A secured e-tendering modeling using misuse case approach
Major risk factors relating to electronic transactions may lead to destructive impacts on trust and transparency in the process of tendering.Currently, electronic tendering (e-tendering) systems still remain uncertain in issues relating to legal and security compliance and most importantly it has an...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Conference or Workshop Item |
Published: |
2016
|
Subjects: | |
Online Access: | http://repo.uum.edu.my/19643/ http://doi.org/10.1063/1.4960908 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uum.repo.19643 |
---|---|
record_format |
eprints |
spelling |
my.uum.repo.196432016-11-15T08:19:59Z http://repo.uum.edu.my/19643/ A secured e-tendering modeling using misuse case approach Mohd, Haslina Robie, Muhammad Afdhal Muhammad Baharom, Fauziah Muhd Darus, Norida Saip, Mohamed Ali Yasin, Azman Q Science (General) Major risk factors relating to electronic transactions may lead to destructive impacts on trust and transparency in the process of tendering.Currently, electronic tendering (e-tendering) systems still remain uncertain in issues relating to legal and security compliance and most importantly it has an unclear security framework.Particularly, the available systems are lacking in addressing integrity, confidentiality, authentication, and non-repudiation in e-tendering requirements.Thus, one of the challenges in developing an e-tendering system is to ensure the system requirements include the function for secured and trusted environment.Therefore, this paper aims to model a secured e-tendering system using misuse case approach.The modeling process begins with identifying the e-tendering process, which is based on the Australian Standard Code of Tendering (AS 4120-1994).It is followed by identifying security threats and their countermeasure.Then, the e-tendering was modelled using misuse case approach.The model can contribute to e-tendering developers and also to other researchers or experts in the e-tendering domain. 2016 Conference or Workshop Item PeerReviewed Mohd, Haslina and Robie, Muhammad Afdhal Muhammad and Baharom, Fauziah and Muhd Darus, Norida and Saip, Mohamed Ali and Yasin, Azman (2016) A secured e-tendering modeling using misuse case approach. In: 2016 International Conference on Applied Science and Technology (ICAST 2016), 11–13 April 2016, Kedah, Malaysia. http://doi.org/10.1063/1.4960908 doi:10.1063/1.4960908 |
institution |
Universiti Utara Malaysia |
building |
UUM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Utara Malaysia |
content_source |
UUM Institutionali Repository |
url_provider |
http://repo.uum.edu.my/ |
topic |
Q Science (General) |
spellingShingle |
Q Science (General) Mohd, Haslina Robie, Muhammad Afdhal Muhammad Baharom, Fauziah Muhd Darus, Norida Saip, Mohamed Ali Yasin, Azman A secured e-tendering modeling using misuse case approach |
description |
Major risk factors relating to electronic transactions may lead to destructive impacts on trust and transparency in the process of tendering.Currently, electronic tendering (e-tendering) systems still remain uncertain in issues relating to legal and security compliance and most importantly it has an unclear security framework.Particularly, the available systems are lacking in addressing integrity, confidentiality, authentication, and non-repudiation in e-tendering requirements.Thus, one of the challenges in developing an e-tendering system is to ensure the system requirements include the function for secured and trusted environment.Therefore, this paper aims to model a secured e-tendering system using misuse case approach.The modeling process begins with identifying the e-tendering process, which is based on the Australian Standard Code of Tendering (AS 4120-1994).It is followed by identifying security threats and their countermeasure.Then, the e-tendering was modelled using misuse case approach.The model can contribute to e-tendering developers and also to other researchers or experts in the e-tendering domain. |
format |
Conference or Workshop Item |
author |
Mohd, Haslina Robie, Muhammad Afdhal Muhammad Baharom, Fauziah Muhd Darus, Norida Saip, Mohamed Ali Yasin, Azman |
author_facet |
Mohd, Haslina Robie, Muhammad Afdhal Muhammad Baharom, Fauziah Muhd Darus, Norida Saip, Mohamed Ali Yasin, Azman |
author_sort |
Mohd, Haslina |
title |
A secured e-tendering modeling using misuse case approach |
title_short |
A secured e-tendering modeling using misuse case approach |
title_full |
A secured e-tendering modeling using misuse case approach |
title_fullStr |
A secured e-tendering modeling using misuse case approach |
title_full_unstemmed |
A secured e-tendering modeling using misuse case approach |
title_sort |
secured e-tendering modeling using misuse case approach |
publishDate |
2016 |
url |
http://repo.uum.edu.my/19643/ http://doi.org/10.1063/1.4960908 |
_version_ |
1644282749092102144 |
score |
13.211869 |