Model based threat and vulnerability analysis of E-governance systems

被引:0
|
作者
Saha, Shilpi [1 ]
Bhattacharyya, Debnath [2 ]
Kim, Tai-Hoon [2 ]
Bandyopadhyay, Samir Kumar [3 ]
机构
[1] Computer Science and Engineering Department, Heritage Institute of Technology, Kolkata-700107, India
[2] Department of Multimedia, Hannam University, Daejeon - 306791, Korea, Republic of
[3] Department of Computer Science and Engineering, University of Calcutta, Kolkata-700009, India
关键词
Government data processing;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The strategic and contemporary importance of e-governance has been recognized across the world. In India too, various ministries of Govt. of India and State Governments have taken e-governance initiatives to provide e-services to citizens and the business they serve. To achieve the mission objectives, and make such e-governance initiatives successful it would be necessary to improve the trust and confidence of the stakeholders. It is assumed that the delivery of government services will share the same public network information that is being used in the community at large. In particular, the Internet will be the principal means by which public access to government and government services will be achieved. To provide the security measures main aim is to identify all possible threats and vulnerabilities according to the data locations and then according to the models of Nath's approach. Based on this analysis, the security requirements of the data and the applications have been formulated in the form of security parameters like confidentiality, integrity and availability. This analysis leads to the security architecture of the specific G2C application.
引用
收藏
页码:7 / 22
相关论文
共 50 条
  • [1] Model Based User's Access Requirement Analysis of E-Governance Systems
    Saha, Shilpi
    Jeon, Seung-Hwan
    Robles, Rosslin John
    Kim, Tai-hoon
    Bandyopadhyay, Samir Kumar
    SECURITY-ENRICHED URBAN COMPUTING AND SMART GRID, 2010, 78 : 466 - +
  • [2] Access Requirement Analysis of E-Governance Systems
    Kim, Tai-hoon
    SECURITY-ENRICHED URBAN COMPUTING AND SMART GRID, 2010, 78 : 124 - 130
  • [3] Access Requirement Analysis of E-Governance Systems
    Kim, Tai-hoon
    NEW ASPECTS OF APPLIED INFORMATICS, BIOMEDICAL ELECTRONICS AND INFORMATICS AND COMMUNICATION, 2010, : 54 - +
  • [4] Software architecture design model for e-Governance systems
    Murthy, ND
    Kumar, RVP
    IEEE TENCON 2003: CONFERENCE ON CONVERGENT TECHNOLOGIES FOR THE ASIA-PACIFIC REGION, VOLS 1-4, 2003, : 183 - 187
  • [5] A Comparative Analysis of E-Governance and IT Governance
    Nehemia, Monica
    Iyamu, Tiko
    Shaanika, Irja
    2019 OPEN INNOVATIONS CONFERENCE (OI), 2019, : 288 - 296
  • [6] E-governance maturity model
    Misra, DC
    Dhingra, A
    ELECTRONICS INFORMATION & PLANNING, 2002, 29 (6-7): : 269 - 275
  • [7] An analysis of E-governance in Pakistan from the lens of the Chinese governance model
    Atique, Muhammad
    Htay, Su Su
    Mumtaz, Muhammad
    Khan, Naqib Ullah
    Altalbe, Ali
    HELIYON, 2024, 10 (05)
  • [8] A Model Approach for Using GIS Data in E-Governance Systems
    Trivedi, Aakash
    CONTEMPORARY COMPUTING, 2011, 168 : 438 - 448
  • [9] E-governance success factors An analysis of e-governance initiatives of ten major states of India
    Kalsi, Nirmaljeet
    Kiran, Ravi
    INTERNATIONAL JOURNAL OF PUBLIC SECTOR MANAGEMENT, 2013, 26 (04) : 320 - +
  • [10] E-governance justified
    Agangiba, William Akotam
    Agangiba, Millicent Akotam
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2013, 4 (02) : 223 - 225