SlideShare a Scribd company logo
International Journal of Computer Applications Technology and Research
Volume 5– Issue 7, 439 - 442, 2016, ISSN:- 2319–8656
www.ijcat.com 439
E-government Security Models
Omar A. Ali
Department of Information
Systems
Najran University
Najran KSA
Talaat M. Wahbi
Department of Computer
Science and Technology
Sudan University of Science
and Technology
Khartoum, Sudan
Izzeldin M. Osman
Department of Computer
Science
Sudan University of Science
and Technology
Khartoum, Sudan
Abstract: E-government security is a key problem to restrict the construction and development of E-government systems in any
country over the world. E-Government security models are widely used in the implementation and development of e- government
systems. Due to the deference situation of the countries over the world there are various security models applied in each country. This
paper reviews different security models in e-government in order to determine important parameters for e-government strategic
planning.
Keywords: E-government, security model, ICT, layers, sub-layer
1. INTRODUCTION
Dependency on Information and Communication Technology
(ICT) for supporting core operations to both government and
private sector is increasing [1]. Similarly, organization’s
critical information has developed into a key strategic asset in
a competitive world [2]. Nevertheless, the pace of ICT
advancement such as development, deployment and use of e-
government infrastructures is much faster than the
development and deployment of security services, including
technical and the existing and new emerging security risks [3,
4]. Technical security aspects include hardware and software
solutions such as Access control and Antivirus mechanisms
[5, 6, 7]. The application of information security principles in
an e-government environment is a complex, multidimensional
issue involving people, technology and processes. E-
government security is considered one of the crucial factors
for achieving an advanced stage of e-government. As the
number of e-government services introduced to the user
increases, a higher level of e-government security is required.
2. REVIEW
In order to get the maximum decrease of data breaches and
get the maximum protection of critical data when using e-
government systems in any country over the world there
should be a security model to satisfy this purpose. The
security models of E-government may be based on layers [9],
cloud computing [10], based on service-oriented architecture
[15], access control policy [11], and security system based on
information security model [12].
2.1 The Five Security Layered-Model in
Dubai
In this model there are five layers. Each layer will mitigate
group of threats related to an e-services. The model is
composed of technology layer, policy layer, competency
layer, operational and management layer, and decision layer.
The technology layer for example will address all the
technological threats while the policy and competency layers
will address the threats on an e- service related to the human
aspect. Each layer is composed of detailed layer which is
called the sub-layer of the main layer [8]. See figure 1
showing the E-government security model in Dubai.
Figure. 1 E-government security model in Dubai
2.2 Government Cloud Computing
Proposed Model: Egyptian E-Government
Cloud Computing
The proposed hybrid model for Egyptian E-Government
Cloud Computing consists of three computing clouds; Inter-
Cloud computing, Intra- Cloud computing and Extra-Cloud
International Journal of Computer Applications Technology and Research
Volume 5– Issue 7, 439 - 442, 2016, ISSN:- 2319–8656
www.ijcat.com 440
computing, Figure 2. The three cloud models are analogs to
the terms Internet, Intranet and extranet in their functionality,
operation and management. Intra-Cloud computing "IACC" is
a private cloud which is dedicated to a single national entity
cluster, (see Figure 3). Members of that cluster are the only
legitimate users. Extra-Cloud computing "EXCC" is a
community cloud that enables entities from different clusters
to integrate and to aggregate their work as required. There are
two types of EXCC. The first type connects multiple IACC of
a specific national entity cluster, Figure 3. The second type
connects different national entity clusters that differ in their
functions and services, (see Figure 2). Inter-Cloud computing
"IECC" is a public cloud that enables any user (citizen, guest,
organizations) to require specific requests and receives their
responses or outcomes, (see Figure 2). In IECC, it is expected
to store the least sensitive data and to run the related
application software.
Figure. 2 Proposed model for Egyptian E-Government
Cloud Computing
Figure. 3 IACC and EXCC for National entity A.
2.3 A Secure Maturity Model for Protecting
e-Government Services: A Case of
Tanzania
The proposed secured e- Government maturity model consists
of four layers, namely: (1) secured digital presence, (2)
secured interaction, (3) secured transaction, and (4) secured
transformation. The implementation of the proposed model is
neither based on a specific technology/protocol nor a certain
security system/product, but rather an approach towards a
structured and efficient implementation of those technologies.
The security layers include technical and non-technical
security control elements. The proposed security layers are
further described in the following paragraphs. [10]
2.3.1 Secured Digital Presence
This stage involves simple provision of government
information through website (static) with basic information
that the citizen can access [11]. This is a one-way
communication between governments, businesses and
citizens. Generally, the information provided by organizations
at this stage are public and normally with zero security. At
this stage, the security layer should have the ability to verify
e- Government services identity in order to build trust
between government agencies and users. The users would like
to be sure that they are connected to the e-Government service
belonging to the administration in question [12].
2.3.2 Secured Interaction
At this stage the interaction between government and the
public (Government-to-Citizens and Government-to-
Businesses) is stimulated by various applications. Citizens can
ask questions via e-mail, use search engines and download
forms and documents [12]. The communication is performed
in two ways, but the interactions are relatively simple and
generally revolve around information provision. At this stage,
the security layer should have the ability to authenticate a
user/ citizen asking for a service. The most important security
aspects at this stage are identity authentication, availability
and integrity.
2.3.3 Secured Transaction
At this stage public organizations provide electronic
initiatives and services with capabilities and features that
facilitate clients to complete their transactions in full without
the necessity of visiting government offices [37]. The public
can carry out their financial transactions with the government
Such services also allow the government to function in a 24/7
mode. The most important security aspects at this stage are
personal information confidentiality, identity authentication,
availability, non-repudiation, accountability and integrity.
2.3.4 Secured Transformation
