CFP last date
22 April 2024
Reseach Article

A review of Fuzzy Mechanismsfor E-government Security

by Nadir Omer FadlElssied, Othman Ibrahim, Adil Ali A.alaziz
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 34 - Number 7
Year of Publication: 2011
Authors: Nadir Omer FadlElssied, Othman Ibrahim, Adil Ali A.alaziz
10.5120/4111-5914

Nadir Omer FadlElssied, Othman Ibrahim, Adil Ali A.alaziz . A review of Fuzzy Mechanismsfor E-government Security. International Journal of Computer Applications. 34, 7 ( November 2011), 16-22. DOI=10.5120/4111-5914

@article{ 10.5120/4111-5914,
author = { Nadir Omer FadlElssied, Othman Ibrahim, Adil Ali A.alaziz },
title = { A review of Fuzzy Mechanismsfor E-government Security },
journal = { International Journal of Computer Applications },
issue_date = { November 2011 },
volume = { 34 },
number = { 7 },
month = { November },
year = { 2011 },
issn = { 0975-8887 },
pages = { 16-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume34/number7/4111-5914/ },
doi = { 10.5120/4111-5914 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:20:29.117823+05:30
%A Nadir Omer FadlElssied
%A Othman Ibrahim
%A Adil Ali A.alaziz
%T A review of Fuzzy Mechanismsfor E-government Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 34
%N 7
%P 16-22
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Recently, e-government has become an important issue for citizens. Government services are provided using electronic media. The security of applications and infrastructures is a critical factor for e-government success. However, analysis of the various possible external threats and internal vulnerability in order to evaluate and develop solutions resolves them is needed. A huge number of Artificial Intelligence (AI) techniques have been proposed for this purpose; fuzzy is considered as the dominant approach in this area. This paper describes the security challenges in the context of e-government. Additionally, it reviews and discusses the comparison between variant fuzzy-based techniques. This paper has concluded that; Fuzzy set theory is very useful for evaluation of e-government security.

References
  1. ZHANG Bo-ping ET el "Research on E-Government System Network Security Based on Immune Agent "2010 IEEE
  2. Wu Zhong et el" A Study on E-government System Security based on Fuzzy Analytic Hierarchy Process "2009 IEEE
  3. Irfan Syamsuddin ET el "A New Fuzzy MCDM Framework to Evaluate E-Government Security Strategy "2010 IEEE
  4. Evolutionary Computation, Third Edition. By David B. Fogel Copyright © 2006 the Institute of Electrical and Electronics Engineers, Inc.
  5. Jun fei Et el "Public Satisfaction Evaluation of E-government with Fuzzy AHP "(2009)IEEE.
  6. Wu Zhong et el" A Study on E-government System Security based on Fuzzy Analytic Hierarchy Process "2009 IEEE.
  7. WU Zhong" Research on E-Government Security Model "2010 IEEE
  8. Aiyue Xia "Research of E-government Security Risk Assessment Method Using Bayesian Network "2009 IEEE
  9. Dang Luo et el "Evaluation on E-government Websites Based on Rough Set and Genetic Neural Network Algorithm"2010 Academy Publisher
  10. Mehdi Fasanghari ET el "E-Government Performance Evaluation with Fuzzy Numbers "2009IEEE
  11. Jun Fei ET el "Public Satisfaction Evaluation of E-government with Fuzzy AHP "2009IEEE
  12. Guangfu Wei ET el "Research on E-government information security risk assessment "2010 IEEE
  13. Ourania I. Markaki ET el" Application of Fuzzy Analytic Hierarchy Process to Evaluate the Quality of E-Government Web Sites"2010 IEEE
  14. M. Monitto "A new Fuzzy AHP method for the Evaluation of Automated Manufacturing Systems2002".
  15. Tien-Chin Wang et el "Application of TOPSIS in evaluating initial training aircraft under a fuzzy environment2006" .
  16. Chin-Tsai ET el "Using Fuzzy AHP to Evaluate Service Performance of Travel Intermediary2009".
Index Terms

Computer Science
Information Sciences

Keywords

E-government Security Fuzzy techniques