through studying challenges of
information systems in e-city layers and with concentrating on advantages of service oriented architecture,
a new architecture to improve the security of e-city’s systems and their provided services and also
overcoming the challenges of information systems has been proposed
The purpose of this article is to provide an overview of the PKI project initiated part of the UAE national ID card program. It primarily shows the operational model of the PKI implementation that is indented to integrate the federal government identity management infrastructure with e-government initiatives owners in the country. It also explicates the agreed structure of the major components in relation to key stakeholders; represented by federal and local e-government authorities, financial institutions, and other organizations in both public and private sectors. The content of this article is believed to clarify some of the misconceptions about PKI implementation in national ID schemes, and explain how the project is envisaged to encourage the diffusion of e-government services in the United Arab Emirates. The study concludes that governments in the Middle East region have the trust in PKI technology to support their e-government services and expanding outreach and population trust, if of course accompanied by comprehensive digital laws and policies.
Cloud computing is a new term to provide application and hardware as service over the internet. Demand for cloud has increased dramatically in recent years. However, a major drawback for cloud adoption is lack of security so that we will try to solve some security issues related to cloud storage by design and implement a secure system to store privet data in cloud storage. This secure system provide secure login to cloud by using third parity authentication (smart phone) and one time password depend on chaotic system to prevent unauthorized people from get access to cloud and modified AES algorithms to encrypt the data in the cloud storage.
Across the world, governments are trying to present, in the best p.docxdaniahendric
Across the world, governments are trying to present, in the best possible way, their government services to citizens. Using the new technology is paramount to reduce this interaction through effective and efficient services.
Cloud Computing is a computing concept that is formed from the aggregation and development architecture such as SOA. Its purpose is to provide resources for communication and storage in a secure environment based on the service as quickly as possible, which is virtually implemented, via Internet access.
As the services provided by the e-Government are available via the Internet, so the benefits of Cloud Computing can be used in theimplementation of e-Government architecture to provide better service with the least economic cost.
Many countries have attempted to implement the e-Government based on the functionality provided by Cloud Computing, some of these countries have achieved remarkable success, and others have confronted difficult to make it worked.
This article will explore the use of Cloud Computing in e-Government, identify challenges and benefits of this use, and finish with benchmarking countries that have followed this approach.
Keywords: e-Government, Cloud Computing, Public services, Advantages, Challenges, Benchmarking, European governments, Arabic governments.
1. Introduction
For the past 10 years, the Internet and web services have experienced rapid and significant increases, which generated through their use in all sectors of activity, a high cost of data storage and consumption energy and complexities of implementation and infrastructure solutions.
To remedy this, large organizations have begun extensive studies to reduce these costs and complexities and they deduced the CloudComputing.
Today, Cloud Computing, this new technology, has effectively respond to thousands of their hardware and software needs, and it is considered the topic most requested by academics and research centers related to the field of information technology.
The e-Government among the industries that used the Internet and web services, seeks firstly overwhelming user satisfaction, and others from the implementation of an effective system based on Information Technology. To do this, the e-Government adopted to use the concepts of Cloud Computing.
2. Cloud Computing
2.1. Definition
In 2009, the National Institute of Standards and Technology (NIST) [9] published a definition of Cloud Computing as : "a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction."
This definition was included in the Global Security Mag magazine as "Cloud Computing is a new way of delivering IT resources, not a new technology." Moreover, this concept has been proven in my post in the second edition of the PhD day ...
Design and Implementation Security Model for Sudanese E-governmentEditor IJCATR
Security is one of the most important issues in E-government projects. E-government applications will be increasingly used
by the citizens of many countries to access a set of services. Currently, the use of the E-government applications arises many
challenges; one of these challenges is the security issues. E-government applications security is a very important characteristic that
should be taken into account. This paper makes an analysis over the security as required for E-government and specify the risks and
challenges that faces E-government projects in Sudan. Finally, the study has proposed security model for Sudanese E-government. The
proposed security model for the Sudanese electronic government is a four layers' model that is divided into sub layers. Each layer will
mitigate group of threats related to an e-services. The model is not generic; it cannot be applied by other countries. It is precisely
designed for Sudanese situation
Besides the benefits are there possible challenges government agencies are likely to encounter should they
decide to adopt cloud computing? What strategies should be deployed to overcome the inhibitors of cloud
computing? These are but few questions this paper aims to investigate. Studies have shown that, cloud
computing has become a strategic direction for many government agencies and is already being deployed
in many critical areas of the government's cyber infrastructure. The benefits and the challenges of cloud
adoption have heightened interest of academic research in recent times. We are however uncertain, per
literature factors that hinder successful cloud adoption especially in the Ghanaian context. We posit that,
understanding the challenges of cloud adoption and overcoming them must accompany the use of the
technology in order to prevent unwanted technical consequences, and even greater problems from
government information management. This study is based on unstructured interviews from selected
government agencies in Ghana. The study is grounded on the theory of technology, organization and
environment (TOE) framework. Major inhibiting factors identified include lack of basic infrastructure for
cloud take-off, data security, unreliable internet connectivity, and general lack of institutional readiness
The spread of information networks in communities and organizations have led to a daily huge volume of information exchange between different networks which, of course, has resulted in new threats to the national organizations. It can be said that information security has become today one of the most challenging areas. In other words, defects and disadvantages of computer network security address irreparable damage for enterprises. Therefore, identification of security threats and ways of dealing with them is essential. But the question raised in this regard is that what are the strategies and policies to deal with security threats that must be taken to ensure the security of computer networks? In this context, the present study intends to do a review of the literature by using earlier researches and library approach, to provide security solutions in the face of threats to their computer networks. The results of this research can lead to more understanding of security threats and ways to deal with them and help to implement a secure information platform.
