-
2
-
-
84870340342
-
Secure human face authentication for mobile e-government transactions
-
Benlamri, R., Adi, W., Al-Qayedi, A. and Dawood, A. (2010) ‘Secure human face authentication for mobile e-government transactions’, International Journal of Mobile Communications, Vol. 8, No. 1, pp.71–87.
-
(2010)
International Journal of Mobile Communications
, vol.8
, Issue.1
, pp. 71-87
-
-
Benlamri, R.1
Adi, W.2
Al-Qayedi, A.3
Dawood, A.4
-
3
-
-
19944380112
-
Security – concepts, approaches and challenges
-
Bertino, E. and Sandhu, R. (2005) ‘Security – concepts, approaches and challenges’, IEEE Transactions on Dependable and Secure Computing, Vol. 2, No. 1, pp.2–18.
-
(2005)
IEEE Transactions on Dependable and Secure Computing
, vol.2
, Issue.1
, pp. 2-18
-
-
Bertino, E.1
Sandhu, R.2
-
4
-
-
84944792110
-
TRBAC: a temporal role-based access control model
-
Bertino, E., Bonatti, P.A. and Ferrari, E. (2001) ‘TRBAC: a temporal role-based access control model’, ACM Transactions on Information and System Security (TISSEC), Vol. 4, No. 3, pp.191–233.
-
(2001)
ACM Transactions on Information and System Security (TISSEC)
, vol.4
, Issue.3
, pp. 191-233
-
-
Bertino, E.1
Bonatti, P.A.2
Ferrari, E.3
-
5
-
-
77950901814
-
Research of SaaS for small medium-sized enterprises informationization
-
Chen, P. and Xue, H.X. (2008) ‘Research of SaaS for small medium-sized enterprises informationization’, Manufacture Information Engineering of China, Vol. 1, pp.10–13.
-
(2008)
Manufacture Information Engineering of China
, vol.1
, pp. 10-13
-
-
Chen, P.1
Xue, H.X.2
-
6
-
-
84952969693
-
-
ccwresearch.com.cn articleId=9856&Columnid=589, Accessed on 18 December 2009
-
China Computer World Research (2008) The Market Scale of China’s M-Government, ccwresearch.com.cn, Available at: http://www.ccwresearch.com.cn/store/article_normal.asp? articleId=9856&Columnid=589, Accessed on 18 December 2009.
-
(2008)
The Market Scale of China’s M-Government
-
-
China Computer World Research1
-
7
-
-
33749629430
-
-
Paper presented in the Proceedings of the 39th Annual Hawaii International Conference on System Sciences, HICSS ’06, Hawaii, USA
-
Conklin, A. and White, G.B. (2006) ‘E-government and cyber security: the role of cyber security exercises’, Paper presented in the Proceedings of the 39th Annual Hawaii International Conference on System Sciences, HICSS ’06, Hawaii, USA, Vol. 4, No. 1, pp.1–8.
-
(2006)
E-government and cyber security: the role of cyber security exercises
, vol.4
, Issue.1
, pp. 1-8
-
-
Conklin, A.1
White, G.B.2
-
8
-
-
84948995473
-
-
Paper presented in the Proceedings of 18th Annual Computer Security Applications Conference (AC-SAC 2002)
-
Covington, M.J., Fogla, P., Zhan, Z. and Ahamad, M. (2002) ‘A context-aware security architecture for emerging applications’, Paper presented in the Proceedings of 18th Annual Computer Security Applications Conference (AC-SAC 2002), December, pp.249–258.
-
(2002)
A context-aware security architecture for emerging applications
, vol.December
, pp. 249-258
-
-
Covington, M.J.1
Fogla, P.2
Zhan, Z.3
Ahamad, M.4
-
9
-
-
35248883522
-
The business model of ‘Software-As-A-Service’
-
Salt Lake City, USA
-
Dan, M. (2007) ‘The business model of ‘Software-As-A-Service’’, IEEE International Conference on Services Computing, Salt Lake City, USA, pp.701, 702.
-
(2007)
IEEE International Conference on Services Computing
, pp. 701-702
-
-
Dan, M.1
-
10
-
-
84952951995
-
-
Paper presented in the COllECTeR, Sydney, Australia
-
El-Kiki, T., Lawrence, E. and Steele, R. (2005) ‘A management framework for mobile government services’, Paper presented in the COllECTeR, Sydney, Australia, pp.122–126.
-
(2005)
A management framework for mobile government services
, pp. 122-126
-
-
El-Kiki, T.1
Lawrence, E.2
Steele, R.3
-
11
-
-
77956836351
-
Istanbul earthquake rapid response and the early warning system
-
Erdik, M., Fahjan, Y., Ozel, O., Alcik, H., Mert, A. and Gul, M. (2003) ‘Istanbul earthquake rapid response and the early warning system’, Bulletin of Earthquake Engineering, Vol. 1, pp.157–163.
