Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

A review of Fuzzy Mechanismsfor E-government Security

Print
PDF
International Journal of Computer Applications
© 2011 by IJCA Journal
Volume 34 - Number 7
Year of Publication: 2011
Authors:
Nadir Omer FadlElssied
Othman Ibrahim
Adil Ali A.alaziz
10.5120/4111-5914

Nadir Omer FadlElssied, Othman Ibrahim and Adil Ali A.alaziz. Article: A review of Fuzzy Mechanismsfor E-government Security. International Journal of Computer Applications 34(7):16-22, November 2011. Full text available. BibTeX

@article{key:article,
	author = {Nadir Omer FadlElssied and Othman Ibrahim and Adil Ali A.alaziz},
	title = {Article: A review of Fuzzy Mechanismsfor E-government Security},
	journal = {International Journal of Computer Applications},
	year = {2011},
	volume = {34},
	number = {7},
	pages = {16-22},
	month = {November},
	note = {Full text available}
}

Abstract

Recently, e-government has become an important issue for citizens. Government services are provided using electronic media. The security of applications and infrastructures is a critical factor for e-government success. However, analysis of the various possible external threats and internal vulnerability in order to evaluate and develop solutions resolves them is needed. A huge number of Artificial Intelligence (AI) techniques have been proposed for this purpose; fuzzy is considered as the dominant approach in this area. This paper describes the security challenges in the context of e-government. Additionally, it reviews and discusses the comparison between variant fuzzy-based techniques. This paper has concluded that; Fuzzy set theory is very useful for evaluation of e-government security.

Reference

  • ZHANG Bo-ping ET el "Research on E-Government System Network Security Based on Immune Agent "2010 IEEE
  • Wu Zhong et el" A Study on E-government System Security based on Fuzzy Analytic Hierarchy Process "2009 IEEE
  • Irfan Syamsuddin ET el "A New Fuzzy MCDM Framework to Evaluate E-Government Security Strategy "2010 IEEE
  • Evolutionary Computation, Third Edition. By David B. Fogel Copyright © 2006 the Institute of Electrical and Electronics Engineers, Inc.
  • Jun fei Et el "Public Satisfaction Evaluation of E-government with Fuzzy AHP "(2009)IEEE.
  • Wu Zhong et el" A Study on E-government System Security based on Fuzzy Analytic Hierarchy Process "2009 IEEE.
  • WU Zhong" Research on E-Government Security Model "2010 IEEE
  • Aiyue Xia "Research of E-government Security Risk Assessment Method Using Bayesian Network "2009 IEEE
  • Dang Luo et el "Evaluation on E-government Websites Based on Rough Set and Genetic Neural Network Algorithm"2010 Academy Publisher
  • Mehdi Fasanghari ET el "E-Government Performance Evaluation with Fuzzy Numbers "2009IEEE
  • Jun Fei ET el "Public Satisfaction Evaluation of E-government with Fuzzy AHP "2009IEEE
  • Guangfu Wei ET el "Research on E-government information security risk assessment "2010 IEEE
  • Ourania I. Markaki ET el" Application of Fuzzy Analytic Hierarchy Process to Evaluate the Quality of E-Government Web Sites"2010 IEEE
  • M. Monitto "A new Fuzzy AHP method for the Evaluation of Automated Manufacturing Systems2002".
  • Tien-Chin Wang et el "Application of TOPSIS in evaluating initial training aircraft under a fuzzy environment2006" .
  • Chin-Tsai ET el "Using Fuzzy AHP to Evaluate Service Performance of Travel Intermediary2009".