CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

A review of Fuzzy Mechanismsfor E-government Security

by Nadir Omer FadlElssied, Othman Ibrahim, Adil Ali A.alaziz
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 34 - Number 7
Year of Publication: 2011
Authors: Nadir Omer FadlElssied, Othman Ibrahim, Adil Ali A.alaziz
10.5120/4111-5914

Nadir Omer FadlElssied, Othman Ibrahim, Adil Ali A.alaziz . A review of Fuzzy Mechanismsfor E-government Security. International Journal of Computer Applications. 34, 7 ( November 2011), 16-22. DOI=10.5120/4111-5914

@article{ 10.5120/4111-5914,
author = { Nadir Omer FadlElssied, Othman Ibrahim, Adil Ali A.alaziz },
title = { A review of Fuzzy Mechanismsfor E-government Security },
journal = { International Journal of Computer Applications },
issue_date = { November 2011 },
volume = { 34 },
number = { 7 },
month = { November },
year = { 2011 },
issn = { 0975-8887 },
pages = { 16-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume34/number7/4111-5914/ },
doi = { 10.5120/4111-5914 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:20:29.117823+05:30
%A Nadir Omer FadlElssied
%A Othman Ibrahim
%A Adil Ali A.alaziz
%T A review of Fuzzy Mechanismsfor E-government Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 34
%N 7
%P 16-22
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Recently, e-government has become an important issue for citizens. Government services are provided using electronic media. The security of applications and infrastructures is a critical factor for e-government success. However, analysis of the various possible external threats and internal vulnerability in order to evaluate and develop solutions resolves them is needed. A huge number of Artificial Intelligence (AI) techniques have been proposed for this purpose; fuzzy is considered as the dominant approach in this area. This paper describes the security challenges in the context of e-government. Additionally, it reviews and discusses the comparison between variant fuzzy-based techniques. This paper has concluded that; Fuzzy set theory is very useful for evaluation of e-government security.

References
  1. ZHANG Bo-ping ET el "Research on E-Government System Network Security Based on Immune Agent "2010 IEEE
  2. Wu Zhong et el" A Study on E-government System Security based on Fuzzy Analytic Hierarchy Process "2009 IEEE
  3. Irfan Syamsuddin ET el "A New Fuzzy MCDM Framework to Evaluate E-Government Security Strategy "2010 IEEE
  4. Evolutionary Computation, Third Edition. By David B. Fogel Copyright © 2006 the Institute of Electrical and Electronics Engineers, Inc.
  5. Jun fei Et el "Public Satisfaction Evaluation of E-government with Fuzzy AHP "(2009)IEEE.
  6. Wu Zhong et el" A Study on E-government System Security based on Fuzzy Analytic Hierarchy Process "2009 IEEE.
  7. WU Zhong" Research on E-Government Security Model "2010 IEEE
  8. Aiyue Xia "Research of E-government Security Risk Assessment Method Using Bayesian Network "2009 IEEE
  9. Dang Luo et el "Evaluation on E-government Websites Based on Rough Set and Genetic Neural Network Algorithm"2010 Academy Publisher
  10. Mehdi Fasanghari ET el "E-Government Performance Evaluation with Fuzzy Numbers "2009IEEE
  11. Jun Fei ET el "Public Satisfaction Evaluation of E-government with Fuzzy AHP "2009IEEE
  12. Guangfu Wei ET el "Research on E-government information security risk assessment "2010 IEEE
  13. Ourania I. Markaki ET el" Application of Fuzzy Analytic Hierarchy Process to Evaluate the Quality of E-Government Web Sites"2010 IEEE
  14. M. Monitto "A new Fuzzy AHP method for the Evaluation of Automated Manufacturing Systems2002".
  15. Tien-Chin Wang et el "Application of TOPSIS in evaluating initial training aircraft under a fuzzy environment2006" .
  16. Chin-Tsai ET el "Using Fuzzy AHP to Evaluate Service Performance of Travel Intermediary2009".
Index Terms

Computer Science
Information Sciences

Keywords

E-government Security Fuzzy techniques