This stage allows users of e-Government services to interact
with government as one entity instead of Information systems
are integrated, and the citizens' individual government
organizations [14]. can get services at one virtual counter. The
integration of information systems can result in situations
where the privacy of individual citizens is in danger. The most
important security aspects of this stage are personal
information confidentiality, identity authentication,
availability, nonrepudiation, accountability and integrity. At
this stage, the security layer should restrict the utilization of
International Journal of Computer Applications Technology and Research
Volume 5– Issue 7, 439 - 442, 2016, ISSN:- 2319–8656
www.ijcat.com 441
personal information, and secure such information from
access by unintended parties. A government agency should be
able to authenticate another government agency that requires a
service on behalf of the users.
2.4 A Security E-government Model Based
on Service-oriented Architecture
Service-oriented architecture is an IT architectural style that
supports integrating business as linked services which users
can combine and reuse them in the production of business
applications [15]. It provides an effective way for constructing
loose coupled web services. It relies on services exposing
their functionality via interfaces that other services can
understand how to utilize those services. SOA logical
architecture is shown in Figure 4 [16].
Figure. 4 SOA logical architecture
The SOA technology framework to integrate E-government:
using BEPL implement work process; realizing seamless
integration between services by ESB. Taking the case of
online application processing, a scheme of integration E-
government system based on SOA is shown as Figure 5. [16]
Figure. 5 A scheme of integration E-government system
based on SOA
2.5 Research on Role-Based Access
Control Policy (RBAC) of E-government
The access control system includes subjects, objects and
access control policy, and their relationship is shown in figure
6 [17].
Figure. 6 Access Control System Model
The RBAC is a new access control technique and notion. It is
the development and amelioration of DAC and MAC, and it
has been regarded as an effective measure to resolve resource
unified access control of large information systems by the
public. The RBAC contains five kinds of entities, such as
users, roles, constraints, permissions, and sessions. In the
RBAC model, it injects the idea of roles between users and
access permissions, and a user connects with one or more
specific roles, and a role connects with one or more
permissions, and roles can be created or canceled according to
actual working requirements. The sessions show the
relationship between users and roles. The users should
activate roles by creating sessions every time and get the
specific resource access authorities as shown in Figure 7 [18-
19].
Figure. 7 Basic RBAC Model
2.6 Security System based on Information
Security Model
The system is designed through modularization and it is
mainly divided into initialization module, management
module and various application modules. In which, the
initialization module is used to manage the original data of the
initial management module and various application modules,
the management module is used to manage the content which
has effect in the overall system, such as the users, privileges
and a series of rules in the system. Various application
modules work together by using the initialized data and
through the transmission media to complete the overall
function of the system. The secure e-government system
structure is shown in Figure 8.
International Journal of Computer Applications Technology and Research
Volume 5– Issue 7, 439 - 442, 2016, ISSN:- 2319–8656
www.ijcat.com 442
Figure. 8 Secure e-government system
3. CONCLUSION
Based on the research that led up to this paper, the security
model for e-government that adopt layers in its structure is
more coherent and comprehensive because of covering all
threats that faced e-government in each country. Also this
type of models is so easy to be understandable to the
employees in any organization.
4. REFERENCES
[1] G. Dhillon, (2000). Challenges in managing Information
Security in the millennium, Idea Group Publisher, Las Vegas,
USA.
[2] S. Woodhouse, (2007). Information Security: End User
Behavior and Corporate Culture, 7th International Conference
on Computer and Information Technology. (IEEE). Pp 767-
774. University of Aizu. Fukushima, Japan.
[3] G. Karokola, L. Yngström, & S. Kowalski, (2010). A
Comparative Analysis of e-Government Maturity Models for
Developing Regions: The Need for Security Services.
International Journal of Electronic Government Research. 8:
1-25.
[4] P. W. Anderson. (2001). Information security governance.
information security technical report. 6: 60 – 70.
[5] G. McGraw, (2005). Software Security. Volume1.
Addison-Wesley software. USA.
[6] M. Bishop, (2006). Computer Security – Arts and Science.
Volume1. Addison-Wesley, USA.
[7] M. Wimmer, & B. Bredow, (2001). E-Government:
Aspect of Security on different layers, In: Proceedings. 12th
International Workshop. (Database and Expert Systems
Applications) Pp 350-355. IEEE, Linz University., Austria
[8] Al-Azazi, S (2008). Amulti-layer model for e-government
information security assessment. Grandfield university, dubai
[9] Hana, M (2013). E-Government Cloud Computing
Proposed Model: Egyptian E_Government Cloud Computing.
International Conference on Advances in Computing,
Communications and Informatics (ICACCI). Pp 848-852.
Electrical and Communication Department Canadian
International College ElSheikh Zaid. Egypt
[10] Waziri, M. Yonah , Z. (2014). A Secure Maturity Model
for Protecting e-Government Services: A Case of Tanzania.
Advances in Computer Science: An International Journal 3:
98-106.
[11] G. Karokola and L. Yngström, (2009). Discussing E-
Government Maturity Models for the Developing World-
Security View. Information Systems Security Association
Pp81-98.
[12] Zhang, F. (2008). Design of E-government Security
System based on Information Security Model. 2008
International Conference on Advanced Computer Theory and
Engineering. (Research Center of Cluster and Enterprise
Development) Pp359-362. Jiangxi University of Finance and
Economics. China
[13] www.clknet.or.tz J. Yonazi, Adoption of Transactional
Level e-Government Initiatives in Tanzania. (Retrieved
13Apr2014)
[14] www.utumishi.go.tz, President's Office, Public Service
Managements, Tanzania e-Government Strategy, ed, 2012.
(Retrieved 10Feb2013)
[15] Erl, T, (2005). Service-oriented Architecture: Concepts,
Technology, and Design. Volume2. Upper Saddle River:
Prentice Hall PTR, USA
[16] Ziyao W, Junjie N, Z Duan, (2008). SOA core
technologies and application, Publishing House of Electronics
Industry, Beijing, Pp.495-497,
[17] L Lin, Yongzhao Z, Yi N. (2006) Improved RBAC
model based on organization. Journal of Jiangsu University
(Natural Science Edition) 27(2):147-150
[18] Zeng Zhongping, Li Zonghua, Lu Xinhai. (2007). The
Access Control Policy Study of E-government Information
Resource Based on RBAC. Journal of Information, 10:39-41
[19] Barka E, Sandhu R S. (2000). Framework for role-based
delegation models. In: Proc. of the 16th Annual Computer
Security Application Conf. IEEE Computer Society Press. Pp
168-176