Addressing Security Issues and Challenges in Mobile Cloud ComputingEditor IJCATR
The emergence of cloud computing has brought tremendous impact on software organizations and software architecture design. With the development of cloud computing and mobile internet, mobile cloud computing is becoming a new mode of application. With the widespread development of mobile applications and advances in mobile cloud computing, some other forms of requirements and security issues have been emerged. Mobile cloud computing provides resources residing over cloud and services provided for mobile devices. These resources and services from cloud are available for mobile user over their mobile devices. It also provides benefits for developing specialized mobile applications for them. However, increased security and privacy risks exists due to data outsourcing and synchronization over the Internet. This research paper provides the review on mobile cloud computing, its security issues, challenges and suggests some solutions.
In recent years, there has been rapid growth of e-government services & application go on web. Malaysia federal government enable national budget services and application online for more efficient on managing, planning, monitoring, evaluation and accountability.
Best practice framework for information technology security governance in In...IJECEIAES
Information technology security is crucial for a digital government system to have so that the continuity of business processes can run smoothly. However, the current best practice of information security governance in the Indonesian national government is still inadequate according to various related studies still siloed and scattered and leading to vulnerabilities in the various digital services provided. Therefore, this study aims to develop a best practice framework for managing information security that is aligned with the needs of Indonesia's digital government. This research started by looking for the main framework of information security governance. Then the main components that resulted from that were benchmarked with other Information Security Governance (ISG) best practices from different countries. Finally, it ended up complementing them with information security parameters, other related components, and recommendations, particularly in the Indonesian context, so that the main components and their respective constituent sub-components can be obtained according to the needs of the Indonesian e-government. The cause-and-effect analysis concept analyses the data linkages between the six central components and their respective sub-components. This study concludes that each of main components and sub-components supports each other so that all these things must be carried out in a balanced and continuous manner.
Review on Security Aspects for Cloud Architecture IJECEIAES
Cloud computing is one of the fastest growing and popular technology in the field of computing. As the concept of cloud computing was introduced in 2006. Since then large number of IT industries join the queue to develop many cloud services and put sensitive information over cloud. In fact cloud computing is no doubt the great innovation in the field of computing but at the same time also poses many challenges. Since a large number of organizations migrate their business to cloud and hence it appears as an attractive target for the malicious attack. The purpose of the paper is to review the available literature for security concerns and highlight a relationship between vulnerabilities, attacks and threats in SaaS model. A mapping is being presented to highlight the impact of vulnerabilities and attacks.
A traditional computing environment requires a costly
infrastructure to offer a better service to users. The introduction
of cloud computing has changed the working environment from
traditional to virtual. A larger number of IT companies are
utilizing the cloud. On the one hand, the cloud attracts more
number of consumers by offering services with minimized
capital cost and virtual infrastructure. On the other hand, there
are a risk and security challenges in cloud computing that
makes the user not to move completely towards it. The cloud
environment is more vulnerable to security breaches and data
theft. Moreover, insider attacks are more frequent in larger
enterprises. An unauthenticated user can cause more damage
to company reputation. The cloud service providers are trying
to provide a secure work environment for users. However,
there is a lack of global standards and policies to invoke
security measures in cloud computing. This study aims to
highlight and classify security challenges and trust issues in the
cloud environment.
The survey was conducted in various institutions and
governmental organizations in Saudi Arabia to study the
opinions of stakeholders on cloud computing security
challenges and risks.
