Information security evaluation of e-government systems

被引:0
|
作者
Cheng, Xiaorong [1 ]
Li, Mei [1 ]
Zhao, Huilan [1 ]
机构
[1] N China Elect Power Univ, Sch Comp Sci & Technol, Baoding 071003, Hebei, Peoples R China
关键词
e-government system; security assessment SSE-CMM; fuzzy comprehensive judgment; entropy-weight;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
An information security assessment model based on the systems security engineering capability maturity model (SSE-CMM) is proposed according to characteristics and security requirements of e-government systems. Fuzzy comprehensive judgment is also applied to mitigate the uncertainty of threats and weaknesses in e-government systems. To overcome the subjectivity in fuzzy judgment, assessment factors are calculated objectively by the method of entropy weight coefficient. Finally, the study of a case shows the security degree of an e-government network system can be conveniently found out with this method, while efficiently decreasing the computing complexity and influence form human factors.
引用
收藏
页码:532 / 535
页数:4
相关论文
共 50 条
  • [1] E-government and network information security
    Center of Network, Hubei Administrative College, Wuhan 430022, China
    [J]. Zhongshan Daxue Xuebao, 2006, SUPPL. (156-159):
  • [2] Research on the evaluation of security risk for e-government information system
    Liu, Ming-Sheng
    Sun, Shu-Jin
    Yin, Xiao-Hua
    [J]. PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 1404 - +
  • [3] A Novel Security Evaluation Model for E-government Intranet Systems
    Jin, Xiaoting
    [J]. ADVANCES IN ELECTRONIC COMMERCE, WEB APPLICATION AND COMMUNICATION, VOL 2, 2012, 149 : 297 - 302
  • [4] Information Security in E-Government: Legal Aspects
    Politanskyi, Viacheslav
    Lukianov, Dmytro
    Ponomarova, Hanna
    Gyliaka, Oleh
    [J]. CUESTIONES POLITICAS, 2021, 39 (69): : 361 - 372
  • [5] ON HOW TO STRENGTHEN THE INFORMATION SECURITY OF E-GOVERNMENT
    Liu Wei
    Hu Changlong
    [J]. FOURTH INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING (ICCEE 2011), 2011, : 341 - 345
  • [6] How to Design the E-government Information Security Legislation
    Liu Bangfan
    Tao Tao
    Zhang Bei
    [J]. MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 5367 - +
  • [7] RESEARCH ON E-GOVERNMENT INFORMATION SECURITY PROBLEMS AND COUNTERMEASURES
    He Huanhuan
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING (ICACTE 2009), VOLS 1 AND 2, 2009, : 1413 - 1419
  • [8] Data Mining Applications in E-Government Information Security
    Yuan, Tongwei
    Chen, Peng
    [J]. 2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING, 2012, 29 : 235 - 240
  • [9] E-Government Information Security Risk Assessment Research
    Lei Ping
    Lei Zhanbo
    [J]. 2010 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING (MSE 2010), VOL 1, 2010, : 1 - 4
  • [10] Information Security as a Pre-requisite for e-Government Services - Developing the Organizations and the Information Systems
    Pilemalm, Sofie
    Lundholm, Kristoffer
    Hallberg, Jonas
    Yngstrom, Louise
    [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON E-GOVERNMENT, 2010, : 82 - 90