More Related Content

What's hot

NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference Architecture
Thanakrit Lersmethasakul
 
HCI Presentation
HCI PresentationHCI Presentation
HCI Presentation
Abdul Rasheed Memon
 
Chapter12 designing databases
Chapter12 designing databasesChapter12 designing databases
Chapter12 designing databases
Dhani Ahmad
 
Smart Energy Management
Smart Energy ManagementSmart Energy Management
Smart Energy Management
Marie-Paule Odini
 
Component and Deployment Diagram - Brief Overview
Component and Deployment Diagram - Brief OverviewComponent and Deployment Diagram - Brief Overview
Component and Deployment Diagram - Brief Overview
Rajiv Kumar
 
Common Standards in Cloud Computing
Common Standards in Cloud ComputingCommon Standards in Cloud Computing
Common Standards in Cloud Computing
mrzahidfaiz.blogspot.com
 
Vision of cloud computing
Vision of cloud computingVision of cloud computing
Vision of cloud computing
gaurav jain
 
Chapter14 designing interfaces and dialogues
Chapter14 designing interfaces and dialoguesChapter14 designing interfaces and dialogues
Chapter14 designing interfaces and dialogues
Dhani Ahmad
 
Internet of things unit-1
Internet of things unit-1Internet of things unit-1
Internet of things unit-1
Srimatre K
 
Off the-shelf components (cots)
Off the-shelf components (cots)Off the-shelf components (cots)
Off the-shelf components (cots)
Himanshu
 
IOT PROTOCOLS.pptx
IOT PROTOCOLS.pptxIOT PROTOCOLS.pptx
IOT PROTOCOLS.pptx
DRREC
 
Unit 4
Unit 4Unit 4
Unit 4
Ravi Kumar
 
Iot and cloud computing
Iot and cloud computingIot and cloud computing
Iot and cloud computing
eteshagarwal1
 
Deployment Models of Cloud Computing.pptx
Deployment Models of Cloud Computing.pptxDeployment Models of Cloud Computing.pptx
Deployment Models of Cloud Computing.pptx
Jaya Silwal
 
Online movie ticket booking system
Online movie ticket booking systemOnline movie ticket booking system
Online movie ticket booking system
Sikandar Pandit
 
Third party cloud services cloud computing
Third party cloud services cloud computingThird party cloud services cloud computing
Third party cloud services cloud computing
SohailAliMalik
 
Movie Ticket Booking Website Project Presentation
Movie Ticket Booking Website Project PresentationMovie Ticket Booking Website Project Presentation
Movie Ticket Booking Website Project Presentation
Avinandan Ganguly
 

What's hot (20)

NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference Architecture
 
HCI Presentation
HCI PresentationHCI Presentation
HCI Presentation
 
Chapter12 designing databases
Chapter12 designing databasesChapter12 designing databases
Chapter12 designing databases
 
Smart Energy Management
Smart Energy ManagementSmart Energy Management
Smart Energy Management
 
Component and Deployment Diagram - Brief Overview
Component and Deployment Diagram - Brief OverviewComponent and Deployment Diagram - Brief Overview
Component and Deployment Diagram - Brief Overview
 
Common Standards in Cloud Computing
Common Standards in Cloud ComputingCommon Standards in Cloud Computing
Common Standards in Cloud Computing
 
Vision of cloud computing
Vision of cloud computingVision of cloud computing
Vision of cloud computing
 
Chapter14 designing interfaces and dialogues
Chapter14 designing interfaces and dialoguesChapter14 designing interfaces and dialogues
Chapter14 designing interfaces and dialogues
 
Internet of things unit-1
Internet of things unit-1Internet of things unit-1
Internet of things unit-1
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Wot
WotWot
Wot
 
Off the-shelf components (cots)
Off the-shelf components (cots)Off the-shelf components (cots)
Off the-shelf components (cots)
 
Court Case Management System
Court Case Management SystemCourt Case Management System
Court Case Management System
 
