International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 34 - Issue 7 |
Published: November 2011 |
Authors: Nadir Omer Fadlelssied, Othman Ibrahim, Adil Ali A.Alaziz |
![]() |
Nadir Omer Fadlelssied, Othman Ibrahim, Adil Ali A.Alaziz . A review of Fuzzy Mechanismsfor E-government Security. International Journal of Computer Applications. 34, 7 (November 2011), 16-22. DOI=10.5120/4111-5914
@article{ 10.5120/4111-5914, author = { Nadir Omer Fadlelssied,Othman Ibrahim,Adil Ali A.Alaziz }, title = { A review of Fuzzy Mechanismsfor E-government Security }, journal = { International Journal of Computer Applications }, year = { 2011 }, volume = { 34 }, number = { 7 }, pages = { 16-22 }, doi = { 10.5120/4111-5914 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2011 %A Nadir Omer Fadlelssied %A Othman Ibrahim %A Adil Ali A.Alaziz %T A review of Fuzzy Mechanismsfor E-government Security%T %J International Journal of Computer Applications %V 34 %N 7 %P 16-22 %R 10.5120/4111-5914 %I Foundation of Computer Science (FCS), NY, USA
Recently, e-government has become an important issue for citizens. Government services are provided using electronic media. The security of applications and infrastructures is a critical factor for e-government success. However, analysis of the various possible external threats and internal vulnerability in order to evaluate and develop solutions resolves them is needed. A huge number of Artificial Intelligence (AI) techniques have been proposed for this purpose; fuzzy is considered as the dominant approach in this area. This paper describes the security challenges in the context of e-government. Additionally, it reviews and discusses the comparison between variant fuzzy-based techniques. This paper has concluded that; Fuzzy set theory is very useful for evaluation of e-government security.