Links:
http://sites.google.com/site/ijcsis/
https://google.academia.edu/JournalofComputerScience
https://www.linkedin.com/in/ijcsis-research-publications-8b916516/
http://www.researcherid.com/rid/E-1319-2016
Text Mining in Digital Libraries using OKAPI BM25 ModelEditor IJCATR
The emergence of the internet has made vast amounts of information available and easily accessible online. As a result, most libraries have digitized their content in order to remain relevant to their users and to keep pace with the advancement of the internet. However, these digital libraries have been criticized for using inefficient information retrieval models that do not perform relevance ranking to the retrieved results. This paper proposed the use of OKAPI BM25 model in text mining so as means of improving relevance ranking of digital libraries. Okapi BM25 model was selected because it is a probability-based relevance ranking algorithm. A case study research was conducted and the model design was based on information retrieval processes. The performance of Boolean, vector space, and Okapi BM25 models was compared for data retrieval. Relevant ranked documents were retrieved and displayed at the OPAC framework search page. The results revealed that Okapi BM 25 outperformed Boolean model and Vector Space model. Therefore, this paper proposes the use of Okapi BM25 model to reward terms according to their relative frequencies in a document so as to improve the performance of text mining in digital libraries.
Green Computing, eco trends, climate change, e-waste and eco-friendlyEditor IJCATR
This study focused on the practice of using computing resources more efficiently while maintaining or increasing overall performance. Sustainable IT services require the integration of green computing practices such as power management, virtualization, improving cooling technology, recycling, electronic waste disposal, and optimization of the IT infrastructure to meet sustainability requirements. Studies have shown that costs of power utilized by IT departments can approach 50% of the overall energy costs for an organization. While there is an expectation that green IT should lower costs and the firm’s impact on the environment, there has been far less attention directed at understanding the strategic benefits of sustainable IT services in terms of the creation of customer value, business value and societal value. This paper provides a review of the literature on sustainable IT, key areas of focus, and identifies a core set of principles to guide sustainable IT service design.
Policies for Green Computing and E-Waste in NigeriaEditor IJCATR
Computers today are an integral part of individuals’ lives all around the world, but unfortunately these devices are toxic to the environment given the materials used, their limited battery life and technological obsolescence. Individuals are concerned about the hazardous materials ever present in computers, even if the importance of various attributes differs, and that a more environment -friendly attitude can be obtained through exposure to educational materials. In this paper, we aim to delineate the problem of e-waste in Nigeria and highlight a series of measures and the advantage they herald for our country and propose a series of action steps to develop in these areas further. It is possible for Nigeria to have an immediate economic stimulus and job creation while moving quickly to abide by the requirements of climate change legislation and energy efficiency directives. The costs of implementing energy efficiency and renewable energy measures are minimal as they are not cash expenditures but rather investments paid back by future, continuous energy savings.
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Editor IJCATR
Vehicular ad hoc networks (VANETs) are a favorable area of exploration which empowers the interconnection amid the movable vehicles and between transportable units (vehicles) and road side units (RSU). In Vehicular Ad Hoc Networks (VANETs), mobile vehicles can be organized into assemblage to promote interconnection links. The assemblage arrangement according to dimensions and geographical extend has serious influence on attribute of interaction .Vehicular ad hoc networks (VANETs) are subclass of mobile Ad-hoc network involving more complex mobility patterns. Because of mobility the topology changes very frequently. This raises a number of technical challenges including the stability of the network .There is a need for assemblage configuration leading to more stable realistic network. The paper provides investigation of various simulation scenarios in which cluster using k-means algorithm are generated and their numbers are varied to find the more stable configuration in real scenario of road.
Optimum Location of DG Units Considering Operation ConditionsEditor IJCATR
The optimal sizing and placement of Distributed Generation units (DG) are becoming very attractive to researchers these days. In this paper a two stage approach has been used for allocation and sizing of DGs in distribution system with time varying load model. The strategic placement of DGs can help in reducing energy losses and improving voltage profile. The proposed work discusses time varying loads that can be useful for selecting the location and optimizing DG operation. The method has the potential to be used for integrating the available DGs by identifying the best locations in a power system. The proposed method has been demonstrated on 9-bus test system.
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Editor IJCATR
Early detection of diabetes mellitus (DM) can prevent or inhibit complication. There are several laboratory test that must be done to detect DM. The result of this laboratory test then converted into data training. Data training used in this study generated from UCI Pima Database with 6 attributes that were used to classify positive or negative diabetes. There are various classification methods that are commonly used, and in this study three of them were compared, which were fuzzy KNN, C4.5 algorithm and Naïve Bayes Classifier (NBC) with one identical case. The objective of this study was to create software to classify DM using tested methods and compared the three methods based on accuracy, precision, and recall. The results showed that the best method was Fuzzy KNN with average and maximum accuracy reached 96% and 98%, respectively. In second place, NBC method had respective average and maximum accuracy of 87.5% and 90%. Lastly, C4.5 algorithm had average and maximum accuracy of 79.5% and 86%, respectively.