IOT PROTOCOLS.pptx
IOT PROTOCOLS.pptxIOT PROTOCOLS.pptx
IOT PROTOCOLS.pptx
 
Unit 4
Unit 4Unit 4
Unit 4
 
Iot and cloud computing
Iot and cloud computingIot and cloud computing
Iot and cloud computing
 
Deployment Models of Cloud Computing.pptx
Deployment Models of Cloud Computing.pptxDeployment Models of Cloud Computing.pptx
Deployment Models of Cloud Computing.pptx
 
Online movie ticket booking system
Online movie ticket booking systemOnline movie ticket booking system
Online movie ticket booking system
 
Third party cloud services cloud computing
Third party cloud services cloud computingThird party cloud services cloud computing
Third party cloud services cloud computing
 
Movie Ticket Booking Website Project Presentation
Movie Ticket Booking Website Project PresentationMovie Ticket Booking Website Project Presentation
Movie Ticket Booking Website Project Presentation
 

Viewers also liked

Security Model for Hierarchical Clustered Wireless Sensor Networks
Security Model for Hierarchical Clustered Wireless Sensor NetworksSecurity Model for Hierarchical Clustered Wireless Sensor Networks
Security Model for Hierarchical Clustered Wireless Sensor Networks
CSCJournals
 
A Proposed Security Model for Web Enabled Business Process Management System
A Proposed Security Model for Web Enabled Business Process Management SystemA Proposed Security Model for Web Enabled Business Process Management System
A Proposed Security Model for Web Enabled Business Process Management System
CSCJournals
 
Security Models in Cellular Wireless Networks
Security Models in Cellular Wireless NetworksSecurity Models in Cellular Wireless Networks
Security Models in Cellular Wireless NetworksWilliam Chipman
 
E-governance-and-Security
E-governance-and-SecurityE-governance-and-Security
E-governance-and-Security
anupriti
 
Biometric identification
Biometric identificationBiometric identification
Biometric identification
Bozhidar Bozhanov
 
E-government architecture
E-government architectureE-government architecture
E-government architecture
Bozhidar Bozhanov
 
SOA Security Model For EAI
SOA Security Model For EAISOA Security Model For EAI
SOA Security Model For EAI
vivekjv
 

Viewers also liked (7)

Security Model for Hierarchical Clustered Wireless Sensor Networks
Security Model for Hierarchical Clustered Wireless Sensor NetworksSecurity Model for Hierarchical Clustered Wireless Sensor Networks
Security Model for Hierarchical Clustered Wireless Sensor Networks
 
A Proposed Security Model for Web Enabled Business Process Management System
A Proposed Security Model for Web Enabled Business Process Management SystemA Proposed Security Model for Web Enabled Business Process Management System
A Proposed Security Model for Web Enabled Business Process Management System
 
Security Models in Cellular Wireless Networks
Security Models in Cellular Wireless NetworksSecurity Models in Cellular Wireless Networks
Security Models in Cellular Wireless Networks
 
E-governance-and-Security
E-governance-and-SecurityE-governance-and-Security
E-governance-and-Security
 
Biometric identification
Biometric identificationBiometric identification
Biometric identification
 
E-government architecture
E-government architectureE-government architecture
E-government architecture
 
SOA Security Model For EAI
SOA Security Model For EAISOA Security Model For EAI
SOA Security Model For EAI
 

Similar to E-government Security Models

Cloud computing technology for egovernment architecture
Cloud computing technology for egovernment architectureCloud computing technology for egovernment architecture
Cloud computing technology for egovernment architecture
ijfcstjournal
 
A NOVEL SERVICE ORIENTED ARCHITECTURE (SOA) TO SECURE SERVICES IN E-CITY
A NOVEL SERVICE ORIENTED ARCHITECTURE (SOA) TO SECURE SERVICES IN E-CITYA NOVEL SERVICE ORIENTED ARCHITECTURE (SOA) TO SECURE SERVICES IN E-CITY
A NOVEL SERVICE ORIENTED ARCHITECTURE (SOA) TO SECURE SERVICES IN E-CITY
ijsptm
 
Government cloud system for Jordan Government cloud system for Jordan
Government cloud system for Jordan Government cloud system for JordanGovernment cloud system for Jordan Government cloud system for Jordan
Government cloud system for Jordan Government cloud system for Jordan
BRNSSPublicationHubI
 
MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE FOR AUTOMATING E-GOVERNMENT SERV...
MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE FOR AUTOMATING E-GOVERNMENT SERV...MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE FOR AUTOMATING E-GOVERNMENT SERV...
MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE FOR AUTOMATING E-GOVERNMENT SERV...
IRJET Journal
 
Trust management techniques_for_the_internet_of_things_a_survey-converted
Trust management techniques_for_the_internet_of_things_a_survey-convertedTrust management techniques_for_the_internet_of_things_a_survey-converted
Trust management techniques_for_the_internet_of_things_a_survey-converted
tanvir616
 
PKI IN Government Identity Management Systems
PKI IN Government Identity Management SystemsPKI IN Government Identity Management Systems
PKI IN Government Identity Management Systems
Arab Federation for Digital Economy
 
Challenges of Technology Infrastructure Availability in EGovernance Program I...
Challenges of Technology Infrastructure Availability in EGovernance Program I...Challenges of Technology Infrastructure Availability in EGovernance Program I...
Challenges of Technology Infrastructure Availability in EGovernance Program I...
IOSR Journals
 
