Misuse case modeling for secure e-tendering system
Tendering process is utilized by principal to invited capable tenderer to participate in competitive bid for winning a large project.Due to advent of IT infrastructure, E-tendering is introduced and adopted in many countries. Yet, an electronic environment did not promise curbing collusion between p...
Saved in:
Main Authors: | Mohd, Haslina, Muhammad Robie, Mohd Afdhal, Baharom, Fauziah, Nordin, Nazib, Muhd Darus, Norida, Saip, Mohamed Ali, Yasin, Azman, Zainol, Azida, Hashim, Nor Laily |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2012
|
Subjects: | |
Online Access: | http://repo.uum.edu.my/9400/1/CR214.pdf http://repo.uum.edu.my/9400/ http://www.kmice.cms.net.my |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
A secured e-tendering modeling using misuse case approach
by: Mohd, Haslina, et al.
Published: (2016) -
Adapting Rational Unified Process (RUP) approach in designing a secure e-Tendering model
by: Mohd, Haslina, et al.
Published: (2016) -
A secured e-tendering model based on rational unified process (RUP) approach: inception and elaboration phases
by: Mohd, Haslina, et al.
Published: (2016) -
E-tendering security issues and countermeasures
by: Muhammad Robie, Mohd Afdhal, et al.
Published: (2014) -
Functional requirements specification of e-tendering using requirement template and natural language approaches: A case study of e-tendering
by: Mohd, Haslina, et al.
Published: (2016)