Web Scraping for Estimating new Record from Source SiteEditor IJCATR
Study in the Competitive field of Intelligent, and studies in the field of Web Scraping, have a symbiotic relationship mutualism. In the information age today, the website serves as a main source. The research focus is on how to get data from websites and how to slow down the intensity of the download. The problem that arises is the website sources are autonomous so that vulnerable changes the structure of the content at any time. The next problem is the system intrusion detection snort installed on the server to detect bot crawler. So the researchers propose the use of the methods of Mining Data Records and the method of Exponential Smoothing so that adaptive to changes in the structure of the content and do a browse or fetch automatically follow the pattern of the occurrences of the news. The results of the tests, with the threshold 0.3 for MDR and similarity threshold score 0.65 for STM, using recall and precision values produce f-measure average 92.6%. While the results of the tests of the exponential estimation smoothing using ? = 0.5 produces MAE 18.2 datarecord duplicate. It slowed down to 3.6 datarecord from 21.8 datarecord results schedule download/fetch fix in an average time of occurrence news.
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...Editor IJCATR
Most of the existing semantic similarity measures that use ontology structure as their primary source can measure semantic similarity between concepts/classes using single ontology. The ontology-based semantic similarity techniques such as structure-based semantic similarity techniques (Path Length Measure, Wu and Palmer’s Measure, and Leacock and Chodorow’s measure), information content-based similarity techniques (Resnik’s measure, Lin’s measure), and biomedical domain ontology techniques (Al-Mubaid and Nguyen’s measure (SimDist)) were evaluated relative to human experts’ ratings, and compared on sets of concepts using the ICD-10 “V1.0” terminology within the UMLS. The experimental results validate the efficiency of the SemDist technique in single ontology, and demonstrate that SemDist semantic similarity techniques, compared with the existing techniques, gives the best overall results of correlation with experts’ ratings.
Semantic Similarity Measures between Terms in the Biomedical Domain within f...Editor IJCATR
The techniques and tests are tools used to define how measure the goodness of ontology or its resources. The similarity between biomedical classes/concepts is an important task for the biomedical information extraction and knowledge discovery. However, most of the semantic similarity techniques can be adopted to be used in the biomedical domain (UMLS). Many experiments have been conducted to check the applicability of these measures. In this paper, we investigate to measure semantic similarity between two terms within single ontology or multiple ontologies in ICD-10 “V1.0” as primary source, and compare my results to human experts score by correlation coefficient.
A Strategy for Improving the Performance of Small Files in Openstack Swift Editor IJCATR
This is an effective way to improve the storage access performance of small files in Openstack Swift by adding an aggregate storage module. Because Swift will lead to too much disk operation when querying metadata, the transfer performance of plenty of small files is low. In this paper, we propose an aggregated storage strategy (ASS), and implement it in Swift. ASS comprises two parts which include merge storage and index storage. At the first stage, ASS arranges the write request queue in chronological order, and then stores objects in volumes. These volumes are large files that are stored in Swift actually. During the short encounter time, the object-to-volume mapping information is stored in Key-Value store at the second stage. The experimental results show that the ASS can effectively improve Swift's small file transfer performance.
Integrated System for Vehicle Clearance and RegistrationEditor IJCATR
Efficient management and control of government's cash resources rely on government banking arrangements. Nigeria, like many low income countries, employed fragmented systems in handling government receipts and payments. Later in 2016, Nigeria implemented a unified structure as recommended by the IMF, where all government funds are collected in one account would reduce borrowing costs, extend credit and improve government's fiscal policy among other benefits to government. This situation motivated us to embark on this research to design and implement an integrated system for vehicle clearance and registration. This system complies with the new Treasury Single Account policy to enable proper interaction and collaboration among five different level agencies (NCS, FRSC, SBIR, VIO and NPF) saddled with vehicular administration and activities in Nigeria. Since the system is web based, Object Oriented Hypermedia Design Methodology (OOHDM) is used. Tools such as Php, JavaScript, css, html, AJAX and other web development technologies were used. The result is a web based system that gives proper information about a vehicle starting from the exact date of importation to registration and renewal of licensing. Vehicle owner information, custom duty information, plate number registration details, etc. will also be efficiently retrieved from the system by any of the agencies without contacting the other agency at any point in time. Also number plate will no longer be the only means of vehicle identification as it is presently the case in Nigeria, because the unified system will automatically generate and assigned a Unique Vehicle Identification Pin Number (UVIPN) on payment of duty in the system to the vehicle and the UVIPN will be linked to the various agencies in the management information system.
Assessment of the Efficiency of Customer Order Management System: A Case Stu...Editor IJCATR
The Supermarket Management System deals with the automation of buying and selling of good and services. It includes both sales and purchase of items. The project Supermarket Management System is to be developed with the objective of making the system reliable, easier, fast, and more informative.