5. ijece guideforauthors 2012 edit sat
5. ijece guideforauthors 2012 edit sat5. ijece guideforauthors 2012 edit sat
5. ijece guideforauthors 2012 edit sat
IAESIJEECS
 
Across the world, governments are trying to present, in the best p.docx
Across the world, governments are trying to present, in the best p.docxAcross the world, governments are trying to present, in the best p.docx
Across the world, governments are trying to present, in the best p.docx
daniahendric
 
Design and Implementation Security Model for Sudanese E-government
Design and Implementation Security Model for Sudanese E-governmentDesign and Implementation Security Model for Sudanese E-government
Design and Implementation Security Model for Sudanese E-government
Editor IJCATR
 
Barriers to government cloud adoption
Barriers to government cloud adoptionBarriers to government cloud adoption
Barriers to government cloud adoption
IJMIT JOURNAL
 
Security Solutions against Computer Networks Threats
Security Solutions against Computer Networks ThreatsSecurity Solutions against Computer Networks Threats
Security Solutions against Computer Networks Threats
Eswar Publications
 
Addressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud ComputingAddressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud Computing
Editor IJCATR
 
A Centralized Multimodal Authentication Platform with trust model approach fo...
A Centralized Multimodal Authentication Platform with trust model approach fo...A Centralized Multimodal Authentication Platform with trust model approach fo...
A Centralized Multimodal Authentication Platform with trust model approach fo...
Association of Scientists, Developers and Faculties
 
Best practice framework for information technology security governance in In...
Best practice framework for information technology security  governance in In...Best practice framework for information technology security  governance in In...
Best practice framework for information technology security governance in In...
IJECEIAES
 
Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture
IJECEIAES
 
FACTORS AFFECTING E-GOVERNMENT ADOPTION IN THE DEMOCRATIC REPUBLIC OF CONGO
FACTORS AFFECTING E-GOVERNMENT ADOPTION IN THE DEMOCRATIC REPUBLIC OF CONGOFACTORS AFFECTING E-GOVERNMENT ADOPTION IN THE DEMOCRATIC REPUBLIC OF CONGO
FACTORS AFFECTING E-GOVERNMENT ADOPTION IN THE DEMOCRATIC REPUBLIC OF CONGO
IRJET Journal
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
IJCSIS Research Publications
 
A Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingA Review On Data Security In Cloud Computing
A Review On Data Security In Cloud Computing
Yolanda Ivey
 

Similar to E-government Security Models (20)

Cloud computing technology for egovernment architecture
Cloud computing technology for egovernment architectureCloud computing technology for egovernment architecture
Cloud computing technology for egovernment architecture
 
A NOVEL SERVICE ORIENTED ARCHITECTURE (SOA) TO SECURE SERVICES IN E-CITY
A NOVEL SERVICE ORIENTED ARCHITECTURE (SOA) TO SECURE SERVICES IN E-CITYA NOVEL SERVICE ORIENTED ARCHITECTURE (SOA) TO SECURE SERVICES IN E-CITY
A NOVEL SERVICE ORIENTED ARCHITECTURE (SOA) TO SECURE SERVICES IN E-CITY
 
Government cloud system for Jordan Government cloud system for Jordan
Government cloud system for Jordan Government cloud system for JordanGovernment cloud system for Jordan Government cloud system for Jordan
Government cloud system for Jordan Government cloud system for Jordan
 
MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE FOR AUTOMATING E-GOVERNMENT SERV...
MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE FOR AUTOMATING E-GOVERNMENT SERV...MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE FOR AUTOMATING E-GOVERNMENT SERV...
MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE FOR AUTOMATING E-GOVERNMENT SERV...
 
Trust management techniques_for_the_internet_of_things_a_survey-converted
Trust management techniques_for_the_internet_of_things_a_survey-convertedTrust management techniques_for_the_internet_of_things_a_survey-converted
Trust management techniques_for_the_internet_of_things_a_survey-converted
 
Ef36800805
Ef36800805Ef36800805
Ef36800805
 
PKI IN Government Identity Management Systems
PKI IN Government Identity Management SystemsPKI IN Government Identity Management Systems
PKI IN Government Identity Management Systems
 
Challenges of Technology Infrastructure Availability in EGovernance Program I...
Challenges of Technology Infrastructure Availability in EGovernance Program I...Challenges of Technology Infrastructure Availability in EGovernance Program I...
Challenges of Technology Infrastructure Availability in EGovernance Program I...
 
5. ijece guideforauthors 2012 edit sat
5. ijece guideforauthors 2012 edit sat5. ijece guideforauthors 2012 edit sat
5. ijece guideforauthors 2012 edit sat
 
Across the world, governments are trying to present, in the best p.docx
Across the world, governments are trying to present, in the best p.docxAcross the world, governments are trying to present, in the best p.docx
Across the world, governments are trying to present, in the best p.docx
 
Design and Implementation Security Model for Sudanese E-government
Design and Implementation Security Model for Sudanese E-governmentDesign and Implementation Security Model for Sudanese E-government
Design and Implementation Security Model for Sudanese E-government
 
Barriers to government cloud adoption
Barriers to government cloud adoptionBarriers to government cloud adoption
Barriers to government cloud adoption
 
Security Solutions against Computer Networks Threats
Security Solutions against Computer Networks ThreatsSecurity Solutions against Computer Networks Threats
Security Solutions against Computer Networks Threats
 
Addressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud ComputingAddressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud Computing
 
A Centralized Multimodal Authentication Platform with trust model approach fo...
A Centralized Multimodal Authentication Platform with trust model approach fo...A Centralized Multimodal Authentication Platform with trust model approach fo...
A Centralized Multimodal Authentication Platform with trust model approach fo...
 
