Java security
Uml and the Unified Process: Practical Object-Oriented Analysis and Design
Uml and the Unified Process: Practical Object-Oriented Analysis and Design
Security Architecture of the Austrian Citizen Card Concept
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
A Holistic Approach to Security Aspects in E-government
HICSS '02 Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 5 - Volume 5
Motivations for implementing e-government: an investigation of the global phenomenon
dg.o '05 Proceedings of the 2005 national conference on Digital government research
Current practices of leading e-government countries
Communications of the ACM - The digital society
Study on e-government construction
ICEC '05 Proceedings of the 7th international conference on Electronic commerce
On the barriers to the development of e-government in China
ICEC '05 Proceedings of the 7th international conference on Electronic commerce
A multi-agent system for efficiently managing query answering in an e-government scenario
Proceedings of the 2006 ACM symposium on Applied computing
International Journal of Electronic Finance
A framework for analysing interoperability in electronic government
International Journal of Electronic Finance
Measuring e-statement quality impact on customer satisfaction and loyalty
International Journal of Electronic Finance
Hi-index | 0.00 |
Countries across the globe are working towards e-government realisation. One of the issues arising with the efforts to this realisation is the assurance of secure transactions while withholding high privacy standards. Different systems require different levels of security according to the services they provide to their users. This paper presents a survey of security measures implemented in e-government projects both locally (in the Kingdom of Saudi Arabia) and internationally, beginning with more established e-government systems around the world. Security of these systems will then be evaluated accordingly to a defined list of security requirements fitting the needs of local e-government projects. This will be the basis for the design and implementation of an e-transaction multilevel security system for e-government systems and for its evaluation.