Misuse case modeling for secure e-tendering system

Tendering process is utilized by principal to invited capable tenderer to participate in competitive bid for winning a large project.Due to advent of IT infrastructure, E-tendering is introduced and adopted in many countries. Yet, an electronic environment did not promise curbing collusion between p...

Full description

Saved in:
Bibliographic Details
Main Authors: Mohd, Haslina, Muhammad Robie, Mohd Afdhal, Baharom, Fauziah, Nordin, Nazib, Muhd Darus, Norida, Saip, Mohamed Ali, Yasin, Azman, Zainol, Azida, Hashim, Nor Laily
Format: Conference or Workshop Item
Language:English
Published: 2012
Subjects:
Online Access:http://repo.uum.edu.my/9400/1/CR214.pdf
http://repo.uum.edu.my/9400/
http://www.kmice.cms.net.my
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uum.repo.9400
record_format eprints
spelling my.uum.repo.94002015-05-25T02:53:36Z http://repo.uum.edu.my/9400/ Misuse case modeling for secure e-tendering system Mohd, Haslina Muhammad Robie, Mohd Afdhal Baharom, Fauziah Nordin, Nazib Muhd Darus, Norida Saip, Mohamed Ali Yasin, Azman Zainol, Azida Hashim, Nor Laily QA75 Electronic computers. Computer science Tendering process is utilized by principal to invited capable tenderer to participate in competitive bid for winning a large project.Due to advent of IT infrastructure, E-tendering is introduced and adopted in many countries. Yet, an electronic environment did not promise curbing collusion between principal and certain tenderers. Other than common threats to system like security breaches by malicious parties, security issue related to ethical issue like fraud and repudiation issue where no evidence existed to denied it.In this paper, common threats for e-tendering process altogether with security countermeasure are described. This three interrelated attribute (consist of tender phase, threat and security countermeasure) are illustrated in misuse case for better understanding of the risk that may occurs in particular tender phase. Furthermore, it sought to ease the system developer for designing and constructing a secure e-tendering system. 2012-07-04 Conference or Workshop Item NonPeerReviewed application/pdf en http://repo.uum.edu.my/9400/1/CR214.pdf Mohd, Haslina and Muhammad Robie, Mohd Afdhal and Baharom, Fauziah and Nordin, Nazib and Muhd Darus, Norida and Saip, Mohamed Ali and Yasin, Azman and Zainol, Azida and Hashim, Nor Laily (2012) Misuse case modeling for secure e-tendering system. In: Knowledge Management International Conference (KMICe) 2012, 4 – 6 July 2012, Johor Bahru, Malaysia. (Unpublished) http://www.kmice.cms.net.my
institution Universiti Utara Malaysia
building UUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Utara Malaysia
content_source UUM Institutionali Repository
url_provider http://repo.uum.edu.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Mohd, Haslina
Muhammad Robie, Mohd Afdhal
Baharom, Fauziah
Nordin, Nazib
Muhd Darus, Norida
Saip, Mohamed Ali
Yasin, Azman
Zainol, Azida
Hashim, Nor Laily
Misuse case modeling for secure e-tendering system
description Tendering process is utilized by principal to invited capable tenderer to participate in competitive bid for winning a large project.Due to advent of IT infrastructure, E-tendering is introduced and adopted in many countries. Yet, an electronic environment did not promise curbing collusion between principal and certain tenderers. Other than common threats to system like security breaches by malicious parties, security issue related to ethical issue like fraud and repudiation issue where no evidence existed to denied it.In this paper, common threats for e-tendering process altogether with security countermeasure are described. This three interrelated attribute (consist of tender phase, threat and security countermeasure) are illustrated in misuse case for better understanding of the risk that may occurs in particular tender phase. Furthermore, it sought to ease the system developer for designing and constructing a secure e-tendering system.
format Conference or Workshop Item
author Mohd, Haslina
Muhammad Robie, Mohd Afdhal
Baharom, Fauziah
Nordin, Nazib
Muhd Darus, Norida
Saip, Mohamed Ali
Yasin, Azman
Zainol, Azida
Hashim, Nor Laily
author_facet Mohd, Haslina
Muhammad Robie, Mohd Afdhal
Baharom, Fauziah
Nordin, Nazib
Muhd Darus, Norida
Saip, Mohamed Ali
Yasin, Azman
Zainol, Azida
Hashim, Nor Laily
author_sort Mohd, Haslina
title Misuse case modeling for secure e-tendering system
title_short Misuse case modeling for secure e-tendering system
title_full Misuse case modeling for secure e-tendering system
title_fullStr Misuse case modeling for secure e-tendering system
title_full_unstemmed Misuse case modeling for secure e-tendering system
title_sort misuse case modeling for secure e-tendering system
publishDate 2012
url http://repo.uum.edu.my/9400/1/CR214.pdf
http://repo.uum.edu.my/9400/
http://www.kmice.cms.net.my
_version_ 1644280099129786368
score 13.160551