Best practice framework for information technology security governance in In...
Best practice framework for information technology security  governance in In...Best practice framework for information technology security  governance in In...
Best practice framework for information technology security governance in In...
 
Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture
 
FACTORS AFFECTING E-GOVERNMENT ADOPTION IN THE DEMOCRATIC REPUBLIC OF CONGO
FACTORS AFFECTING E-GOVERNMENT ADOPTION IN THE DEMOCRATIC REPUBLIC OF CONGOFACTORS AFFECTING E-GOVERNMENT ADOPTION IN THE DEMOCRATIC REPUBLIC OF CONGO
FACTORS AFFECTING E-GOVERNMENT ADOPTION IN THE DEMOCRATIC REPUBLIC OF CONGO
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
 
A Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingA Review On Data Security In Cloud Computing
A Review On Data Security In Cloud Computing
 

More from Editor IJCATR

Text Mining in Digital Libraries using OKAPI BM25 Model
 Text Mining in Digital Libraries using OKAPI BM25 Model Text Mining in Digital Libraries using OKAPI BM25 Model
Text Mining in Digital Libraries using OKAPI BM25 Model
Editor IJCATR
 
Green Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyGreen Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendly
Editor IJCATR
 
Policies for Green Computing and E-Waste in Nigeria
 Policies for Green Computing and E-Waste in Nigeria Policies for Green Computing and E-Waste in Nigeria
Policies for Green Computing and E-Waste in Nigeria
Editor IJCATR
 
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Editor IJCATR
 
Optimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsOptimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation Conditions
Editor IJCATR
 
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Editor IJCATR
 
Web Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteWeb Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source Site
Editor IJCATR
 
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 Evaluating Semantic Similarity between Biomedical Concepts/Classes through S... Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Editor IJCATR
 
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 Semantic Similarity Measures between Terms in the Biomedical Domain within f... Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Editor IJCATR
 
A Strategy for Improving the Performance of Small Files in Openstack Swift
 A Strategy for Improving the Performance of Small Files in Openstack Swift  A Strategy for Improving the Performance of Small Files in Openstack Swift
A Strategy for Improving the Performance of Small Files in Openstack Swift
Editor IJCATR
 
Integrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationIntegrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and Registration
Editor IJCATR
 
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 Assessment of the Efficiency of Customer Order Management System: A Case Stu... Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Editor IJCATR
 
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Editor IJCATR
 
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Editor IJCATR
 
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Editor IJCATR
 
Hangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineHangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector Machine
Editor IJCATR
 
Application of 3D Printing in Education
Application of 3D Printing in EducationApplication of 3D Printing in Education
Application of 3D Printing in Education
Editor IJCATR
 
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Editor IJCATR
 
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Editor IJCATR
 
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsDecay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
Editor IJCATR
 

More from Editor IJCATR (20)

Text Mining in Digital Libraries using OKAPI BM25 Model
 Text Mining in Digital Libraries using OKAPI BM25 Model Text Mining in Digital Libraries using OKAPI BM25 Model
Text Mining in Digital Libraries using OKAPI BM25 Model
 
Green Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyGreen Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendly
 
Policies for Green Computing and E-Waste in Nigeria
 Policies for Green Computing and E-Waste in Nigeria Policies for Green Computing and E-Waste in Nigeria
Policies for Green Computing and E-Waste in Nigeria
 
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
 
Optimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsOptimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation Conditions
 
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
 
Web Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteWeb Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source Site
 
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 Evaluating Semantic Similarity between Biomedical Concepts/Classes through S... Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 Semantic Similarity Measures between Terms in the Biomedical Domain within f... Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 
A Strategy for Improving the Performance of Small Files in Openstack Swift
 A Strategy for Improving the Performance of Small Files in Openstack Swift  A Strategy for Improving the Performance of Small Files in Openstack Swift
A Strategy for Improving the Performance of Small Files in Openstack Swift
 
Integrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationIntegrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and Registration
 
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 Assessment of the Efficiency of Customer Order Management System: A Case Stu... Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
 
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
 
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
 
Hangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineHangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector Machine
 
Application of 3D Printing in Education
Application of 3D Printing in EducationApplication of 3D Printing in Education
Application of 3D Printing in Education
 
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
 
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
 
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsDecay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
 

Recently uploaded

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 

Recently uploaded (20)