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Editor IJCATR
Energy is a key component in the Wireless Sensor Network (WSN)[1]. The system will not be able to run according to its function without the availability of adequate power units. One of the characteristics of wireless sensor network is Limitation energy[2]. A lot of research has been done to develop strategies to overcome this problem. One of them is clustering technique. The popular clustering technique is Low Energy Adaptive Clustering Hierarchy (LEACH)[3]. In LEACH, clustering techniques are used to determine Cluster Head (CH), which will then be assigned to forward packets to Base Station (BS). In this research, we propose other clustering techniques, which utilize the Social Network Analysis approach theory of Betweeness Centrality (BC) which will then be implemented in the Setup phase. While in the Steady-State phase, one of the heuristic searching algorithms, Modified Bi-Directional A* (MBDA *) is implemented. The experiment was performed deploy 100 nodes statically in the 100x100 area, with one Base Station at coordinates (50,50). To find out the reliability of the system, the experiment to do in 5000 rounds. The performance of the designed routing protocol strategy will be tested based on network lifetime, throughput, and residual energy. The results show that BC-MBDA * is better than LEACH. This is influenced by the ways of working LEACH in determining the CH that is dynamic, which is always changing in every data transmission process. This will result in the use of energy, because they always doing any computation to determine CH in every transmission process. In contrast to BC-MBDA *, CH is statically determined, so it can decrease energy usage.
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
In networks, the rapidly changing traffic patterns of search engines, Internet of Things (IoT) devices, Big Data and data centers has thrown up new challenges for legacy; existing networks; and prompted the need for a more intelligent and innovative way to dynamically manage traffic and allocate limited network resources. Software Defined Network (SDN) which decouples the control plane from the data plane through network vitalizations aims to address these challenges. This paper has explored the SDN architecture and its implementation with the OpenFlow protocol. It has also assessed some of its benefits over traditional network architectures, security concerns and how it can be addressed in future research and related works in emerging economies such as Nigeria.
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Editor IJCATR
Report handling on "LAPOR!" (Laporan, Aspirasi dan Pengaduan Online Rakyat) system depending on the system administrator who manually reads every incoming report [3]. Read manually can lead to errors in handling complaints [4] if the data flow is huge and grows rapidly, it needs at least three days to prepare a confirmation and it sensitive to inconsistencies [3]. In this study, the authors propose a model that can measure the identities of the Query (Incoming) with Document (Archive). The authors employed Class-Based Indexing term weighting scheme, and Cosine Similarities to analyse document similarities. CoSimTFIDF, CoSimTFICF and CoSimTFIDFICF values used in classification as feature for K-Nearest Neighbour (K-NN) classifier. The optimum result evaluation is pre-processing employ 75% of training data ratio and 25% of test data with CoSimTFIDF feature. It deliver a high accuracy 84%. The k = 5 value obtain high accuracy 84.12%
Hangul Recognition Using Support Vector MachineEditor IJCATR
The recognition of Hangul Image is more difficult compared with that of Latin. It could be recognized from the structural arrangement. Hangul is arranged from two dimensions while Latin is only from the left to the right. The current research creates a system to convert Hangul image into Latin text in order to use it as a learning material on reading Hangul. In general, image recognition system is divided into three steps. The first step is preprocessing, which includes binarization, segmentation through connected component-labeling method, and thinning with Zhang Suen to decrease some pattern information. The second is receiving the feature from every single image, whose identification process is done through chain code method. The third is recognizing the process using Support Vector Machine (SVM) with some kernels. It works through letter image and Hangul word recognition. It consists of 34 letters, each of which has 15 different patterns. The whole patterns are 510, divided into 3 data scenarios. The highest result achieved is 94,7% using SVM kernel polynomial and radial basis function. The level of recognition result is influenced by many trained data. Whilst the recognition process of Hangul word applies to the type 2 Hangul word with 6 different patterns. The difference of these patterns appears from the change of the font type. The chosen fonts for data training are such as Batang, Dotum, Gaeul, Gulim, Malgun Gothic. Arial Unicode MS is used to test the data. The lowest accuracy is achieved through the use of SVM kernel radial basis function, which is 69%. The same result, 72 %, is given by the SVM kernel linear and polynomial.
Application of 3D Printing in EducationEditor IJCATR
This paper provides a review of literature concerning the application of 3D printing in the education system. The review identifies that 3D Printing is being applied across the Educational levels [1] as well as in Libraries, Laboratories, and Distance education systems. The review also finds that 3D Printing is being used to teach both students and trainers about 3D Printing and to develop 3D Printing skills.
