Role-based PMI security model for E-government

被引:0
|
作者
Wu, Li-Jun [1 ]
Su, Kai-Le [1 ]
Yang, Zhi-Hua [1 ]
机构
[1] Dept. of Comp. Sci. and Technol., Zhongshan Univ., Guangzhou 510275, China
关键词
D O I
10.1007/bf02828680
中图分类号
学科分类号
摘要
引用
收藏
页码:329 / 332
相关论文
共 50 条
  • [41] E-Government and Cloud: Security Implementation for Services
    Alessandro, Bettacchi
    Barbara, Re
    Alberto, Polzonetti
    2017 FOURTH INTERNATIONAL CONFERENCE ON EDEMOCRACY & EGOVERNMENT (ICEDEG), 2017, : 79 - 85
  • [42] Critical success factors of E-government: A proposed model for E-government implementation
    Altameem, Torki
    Zairi, Mohamed
    Alshawi, Sarmad
    2006 INNOVATIONS IN INFORMATION TECHNOLOGY, 2006, : 501 - 505
  • [43] IT security - A crucial success factor for e-government!
    Rohde, M
    Schmidt, A
    Hauschild, T
    TOWARDS THE KNOWLEDGE SOCIETY: E-COMMERCE, E-BUSINESS, AND E-GOVERNMENT, 2003, 105 : 211 - 225
  • [44] E-GOVERNMENT MODEL BASED ON MOBILE CLOUD COMPUTING
    Simic, Konstantin
    Milic, Aleksandar
    Labus, Aleksandra
    Radenkovic, Bozidar
    Jovanic, Branislav
    METALURGIA INTERNATIONAL, 2012, 17 (09): : 174 - 178
  • [45] Value-based E-government Measurement Model
    Gao, Yan
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON PUBLIC ECONOMICS AND MANAGEMENT ICPEM 2009, VOL 9: SOCIAL SCIENCE METHODOLOGY, 2009, : 1 - 4
  • [46] Research on role-network model for E-Government Affairs
    Han, SJ
    Wang, N
    Yu, M
    ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 2, 2005, : 438 - 442
  • [47] Security Challenges of E-Government Adoption Based On End Users' Perspective
    Alharbi, Nawaf
    Papadaki, Maria
    Dowland, Paul
    2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 78 - 82
  • [48] THE ROLE OF PERCEIVED RISK AND SECURITY LEVEL IN BUILDING TRUST IN E-GOVERNMENT SOLUTIONS
    Ejdys, Joanna
    Ginevicius, Romualdas
    Rozsa, Zoltan
    Janoskova, Katarina
    E & M EKONOMIE A MANAGEMENT, 2019, 22 (03): : 220 - 235
  • [49] ROLE-BASED NETWORK SECURITY
    JOLITZ, WF
    JOLITZ, LG
    DR DOBBS JOURNAL, 1995, 20 (05): : 80 - &
  • [50] Role-based security policy
    Ma, Jianping
    Yu, Xiangxuan
    Hong, Fan
    Zhang, Jiangling
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 35 (05): : 447 - 450