Research Article

A review of Fuzzy Mechanismsfor E-government Security

by  Nadir Omer Fadlelssied, Othman Ibrahim, Adil Ali A.Alaziz
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 34 - Issue 7
Published: November 2011
Authors: Nadir Omer Fadlelssied, Othman Ibrahim, Adil Ali A.Alaziz
10.5120/4111-5914
PDF

Nadir Omer Fadlelssied, Othman Ibrahim, Adil Ali A.Alaziz . A review of Fuzzy Mechanismsfor E-government Security. International Journal of Computer Applications. 34, 7 (November 2011), 16-22. DOI=10.5120/4111-5914

                        @article{ 10.5120/4111-5914,
                        author  = { Nadir Omer Fadlelssied,Othman Ibrahim,Adil Ali A.Alaziz },
                        title   = { A review of Fuzzy Mechanismsfor E-government Security },
                        journal = { International Journal of Computer Applications },
                        year    = { 2011 },
                        volume  = { 34 },
                        number  = { 7 },
                        pages   = { 16-22 },
                        doi     = { 10.5120/4111-5914 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2011
                        %A Nadir Omer Fadlelssied
                        %A Othman Ibrahim
                        %A Adil Ali A.Alaziz
                        %T A review of Fuzzy Mechanismsfor E-government Security%T 
                        %J International Journal of Computer Applications
                        %V 34
                        %N 7
                        %P 16-22
                        %R 10.5120/4111-5914
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Recently, e-government has become an important issue for citizens. Government services are provided using electronic media. The security of applications and infrastructures is a critical factor for e-government success. However, analysis of the various possible external threats and internal vulnerability in order to evaluate and develop solutions resolves them is needed. A huge number of Artificial Intelligence (AI) techniques have been proposed for this purpose; fuzzy is considered as the dominant approach in this area. This paper describes the security challenges in the context of e-government. Additionally, it reviews and discusses the comparison between variant fuzzy-based techniques. This paper has concluded that; Fuzzy set theory is very useful for evaluation of e-government security.

References
  • ZHANG Bo-ping ET el "Research on E-Government System Network Security Based on Immune Agent "2010 IEEE
  • Wu Zhong et el" A Study on E-government System Security based on Fuzzy Analytic Hierarchy Process "2009 IEEE
  • Irfan Syamsuddin ET el "A New Fuzzy MCDM Framework to Evaluate E-Government Security Strategy "2010 IEEE
  • Evolutionary Computation, Third Edition. By David B. Fogel Copyright © 2006 the Institute of Electrical and Electronics Engineers, Inc.
  • Jun fei Et el "Public Satisfaction Evaluation of E-government with Fuzzy AHP "(2009)IEEE.
  • Wu Zhong et el" A Study on E-government System Security based on Fuzzy Analytic Hierarchy Process "2009 IEEE.
  • WU Zhong" Research on E-Government Security Model "2010 IEEE
  • Aiyue Xia "Research of E-government Security Risk Assessment Method Using Bayesian Network "2009 IEEE
  • Dang Luo et el "Evaluation on E-government Websites Based on Rough Set and Genetic Neural Network Algorithm"2010 Academy Publisher
  • Mehdi Fasanghari ET el "E-Government Performance Evaluation with Fuzzy Numbers "2009IEEE
  • Jun Fei ET el "Public Satisfaction Evaluation of E-government with Fuzzy AHP "2009IEEE
  • Guangfu Wei ET el "Research on E-government information security risk assessment "2010 IEEE
  • Ourania I. Markaki ET el" Application of Fuzzy Analytic Hierarchy Process to Evaluate the Quality of E-Government Web Sites"2010 IEEE
  • M. Monitto "A new Fuzzy AHP method for the Evaluation of Automated Manufacturing Systems2002".
  • Tien-Chin Wang et el "Application of TOPSIS in evaluating initial training aircraft under a fuzzy environment2006" .
  • Chin-Tsai ET el "Using Fuzzy AHP to Evaluate Service Performance of Travel Intermediary2009".
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

E-government Security Fuzzy techniques

Powered by PhDFocusTM