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Editor IJCATR
In underwater environment, for retrieval of information the routing mechanism is used. In routing mechanism there are three to four types of nodes are used, one is sink node which is deployed on the water surface and can collect the information, courier/super/AUV or dolphin powerful nodes are deployed in the middle of the water for forwarding the packets, ordinary nodes are also forwarder nodes which can be deployed from bottom to surface of the water and source nodes are deployed at the seabed which can extract the valuable information from the bottom of the sea. In underwater environment the battery power of the nodes is limited and that power can be enhanced through better selection of the routing algorithm. This paper focuses the energy-efficient routing algorithms for their routing mechanisms to prolong the battery power of the nodes. This paper also focuses the performance analysis of the energy-efficient algorithms under which we can examine the better performance of the route selection mechanism which can prolong the battery power of the node
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Editor IJCATR
The designing of routing algorithms faces many challenges in underwater environment like: propagation delay, acoustic channel behaviour, limited bandwidth, high bit error rate, limited battery power, underwater pressure, node mobility, localization 3D deployment, and underwater obstacles (voids). This paper focuses the underwater voids which affects the overall performance of the entire network. The majority of the researchers have used the better approaches for removal of voids through alternate path selection mechanism but still research needs improvement. This paper also focuses the architecture and its operation through merits and demerits of the existing algorithms. This research article further focuses the analytical method of the performance analysis of existing algorithms through which we found the better approach for removal of voids
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsEditor IJCATR
In this paper we consider the initial value problem for a plate type equation with variable coefficients and memory in
1 n R n ), which is of regularity-loss property. By using spectrally resolution, we study the pointwise estimates in the spectral
space of the fundamental solution to the corresponding linear problem. Appealing to this pointwise estimates, we obtain the global
existence and the decay estimates of solutions to the semilinear problem by employing the fixed point theorem
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
E-government Security Models
1. International Journal of Computer Applications Technology and Research
Volume 5– Issue 7, 439 - 442, 2016, ISSN:- 2319–8656
www.ijcat.com 439
E-government Security Models
Omar A. Ali
Department of Information
Systems
Najran University
Najran KSA
Talaat M. Wahbi
Department of Computer
Science and Technology
Sudan University of Science
and Technology
Khartoum, Sudan
Izzeldin M. Osman
Department of Computer
Science
Sudan University of Science
and Technology
Khartoum, Sudan
Abstract: E-government security is a key problem to restrict the construction and development of E-government systems in any
country over the world. E-Government security models are widely used in the implementation and development of e- government
systems. Due to the deference situation of the countries over the world there are various security models applied in each country. This
paper reviews different security models in e-government in order to determine important parameters for e-government strategic
planning.
Keywords: E-government, security model, ICT, layers, sub-layer
1. INTRODUCTION
Dependency on Information and Communication Technology
(ICT) for supporting core operations to both government and
private sector is increasing [1]. Similarly, organization’s
critical information has developed into a key strategic asset in
a competitive world [2]. Nevertheless, the pace of ICT
advancement such as development, deployment and use of e-
government infrastructures is much faster than the
development and deployment of security services, including
technical and the existing and new emerging security risks [3,
4]. Technical security aspects include hardware and software
solutions such as Access control and Antivirus mechanisms
[5, 6, 7]. The application of information security principles in
an e-government environment is a complex, multidimensional
issue involving people, technology and processes. E-
government security is considered one of the crucial factors
for achieving an advanced stage of e-government. As the
number of e-government services introduced to the user
increases, a higher level of e-government security is required.
2. REVIEW
In order to get the maximum decrease of data breaches and
get the maximum protection of critical data when using e-
government systems in any country over the world there
should be a security model to satisfy this purpose. The
security models of E-government may be based on layers [9],
cloud computing [10], based on service-oriented architecture
[15], access control policy [11], and security system based on
information security model [12].
2.1 The Five Security Layered-Model in
Dubai
In this model there are five layers. Each layer will mitigate
group of threats related to an e-services. The model is
composed of technology layer, policy layer, competency
layer, operational and management layer, and decision layer.
The technology layer for example will address all the
technological threats while the policy and competency layers
will address the threats on an e- service related to the human
aspect. Each layer is composed of detailed layer which is
called the sub-layer of the main layer [8]. See figure 1
showing the E-government security model in Dubai.