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 

E-government Security Models

  • 1. International Journal of Computer Applications Technology and Research Volume 5– Issue 7, 439 - 442, 2016, ISSN:- 2319–8656 www.ijcat.com 439 E-government Security Models Omar A. Ali Department of Information Systems Najran University Najran KSA Talaat M. Wahbi Department of Computer Science and Technology Sudan University of Science and Technology Khartoum, Sudan Izzeldin M. Osman Department of Computer Science Sudan University of Science and Technology Khartoum, Sudan Abstract: E-government security is a key problem to restrict the construction and development of E-government systems in any country over the world. E-Government security models are widely used in the implementation and development of e- government systems. Due to the deference situation of the countries over the world there are various security models applied in each country. This paper reviews different security models in e-government in order to determine important parameters for e-government strategic planning. Keywords: E-government, security model, ICT, layers, sub-layer 1. INTRODUCTION Dependency on Information and Communication Technology (ICT) for supporting core operations to both government and private sector is increasing [1]. Similarly, organization’s critical information has developed into a key strategic asset in a competitive world [2]. Nevertheless, the pace of ICT advancement such as development, deployment and use of e- government infrastructures is much faster than the development and deployment of security services, including technical and the existing and new emerging security risks [3, 4]. Technical security aspects include hardware and software solutions such as Access control and Antivirus mechanisms [5, 6, 7]. The application of information security principles in an e-government environment is a complex, multidimensional issue involving people, technology and processes. E- government security is considered one of the crucial factors for achieving an advanced stage of e-government. As the number of e-government services introduced to the user increases, a higher level of e-government security is required. 2. REVIEW In order to get the maximum decrease of data breaches and get the maximum protection of critical data when using e- government systems in any country over the world there should be a security model to satisfy this purpose. The security models of E-government may be based on layers [9], cloud computing [10], based on service-oriented architecture [15], access control policy [11], and security system based on information security model [12]. 2.1 The Five Security Layered-Model in Dubai In this model there are five layers. Each layer will mitigate group of threats related to an e-services. The model is composed of technology layer, policy layer, competency layer, operational and management layer, and decision layer. The technology layer for example will address all the technological threats while the policy and competency layers will address the threats on an e- service related to the human aspect. Each layer is composed of detailed layer which is called the sub-layer of the main layer [8]. See figure 1 showing the E-government security model in Dubai. Figure. 1 E-government security model in Dubai 2.2 Government Cloud Computing Proposed Model: Egyptian E-Government Cloud Computing The proposed hybrid model for Egyptian E-Government Cloud Computing consists of three computing clouds; Inter- Cloud computing, Intra- Cloud computing and Extra-Cloud
  • 2. International Journal of Computer Applications Technology and Research Volume 5– Issue 7, 439 - 442, 2016, ISSN:- 2319–8656 www.ijcat.com 440 computing, Figure 2. The three cloud models are analogs to the terms Internet, Intranet and extranet in their functionality, operation and management. Intra-Cloud computing "IACC" is a private cloud which is dedicated to a single national entity cluster, (see Figure 3). Members of that cluster are the only legitimate users. Extra-Cloud computing "EXCC" is a community cloud that enables entities from different clusters to integrate and to aggregate their work as required. There are two types of EXCC. The first type connects multiple IACC of a specific national entity cluster, Figure 3. The second type connects different national entity clusters that differ in their functions and services, (see Figure 2). Inter-Cloud computing "IECC" is a public cloud that enables any user (citizen, guest, organizations) to require specific requests and receives their responses or outcomes, (see Figure 2). In IECC, it is expected to store the least sensitive data and to run the related application software. Figure. 2 Proposed model for Egyptian E-Government Cloud Computing Figure. 3 IACC and EXCC for National entity A. 2.3 A Secure Maturity Model for Protecting e-Government Services: A Case of Tanzania The proposed secured e- Government maturity model consists of four layers, namely: (1) secured digital presence, (2) secured interaction, (3) secured transaction, and (4) secured transformation. The implementation of the proposed model is neither based on a specific technology/protocol nor a certain security system/product, but rather an approach towards a structured and efficient implementation of those technologies. The security layers include technical and non-technical security control elements. The proposed security layers are further described in the following paragraphs. [10] 2.3.1 Secured Digital Presence This stage involves simple provision of government information through website (static) with basic information that the citizen can access [11]. This is a one-way communication between governments, businesses and citizens. Generally, the information provided by organizations at this stage are public and normally with zero security. At this stage, the security layer should have the ability to verify e- Government services identity in order to build trust between government agencies and users. The users would like to be sure that they are connected to the e-Government service belonging to the administration in question [12]. 2.3.2 Secured Interaction At this stage the interaction between government and the public (Government-to-Citizens and Government-to- Businesses) is stimulated by various applications. Citizens can ask questions via e-mail, use search engines and download forms and documents [12]. The communication is performed in two ways, but the interactions are relatively simple and generally revolve around information provision. At this stage, the security layer should have the ability to authenticate a user/ citizen asking for a service. The most important security aspects at this stage are identity authentication, availability and integrity. 2.3.3 Secured Transaction At this stage public organizations provide electronic initiatives and services with capabilities and features that facilitate clients to complete their transactions in full without the necessity of visiting government offices [37]. The public can carry out their financial transactions with the government Such services also allow the government to function in a 24/7 mode. The most important security aspects at this stage are personal information confidentiality, identity authentication, availability, non-repudiation, accountability and integrity. 2.3.4 Secured Transformation This stage allows users of e-Government services to interact with government as one entity instead of Information systems are integrated, and the citizens' individual government organizations [14]. can get services at one virtual counter. The integration of information systems can result in situations where the privacy of individual citizens is in danger. The most important security aspects of this stage are personal information confidentiality, identity authentication, availability, nonrepudiation, accountability and integrity. At this stage, the security layer should restrict the utilization of
