A secured e-tendering modeling using misuse case approach

Major risk factors relating to electronic transactions may lead to destructive impacts on trust and transparency in the process of tendering.Currently, electronic tendering (e-tendering) systems still remain uncertain in issues relating to legal and security compliance and most importantly it has an...

Full description

Saved in:
Bibliographic Details
Main Authors: Mohd, Haslina, Robie, Muhammad Afdhal Muhammad, Baharom, Fauziah, Muhd Darus, Norida, Saip, Mohamed Ali, Yasin, Azman
Format: Conference or Workshop Item
Published: 2016
Subjects:
Online Access:http://repo.uum.edu.my/19643/
http://doi.org/10.1063/1.4960908
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uum.repo.19643
record_format eprints
spelling my.uum.repo.196432016-11-15T08:19:59Z http://repo.uum.edu.my/19643/ A secured e-tendering modeling using misuse case approach Mohd, Haslina Robie, Muhammad Afdhal Muhammad Baharom, Fauziah Muhd Darus, Norida Saip, Mohamed Ali Yasin, Azman Q Science (General) Major risk factors relating to electronic transactions may lead to destructive impacts on trust and transparency in the process of tendering.Currently, electronic tendering (e-tendering) systems still remain uncertain in issues relating to legal and security compliance and most importantly it has an unclear security framework.Particularly, the available systems are lacking in addressing integrity, confidentiality, authentication, and non-repudiation in e-tendering requirements.Thus, one of the challenges in developing an e-tendering system is to ensure the system requirements include the function for secured and trusted environment.Therefore, this paper aims to model a secured e-tendering system using misuse case approach.The modeling process begins with identifying the e-tendering process, which is based on the Australian Standard Code of Tendering (AS 4120-1994).It is followed by identifying security threats and their countermeasure.Then, the e-tendering was modelled using misuse case approach.The model can contribute to e-tendering developers and also to other researchers or experts in the e-tendering domain. 2016 Conference or Workshop Item PeerReviewed Mohd, Haslina and Robie, Muhammad Afdhal Muhammad and Baharom, Fauziah and Muhd Darus, Norida and Saip, Mohamed Ali and Yasin, Azman (2016) A secured e-tendering modeling using misuse case approach. In: 2016 International Conference on Applied Science and Technology (ICAST 2016), 11–13 April 2016, Kedah, Malaysia. http://doi.org/10.1063/1.4960908 doi:10.1063/1.4960908
institution Universiti Utara Malaysia
building UUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Utara Malaysia
content_source UUM Institutionali Repository
url_provider http://repo.uum.edu.my/
topic Q Science (General)
spellingShingle Q Science (General)
Mohd, Haslina
Robie, Muhammad Afdhal Muhammad
Baharom, Fauziah
Muhd Darus, Norida
Saip, Mohamed Ali
Yasin, Azman
A secured e-tendering modeling using misuse case approach
description Major risk factors relating to electronic transactions may lead to destructive impacts on trust and transparency in the process of tendering.Currently, electronic tendering (e-tendering) systems still remain uncertain in issues relating to legal and security compliance and most importantly it has an unclear security framework.Particularly, the available systems are lacking in addressing integrity, confidentiality, authentication, and non-repudiation in e-tendering requirements.Thus, one of the challenges in developing an e-tendering system is to ensure the system requirements include the function for secured and trusted environment.Therefore, this paper aims to model a secured e-tendering system using misuse case approach.The modeling process begins with identifying the e-tendering process, which is based on the Australian Standard Code of Tendering (AS 4120-1994).It is followed by identifying security threats and their countermeasure.Then, the e-tendering was modelled using misuse case approach.The model can contribute to e-tendering developers and also to other researchers or experts in the e-tendering domain.
format Conference or Workshop Item
author Mohd, Haslina
Robie, Muhammad Afdhal Muhammad
Baharom, Fauziah
Muhd Darus, Norida
Saip, Mohamed Ali
Yasin, Azman
author_facet Mohd, Haslina
Robie, Muhammad Afdhal Muhammad
Baharom, Fauziah
Muhd Darus, Norida
Saip, Mohamed Ali
Yasin, Azman
author_sort Mohd, Haslina
title A secured e-tendering modeling using misuse case approach
title_short A secured e-tendering modeling using misuse case approach
title_full A secured e-tendering modeling using misuse case approach
title_fullStr A secured e-tendering modeling using misuse case approach
title_full_unstemmed A secured e-tendering modeling using misuse case approach
title_sort secured e-tendering modeling using misuse case approach
publishDate 2016
url http://repo.uum.edu.my/19643/
http://doi.org/10.1063/1.4960908
_version_ 1644282749092102144
score 13.211869