Figure. 1 E-government security model in Dubai
2.2 Government Cloud Computing
Proposed Model: Egyptian E-Government
Cloud Computing
The proposed hybrid model for Egyptian E-Government
Cloud Computing consists of three computing clouds; Inter-
Cloud computing, Intra- Cloud computing and Extra-Cloud
2. International Journal of Computer Applications Technology and Research
Volume 5– Issue 7, 439 - 442, 2016, ISSN:- 2319–8656
www.ijcat.com 440
computing, Figure 2. The three cloud models are analogs to
the terms Internet, Intranet and extranet in their functionality,
operation and management. Intra-Cloud computing "IACC" is
a private cloud which is dedicated to a single national entity
cluster, (see Figure 3). Members of that cluster are the only
legitimate users. Extra-Cloud computing "EXCC" is a
community cloud that enables entities from different clusters
to integrate and to aggregate their work as required. There are
two types of EXCC. The first type connects multiple IACC of
a specific national entity cluster, Figure 3. The second type
connects different national entity clusters that differ in their
functions and services, (see Figure 2). Inter-Cloud computing
"IECC" is a public cloud that enables any user (citizen, guest,
organizations) to require specific requests and receives their
responses or outcomes, (see Figure 2). In IECC, it is expected
to store the least sensitive data and to run the related
application software.
Figure. 2 Proposed model for Egyptian E-Government
Cloud Computing
Figure. 3 IACC and EXCC for National entity A.
2.3 A Secure Maturity Model for Protecting
e-Government Services: A Case of
Tanzania
The proposed secured e- Government maturity model consists
of four layers, namely: (1) secured digital presence, (2)
secured interaction, (3) secured transaction, and (4) secured
transformation. The implementation of the proposed model is
neither based on a specific technology/protocol nor a certain
security system/product, but rather an approach towards a
structured and efficient implementation of those technologies.
The security layers include technical and non-technical
security control elements. The proposed security layers are
further described in the following paragraphs. [10]
2.3.1 Secured Digital Presence
This stage involves simple provision of government
information through website (static) with basic information
that the citizen can access [11]. This is a one-way
communication between governments, businesses and
citizens. Generally, the information provided by organizations
at this stage are public and normally with zero security. At
this stage, the security layer should have the ability to verify
e- Government services identity in order to build trust
between government agencies and users. The users would like
to be sure that they are connected to the e-Government service
belonging to the administration in question [12].
2.3.2 Secured Interaction
At this stage the interaction between government and the
public (Government-to-Citizens and Government-to-
Businesses) is stimulated by various applications. Citizens can
ask questions via e-mail, use search engines and download
forms and documents [12]. The communication is performed
in two ways, but the interactions are relatively simple and
generally revolve around information provision. At this stage,
the security layer should have the ability to authenticate a
user/ citizen asking for a service. The most important security
aspects at this stage are identity authentication, availability
and integrity.
2.3.3 Secured Transaction
At this stage public organizations provide electronic
initiatives and services with capabilities and features that
facilitate clients to complete their transactions in full without
the necessity of visiting government offices [37]. The public
can carry out their financial transactions with the government
Such services also allow the government to function in a 24/7
mode. The most important security aspects at this stage are
personal information confidentiality, identity authentication,
availability, non-repudiation, accountability and integrity.
2.3.4 Secured Transformation
This stage allows users of e-Government services to interact
with government as one entity instead of Information systems
are integrated, and the citizens' individual government
organizations [14]. can get services at one virtual counter. The
integration of information systems can result in situations
where the privacy of individual citizens is in danger. The most
important security aspects of this stage are personal
information confidentiality, identity authentication,
availability, nonrepudiation, accountability and integrity. At
this stage, the security layer should restrict the utilization of
3. International Journal of Computer Applications Technology and Research
Volume 5– Issue 7, 439 - 442, 2016, ISSN:- 2319–8656
www.ijcat.com 441
personal information, and secure such information from
access by unintended parties. A government agency should be
able to authenticate another government agency that requires a
service on behalf of the users.
2.4 A Security E-government Model Based
on Service-oriented Architecture
Service-oriented architecture is an IT architectural style that
supports integrating business as linked services which users
can combine and reuse them in the production of business
applications [15]. It provides an effective way for constructing
loose coupled web services. It relies on services exposing
their functionality via interfaces that other services can
understand how to utilize those services. SOA logical
architecture is shown in Figure 4 [16].
Figure. 4 SOA logical architecture
The SOA technology framework to integrate E-government:
using BEPL implement work process; realizing seamless
integration between services by ESB. Taking the case of
online application processing, a scheme of integration E-
government system based on SOA is shown as Figure 5. [16]
Figure. 5 A scheme of integration E-government system
based on SOA
2.5 Research on Role-Based Access
Control Policy (RBAC) of E-government
The access control system includes subjects, objects and
access control policy, and their relationship is shown in figure
6 [17].