-
(2003)
Bulletin of Earthquake Engineering
, vol.1
, pp. 157-163
-
-
Erdik, M.1
Fahjan, Y.2
Ozel, O.3
Alcik, H.4
Mert, A.5
Gul, M.6
-
12
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R. and Chandramouli, R. (2001) ‘Proposed NIST standard for role-based access control’, ACM Transactions on Information and System Security (TISSEC), Vol. 4, No. 3, pp.224–274.
-
(2001)
ACM Transactions on Information and System Security (TISSEC)
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
13
-
-
77957824917
-
Software-as-a-service: The spark that will change software engineering?
-
Greg, G. (2008) ‘Software-as-a-service: The spark that will change software engineering?’, IEEE Distributed Systems Online, Vol. 9, No. 7, pp.3–3.
-
(2008)
IEEE Distributed Systems Online
, vol.9
, Issue.7
, pp. 3-3
-
-
Greg, G.1
-
14
-
-
0346920445
-
-
RFC Editor, USA
-
Hamzeh, K., Pall, G., Verthein, W., Taarud, J., Little, W. and Zorn, G. (1999) RFC2637: Point-to-Point Tunneling Protocol, RFC Editor, USA.
-
(1999)
RFC2637: Point-to-Point Tunneling Protocol
-
-
Hamzeh, K.1
Pall, G.2
Verthein, W.3
Taarud, J.4
Little, W.5
Zorn, G.6
-
16
-
-
35348944898
-
The future of mobile computing: R&D activities in the state of Bremen
-
Herzog, O., Boronowsky, M., Rugge, I., Glotzbach, U. and Lawo, M. (2007) ‘The future of mobile computing: R&D activities in the state of Bremen’, Internet Research, Vol. 17, pp.495–504.
-
(2007)
Internet Research
, vol.17
, pp. 495-504
-
-
Herzog, O.1
Boronowsky, M.2
Rugge, I.3
Glotzbach, U.4
Lawo, M.5
-
17
-
-
76449085809
-
Factors influencing the adoption of personalisation mobile services: empirical evidence from young Australians
-
Hill, S.R. and Troshani, I (2010) ‘Factors influencing the adoption of personalisation mobile services: empirical evidence from young Australians’, International Journal of Mobile Communications, Vol. 8, No. 2, pp.150–168.
-
(2010)
International Journal of Mobile Communications
, vol.8
, Issue.2
, pp. 150-168
-
-
Hill, S.R.1
Troshani, I.2
-
18
-
-
84952961991
-
A primary research on the application of SaaS mode in e-government
-
China
-
Huo, X.J. (2008) ‘A primary research on the application of SaaS mode in e-government’, E-government, China, Vol. 1, pp.73–87.
-
(2008)
E-government
, vol.1
, pp. 73-87
-
-
Huo, X.J.1
-
20
-
-
77954897508
-
M-government services: user needs and value
-
Ishmatova, D. and Obi, T. (2009) ‘M-government services: user needs and value’, I-Ways: The Journal of E-Government Policy and Regulation, Vol. 32, No. 1, pp.39–46.
-
(2009)
I-Ways: The Journal of E-Government Policy and Regulation
, vol.32
, Issue.1
, pp. 39-46
-
-
Ishmatova, D.1
Obi, T.2
-
21
-
-
0030677524
-
-
Paper presented in the Proceedings of the IEEE Computer Society Symposium on Reasearch in Security and Privacy, Oakland, California
-
Jajodia, S., Samarati, P. and Subrahmanian, V.S. (1997) ‘A logical language for expressing authorizations’, Paper presented in the Proceedings of the IEEE Computer Society Symposium on Reasearch in Security and Privacy, Oakland, California, pp.31–42.
-
(1997)
A logical language for expressing authorizations
, pp. 31-42
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.S.3
-
22
-
-
63049120500
-
4G: the future mobile technology
-
Hyderabad, India
-
Jamil, M., Shaikh, S.P., Shahzad, M. and Awais, Q. (2008) ‘4G: the future mobile technology’, IEEE Region 10 Annual International Conference, Hyderabad, India, pp.1720–1725.
-
(2008)
IEEE Region 10 Annual International Conference
, pp. 1720-1725
-
-
Jamil, M.1
Shaikh, S.P.2
Shahzad, M.3
Awais, Q.4
-
23
-
-
84925984951
-
Security issues in mgovernment
-
Kumar, M., Hanumanthappa, M. and Reddy, B.L. (2008) ‘Security issues in mgovernment’, Communications in Computer and Information Science, Vol. 12, pp.265–273.