  • 3. International Journal of Computer Applications Technology and Research Volume 5– Issue 7, 439 - 442, 2016, ISSN:- 2319–8656 www.ijcat.com 441 personal information, and secure such information from access by unintended parties. A government agency should be able to authenticate another government agency that requires a service on behalf of the users. 2.4 A Security E-government Model Based on Service-oriented Architecture Service-oriented architecture is an IT architectural style that supports integrating business as linked services which users can combine and reuse them in the production of business applications [15]. It provides an effective way for constructing loose coupled web services. It relies on services exposing their functionality via interfaces that other services can understand how to utilize those services. SOA logical architecture is shown in Figure 4 [16]. Figure. 4 SOA logical architecture The SOA technology framework to integrate E-government: using BEPL implement work process; realizing seamless integration between services by ESB. Taking the case of online application processing, a scheme of integration E- government system based on SOA is shown as Figure 5. [16] Figure. 5 A scheme of integration E-government system based on SOA 2.5 Research on Role-Based Access Control Policy (RBAC) of E-government The access control system includes subjects, objects and access control policy, and their relationship is shown in figure 6 [17]. Figure. 6 Access Control System Model The RBAC is a new access control technique and notion. It is the development and amelioration of DAC and MAC, and it has been regarded as an effective measure to resolve resource unified access control of large information systems by the public. The RBAC contains five kinds of entities, such as users, roles, constraints, permissions, and sessions. In the RBAC model, it injects the idea of roles between users and access permissions, and a user connects with one or more specific roles, and a role connects with one or more permissions, and roles can be created or canceled according to actual working requirements. The sessions show the relationship between users and roles. The users should activate roles by creating sessions every time and get the specific resource access authorities as shown in Figure 7 [18- 19]. Figure. 7 Basic RBAC Model 2.6 Security System based on Information Security Model The system is designed through modularization and it is mainly divided into initialization module, management module and various application modules. In which, the initialization module is used to manage the original data of the initial management module and various application modules, the management module is used to manage the content which has effect in the overall system, such as the users, privileges and a series of rules in the system. Various application modules work together by using the initialized data and through the transmission media to complete the overall function of the system. The secure e-government system structure is shown in Figure 8.
  • 4. International Journal of Computer Applications Technology and Research Volume 5– Issue 7, 439 - 442, 2016, ISSN:- 2319–8656 www.ijcat.com 442 Figure. 8 Secure e-government system 3. CONCLUSION Based on the research that led up to this paper, the security model for e-government that adopt layers in its structure is more coherent and comprehensive because of covering all threats that faced e-government in each country. Also this type of models is so easy to be understandable to the employees in any organization. 4. REFERENCES [1] G. Dhillon, (2000). Challenges in managing Information Security in the millennium, Idea Group Publisher, Las Vegas, USA. [2] S. Woodhouse, (2007). Information Security: End User Behavior and Corporate Culture, 7th International Conference on Computer and Information Technology. (IEEE). Pp 767- 774. University of Aizu. Fukushima, Japan. [3] G. Karokola, L. Yngström, & S. Kowalski, (2010). A Comparative Analysis of e-Government Maturity Models for Developing Regions: The Need for Security Services. International Journal of Electronic Government Research. 8: 1-25. [4] P. W. Anderson. (2001). Information security governance. information security technical report. 6: 60 – 70. [5] G. McGraw, (2005). Software Security. Volume1. Addison-Wesley software. USA. [6] M. Bishop, (2006). Computer Security – Arts and Science. Volume1. Addison-Wesley, USA. [7] M. Wimmer, & B. Bredow, (2001). E-Government: Aspect of Security on different layers, In: Proceedings. 12th International Workshop. (Database and Expert Systems Applications) Pp 350-355. IEEE, Linz University., Austria [8] Al-Azazi, S (2008). Amulti-layer model for e-government information security assessment. Grandfield university, dubai [9] Hana, M (2013). E-Government Cloud Computing Proposed Model: Egyptian E_Government Cloud Computing. International Conference on Advances in Computing, Communications and Informatics (ICACCI). Pp 848-852. Electrical and Communication Department Canadian International College ElSheikh Zaid. Egypt [10] Waziri, M. Yonah , Z. (2014). A Secure Maturity Model for Protecting e-Government Services: A Case of Tanzania. Advances in Computer Science: An International Journal 3: 98-106. [11] G. Karokola and L. Yngström, (2009). Discussing E- Government Maturity Models for the Developing World- Security View. Information Systems Security Association Pp81-98. [12] Zhang, F. (2008). Design of E-government Security System based on Information Security Model. 2008 International Conference on Advanced Computer Theory and Engineering. (Research Center of Cluster and Enterprise Development) Pp359-362. Jiangxi University of Finance and Economics. China [13] www.clknet.or.tz J. Yonazi, Adoption of Transactional Level e-Government Initiatives in Tanzania. (Retrieved 13Apr2014) [14] www.utumishi.go.tz, President's Office, Public Service Managements, Tanzania e-Government Strategy, ed, 2012. (Retrieved 10Feb2013) [15] Erl, T, (2005). Service-oriented Architecture: Concepts, Technology, and Design. Volume2. Upper Saddle River: Prentice Hall PTR, USA [16] Ziyao W, Junjie N, Z Duan, (2008). SOA core technologies and application, Publishing House of Electronics Industry, Beijing, Pp.495-497, [17] L Lin, Yongzhao Z, Yi N. (2006) Improved RBAC model based on organization. Journal of Jiangsu University (Natural Science Edition) 27(2):147-150 [18] Zeng Zhongping, Li Zonghua, Lu Xinhai. (2007). The Access Control Policy Study of E-government Information Resource Based on RBAC. Journal of Information, 10:39-41 [19] Barka E, Sandhu R S. (2000). Framework for role-based delegation models. In: Proc. of the 16th Annual Computer Security Application Conf. IEEE Computer Society Press. Pp 168-176