A secured e-tendering model based on rational unified process (RUP) approach: inception and elaboration phases
Due to the rapid rise in the e-Tendering transaction over the internet and the increasing use of e-Tendering solution by large organizations, there is a need to construct a secured e-Tendering model to ensure some security mechanisms such as confidentiality, integrity, and accessibility of the docum...
Saved in:
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
ExcelingTech Publishers
2016
|
Subjects: | |
Online Access: | http://repo.uum.edu.my/20572/1/IJCSM%205%204%202016%20114%20120.pdf http://repo.uum.edu.my/20572/ http://www.ojs.excelingtech.co.uk/index.php/IJSCM/article/view/1344 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Utara Malaysia |
Language: | English |
id |
my.uum.repo.20572 |
---|---|
record_format |
eprints |
spelling |
my.uum.repo.205722017-01-08T07:45:40Z http://repo.uum.edu.my/20572/ A secured e-tendering model based on rational unified process (RUP) approach: inception and elaboration phases Mohd, Haslina Baharom, Fauziah Muhd Darus, Norida Saip, Mohamed Ali Marzuki @ Matt, Zaharin Yasin, Azman Muhammad Robie, Muhammad Afdhal QA75 Electronic computers. Computer science Due to the rapid rise in the e-Tendering transaction over the internet and the increasing use of e-Tendering solution by large organizations, there is a need to construct a secured e-Tendering model to ensure some security mechanisms such as confidentiality, integrity, and accessibility of the document are embedded in the e-tendering model.This to ensure the e-tendering transaction is secured and the most important is to gain trust from the e-Tendering stakeholder. Therefore, there is a need to develop a secured e-Tendering model as a guideline to e-tendering developers in developing the system. The Rational Unified Process (RUP) is the most appropriate system development methodology that can guide researchers in generating secured artifact. The RUP has been used by many researchers to construct a secured application model in various researches and projects. This due to the ability of the RUP in guiding researchers to deliver secured artifacts through Inception and elaboration phases.Therefore, this study aims to construct a secured e-tendering artifacts based on RUP. The Unified Modeling Language (UML) is used to generate the secured e-tendering artifacts. This paper discusses the generation of use case, misuse case and class diagrams based on security mechanism that need to be embedded in the e-Tendering model.This study also found that, the RUP is one of the best system development methodology that can be used as one of the research methodology in the Software Engineering domain, especially related to secured design of any observed application.This methodology has been tested in various studies, such as in Simulation-based Decision Support, Security Requirement Engineering, Business Modeling and Secure System Requirement, and so forth.This study may contribute to the software industries in developing a secured system application in the future, and also to the secured system modeling domain. ExcelingTech Publishers 2016-12 Article PeerReviewed application/pdf en cc4_by http://repo.uum.edu.my/20572/1/IJCSM%205%204%202016%20114%20120.pdf Mohd, Haslina and Baharom, Fauziah and Muhd Darus, Norida and Saip, Mohamed Ali and Marzuki @ Matt, Zaharin and Yasin, Azman and Muhammad Robie, Muhammad Afdhal (2016) A secured e-tendering model based on rational unified process (RUP) approach: inception and elaboration phases. International Journal of Supply Chain Management (IJSCM), 5 (4). pp. 114-120. ISSN 2050-7399 http://www.ojs.excelingtech.co.uk/index.php/IJSCM/article/view/1344 |
institution |
Universiti Utara Malaysia |
building |
UUM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Utara Malaysia |
content_source |
UUM Institutionali Repository |
url_provider |
http://repo.uum.edu.my/ |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Mohd, Haslina Baharom, Fauziah Muhd Darus, Norida Saip, Mohamed Ali Marzuki @ Matt, Zaharin Yasin, Azman Muhammad Robie, Muhammad Afdhal A secured e-tendering model based on rational unified process (RUP) approach: inception and elaboration phases |
description |
Due to the rapid rise in the e-Tendering transaction over the internet and the increasing use of e-Tendering solution by large organizations, there is a need to construct a secured e-Tendering model to ensure some security mechanisms such as confidentiality, integrity, and accessibility of the document are embedded in the e-tendering model.This to ensure the e-tendering transaction is secured and the most important is to gain trust from the e-Tendering stakeholder. Therefore, there is a need to develop a secured e-Tendering model as a guideline to e-tendering developers in developing the system. The Rational Unified Process (RUP) is the most appropriate system development methodology that can guide researchers in generating secured artifact. The RUP has been used by many researchers to construct a secured application model in various researches and projects. This due to the ability of the RUP in guiding researchers to deliver secured artifacts through Inception and elaboration phases.Therefore, this study aims to construct a secured e-tendering artifacts based on RUP. The Unified Modeling Language (UML) is used to generate the secured e-tendering artifacts. This paper discusses the generation of use case, misuse case and class diagrams based on security mechanism that need to be embedded in the e-Tendering model.This study also found that, the RUP is one of the best system development methodology that can be used as one of the research methodology in the Software Engineering domain, especially related to secured design of any observed application.This methodology has been tested in various studies, such as in Simulation-based Decision Support, Security Requirement Engineering, Business Modeling and Secure System Requirement, and so forth.This study may contribute to the software industries in developing a secured system application in the future, and also to the secured system modeling domain. |
format |
Article |
author |
Mohd, Haslina Baharom, Fauziah Muhd Darus, Norida Saip, Mohamed Ali Marzuki @ Matt, Zaharin Yasin, Azman Muhammad Robie, Muhammad Afdhal |
author_facet |
Mohd, Haslina Baharom, Fauziah Muhd Darus, Norida Saip, Mohamed Ali Marzuki @ Matt, Zaharin Yasin, Azman Muhammad Robie, Muhammad Afdhal |
author_sort |
Mohd, Haslina |
title |
A secured e-tendering model based on rational unified process (RUP) approach: inception and elaboration phases |
title_short |
A secured e-tendering model based on rational unified process (RUP) approach: inception and elaboration phases |
title_full |
A secured e-tendering model based on rational unified process (RUP) approach: inception and elaboration phases |
title_fullStr |
A secured e-tendering model based on rational unified process (RUP) approach: inception and elaboration phases |
title_full_unstemmed |
A secured e-tendering model based on rational unified process (RUP) approach: inception and elaboration phases |
title_sort |
secured e-tendering model based on rational unified process (rup) approach: inception and elaboration phases |
publisher |
ExcelingTech Publishers |
publishDate |
2016 |
url |
http://repo.uum.edu.my/20572/1/IJCSM%205%204%202016%20114%20120.pdf http://repo.uum.edu.my/20572/ http://www.ojs.excelingtech.co.uk/index.php/IJSCM/article/view/1344 |
_version_ |
1644282994055184384 |