-
(2008)
Communications in Computer and Information Science
, vol.12
, pp. 265-273
-
-
Kumar, M.1
Hanumanthappa, M.2
Reddy, B.L.3
-
24
-
-
84952953435
-
-
Paper presented in the Proceeding of European Conference on E-Governemnt (ECEG 2003), Trinity College, Dublin
-
Kushchu, I. and Borucki, C. (2003) ‘A mobility response model for government’, Paper presented in the Proceeding of European Conference on E-Governemnt (ECEG 2003), Trinity College, Dublin.
-
(2003)
A mobility response model for government
-
-
Kushchu, I.1
Borucki, C.2
-
25
-
-
51749103960
-
A software as a service with multi-tenancy support for an electronic contract management application
-
SCC’08, Honolulu, USA
-
Kwok, T., Thao, N. and Linh, L. (2008) ‘A software as a service with multi-tenancy support for an electronic contract management application’, IEEE International Conference on Services Computing, SCC’08, Honolulu, USA, pp.179–186.
-
(2008)
IEEE International Conference on Services Computing
, pp. 179-186
-
-
Kwok, T.1
Thao, N.2
Linh, L.3
-
26
-
-
44149116510
-
What’s in a name? Distinguishing between SaaS and SOA
-
Laplante, P.A., Zhang, J. and Voas, J. (2008) ‘What’s in a name? Distinguishing between SaaS and SOA’, IT Professional, Vol. 10, No. 1, pp.46–50.
-
(2008)
IT Professional
, vol.10
, Issue.1
, pp. 46-50
-
-
Laplante, P.A.1
Zhang, J.2
Voas, J.3
-
27
-
-
33645945297
-
M-government, from rhetoric to reality: learning from leading countries
-
Lee, S.M., Tan, X. and Trimi, S. (2006) ‘M-government, from rhetoric to reality: learning from leading countries’, Electronic Government, An International Journal, Vol. 3, pp.113—126.
-
(2006)
Electronic Government, An International Journal
, vol.3
, pp. 113-126
-
-
Lee, S.M.1
Tan, X.2
Trimi, S.3
-
28
-
-
84952964372
-
Control the risk of SaaS model in e-government
-
Li, H. (2008a) ‘Control the risk of SaaS model in e-government’, Digital Space, Vol. 9, pp.10, 11.
-
(2008)
Digital Space
, vol.9
, pp. 10-11
-
-
Li, H.1
-
30
-
-
0345969378
-
Consumer e-commerce: potential for social inclusion
-
Liff, S. (2000) ‘Consumer e-commerce: potential for social inclusion’, Consumer Policy Review, Vol. 10, No. 5, pp.162–166.
-
(2000)
Consumer Policy Review
, vol.10
, Issue.5
, pp. 162-166
-
-
Liff, S.1
-
31
-
-
12344317788
-
Advancing e-govemment at the grassroots: Tortoise or hare?
-
Norris, D.F. and Moon, M.J. (2005) ‘Advancing e-govemment at the grassroots: Tortoise or hare?’, Public Administration Review, Vol. 65, No. 1, pp.64–75.
-
(2005)
Public Administration Review
, vol.65
, Issue.1
, pp. 64-75
-
-
Norris, D.F.1
Moon, M.J.2
-
32
-
-
84894169953
-
Digital signature applications for e-government
-
Okenfeld, M. (2002) ‘Digital signature applications for e-government’, ECRIM News, January, No. 48, p.33.
-
(2002)
ECRIM News
, vol.January
, Issue.48
, pp. 33
-
-
Okenfeld, M.1
-
36
-
-
77957656500
-
A model of successful factors towards e-government implementation
-
Sagheb-Tehrani, M. (2010) ‘A model of successful factors towards e-government implementation’, Electronic Government, An International Journal, Vol. 7, No. 1, pp.60–74.
-
(2010)
Electronic Government, An International Journal
, vol.7
, Issue.1
, pp. 60-74
-
-
Sagheb-Tehrani, M.1
-
37
-
-
84859325708
-
-
Paper presented in the Proceedings of Euro mGov 2005: The First European Mobile Government Conference, Brighton, UK
-
Sandy, G.A. and McMillan, S. (2005) ‘A success factors model for m-government’, Paper presented in the Proceedings of Euro mGov 2005: The First European Mobile Government Conference, Brighton, UK, pp.349–358.