Figure. 6 Access Control System Model
The RBAC is a new access control technique and notion. It is
the development and amelioration of DAC and MAC, and it
has been regarded as an effective measure to resolve resource
unified access control of large information systems by the
public. The RBAC contains five kinds of entities, such as
users, roles, constraints, permissions, and sessions. In the
RBAC model, it injects the idea of roles between users and
access permissions, and a user connects with one or more
specific roles, and a role connects with one or more
permissions, and roles can be created or canceled according to
actual working requirements. The sessions show the
relationship between users and roles. The users should
activate roles by creating sessions every time and get the
specific resource access authorities as shown in Figure 7 [18-
19].
Figure. 7 Basic RBAC Model
2.6 Security System based on Information
Security Model
The system is designed through modularization and it is
mainly divided into initialization module, management
module and various application modules. In which, the
initialization module is used to manage the original data of the
initial management module and various application modules,
the management module is used to manage the content which
has effect in the overall system, such as the users, privileges
and a series of rules in the system. Various application
modules work together by using the initialized data and
through the transmission media to complete the overall
function of the system. The secure e-government system
structure is shown in Figure 8.
4. International Journal of Computer Applications Technology and Research
Volume 5– Issue 7, 439 - 442, 2016, ISSN:- 2319–8656
www.ijcat.com 442
Figure. 8 Secure e-government system
3. CONCLUSION
Based on the research that led up to this paper, the security
model for e-government that adopt layers in its structure is
more coherent and comprehensive because of covering all
threats that faced e-government in each country. Also this
type of models is so easy to be understandable to the
employees in any organization.
4. REFERENCES
[1] G. Dhillon, (2000). Challenges in managing Information
Security in the millennium, Idea Group Publisher, Las Vegas,
USA.
[2] S. Woodhouse, (2007). Information Security: End User
Behavior and Corporate Culture, 7th International Conference
on Computer and Information Technology. (IEEE). Pp 767-
774. University of Aizu. Fukushima, Japan.
[3] G. Karokola, L. Yngström, & S. Kowalski, (2010). A
Comparative Analysis of e-Government Maturity Models for
Developing Regions: The Need for Security Services.
International Journal of Electronic Government Research. 8:
1-25.
[4] P. W. Anderson. (2001). Information security governance.
information security technical report. 6: 60 – 70.
[5] G. McGraw, (2005). Software Security. Volume1.
Addison-Wesley software. USA.
[6] M. Bishop, (2006). Computer Security – Arts and Science.
Volume1. Addison-Wesley, USA.
[7] M. Wimmer, & B. Bredow, (2001). E-Government:
Aspect of Security on different layers, In: Proceedings. 12th
International Workshop. (Database and Expert Systems
Applications) Pp 350-355. IEEE, Linz University., Austria
[8] Al-Azazi, S (2008). Amulti-layer model for e-government
information security assessment. Grandfield university, dubai
[9] Hana, M (2013). E-Government Cloud Computing
Proposed Model: Egyptian E_Government Cloud Computing.
International Conference on Advances in Computing,
Communications and Informatics (ICACCI). Pp 848-852.
Electrical and Communication Department Canadian
International College ElSheikh Zaid. Egypt
[10] Waziri, M. Yonah , Z. (2014). A Secure Maturity Model
for Protecting e-Government Services: A Case of Tanzania.
Advances in Computer Science: An International Journal 3:
98-106.
[11] G. Karokola and L. Yngström, (2009). Discussing E-
Government Maturity Models for the Developing World-
Security View. Information Systems Security Association
Pp81-98.
[12] Zhang, F. (2008). Design of E-government Security
System based on Information Security Model. 2008
International Conference on Advanced Computer Theory and
Engineering. (Research Center of Cluster and Enterprise
Development) Pp359-362. Jiangxi University of Finance and
Economics. China
[13] www.clknet.or.tz J. Yonazi, Adoption of Transactional
Level e-Government Initiatives in Tanzania. (Retrieved
13Apr2014)
[14] www.utumishi.go.tz, President's Office, Public Service
Managements, Tanzania e-Government Strategy, ed, 2012.
(Retrieved 10Feb2013)
[15] Erl, T, (2005). Service-oriented Architecture: Concepts,
Technology, and Design. Volume2. Upper Saddle River:
Prentice Hall PTR, USA
[16] Ziyao W, Junjie N, Z Duan, (2008). SOA core
technologies and application, Publishing House of Electronics
Industry, Beijing, Pp.495-497,
[17] L Lin, Yongzhao Z, Yi N. (2006) Improved RBAC
model based on organization. Journal of Jiangsu University
(Natural Science Edition) 27(2):147-150
[18] Zeng Zhongping, Li Zonghua, Lu Xinhai. (2007). The
Access Control Policy Study of E-government Information
Resource Based on RBAC. Journal of Information, 10:39-41
[19] Barka E, Sandhu R S. (2000). Framework for role-based
delegation models. In: Proc. of the 16th Annual Computer
Security Application Conf. IEEE Computer Society Press. Pp
168-176