-
(2005)
A success factors model for m-government
, pp. 349-358
-
-
Sandy, G.A.1
McMillan, S.2
-
38
-
-
51849121041
-
Realizing unified service experience with SaaS on SOA
-
Bangalore, India
-
Sathyan, J. and Shenoy, K. (2008) ‘Realizing unified service experience with SaaS on SOA’, International Conference on Communication System Software and Middleware and Workshop, Bangalore, India, Vol. 1, pp.327–332.
-
(2008)
International Conference on Communication System Software and Middleware and Workshop
, vol.1
, pp. 327-332
-
-
Sathyan, J.1
Shenoy, K.2
-
39
-
-
0003898585
-
-
RFC2661, August
-
Townsley, W., Valencia, A., Rubens, A., Pall, G., Zorn, G. and Palter, B. (1999) Layer Two Tunneling Protocol (L2TP), RFC2661, August.
-
(1999)
Layer Two Tunneling Protocol (L2TP)
-
-
Townsley, W.1
Valencia, A.2
Rubens, A.3
Pall, G.4
Zorn, G.5
Palter, B.6
-
41
-
-
84952960538
-
Policy on privacy crucial to e-governance success
-
Valdez, M. (2002) ‘Policy on privacy crucial to e-governance success’, Computerworld Philippines, p.1.
-
(2002)
Computerworld Philippines
, pp. 1
-
-
Valdez, M.1
-
42
-
-
33750941483
-
-
Addison Wesley, Pearson Education, Boston
-
Wallace, P., Hoffmann, A., Scuka, D., Blut, Z. and Barrow, Z. (2002) I-Mode Developer’s Guide, Addison Wesley, Pearson Education, Boston.
-
(2002)
I-Mode Developer’s Guide
-
-
Wallace, P.1
Hoffmann, A.2
Scuka, D.3
Blut, Z.4
Barrow, Z.5
-
43
-
-
58149098071
-
A study and performance evaluation of the multi-tenant data tier design patterns for service oriented computing
-
Xi’an, China
-
Wang, Z.H., Guo, C.J., Gao, B., Sun, W., Zhang, Z. and An, W.H. (2008) ‘A study and performance evaluation of the multi-tenant data tier design patterns for service oriented computing’, IEEE International Conference in E-Business Engineering, ICEBE’08, Xi’an, China, pp.94–101.
-
(2008)
IEEE International Conference in E-Business Engineering, ICEBE’08
, pp. 94-101
-
-
Wang, Z.H.1
Guo, C.J.2
Gao, B.3
Sun, W.4
Zhang, Z.5
An, W.H.6
-
44
-
-
0345856375
-
Global information technology pressure and government accountability: the mediating effect of domestic context on website openness
-
Welch, E. and Wong, W. (2001) ‘Global information technology pressure and government accountability: the mediating effect of domestic context on website openness’, Journal of Public Administration Research and Theory, Vol. 11, No. 4, pp.509–538.
-
(2001)
Journal of Public Administration Research and Theory
, vol.11
, Issue.4
, pp. 509-538
-
-
Welch, E.1
Wong, W.2
-
45
-
-
33845205735
-
Global e-government, 2002
-
Brown University
-
West, D. (2002) ‘Global e-government, 2002’, Providence Rhode Is, Brown University, p.32.
-
(2002)
Providence Rhode Is
, pp. 32
-
-
West, D.1
-
46
-
-
84952974166
-
-
Paper presented in Proceedings of the International Conference on Electronic Government, EGOV 2005, LNCS 3951, Heidelberg, Berlin
-
Wimmer, M.A. (2005) ‘A quality inspection method to evaluate e-government sites’, Paper presented in Proceedings of the International Conference on Electronic Government, EGOV 2005, LNCS 3951, Heidelberg, Berlin, pp.198–208.
-
(2005)
A quality inspection method to evaluate e-government sites
, pp. 198-208
-
-
Wimmer, M.A.1
-
47
-
-
77953204163
-
User aspects of electronic and mobile government: results from a review of current research
-
Wu, H., Ozok, A.A., Gurses, A.P. and Wei, J. (2009) ‘User aspects of electronic and mobile government: results from a review of current research’, Electronic Government, An International Journal, Vol. 6, No. 3, pp.233–251.
-
(2009)
Electronic Government, An International Journal
, vol.6
, Issue.3
, pp. 233-251
-
-
Wu, H.1
Ozok, A.A.2
Gurses, A.P.3
Wei, J.4
-
48
-
-
84894199554
-
-
developmentgateway.org Accessed on 18 December 2009
-
Zálešák, M. (2003) Overview and Opportunities of Mobile Government, developmentgateway.org, Available at: http://www.developmentgateway.org/download/218309/mGov.doc, Accessed on 18 December 2009.
-
(2003)
Overview and Opportunities of Mobile Government
-
-
Zálešák, M.1
|