A secured e-tendering model based on rational unified process (RUP) approach: inception and elaboration phases

Due to the rapid rise in the e-Tendering transaction over the internet and the increasing use of e-Tendering solution by large organizations, there is a need to construct a secured e-Tendering model to ensure some security mechanisms such as confidentiality, integrity, and accessibility of the docum...

Full description

Saved in:
Bibliographic Details
Main Authors: Mohd, Haslina, Baharom, Fauziah, Muhd Darus, Norida, Saip, Mohamed Ali, Marzuki @ Matt, Zaharin, Yasin, Azman, Muhammad Robie, Muhammad Afdhal
Format: Article
Language:English
Published: ExcelingTech Publishers 2016
Subjects:
Online Access:http://repo.uum.edu.my/20572/1/IJCSM%205%204%202016%20114%20120.pdf
http://repo.uum.edu.my/20572/
http://www.ojs.excelingtech.co.uk/index.php/IJSCM/article/view/1344
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Utara Malaysia
Language: English
id my.uum.repo.20572
record_format eprints
spelling my.uum.repo.205722017-01-08T07:45:40Z http://repo.uum.edu.my/20572/ A secured e-tendering model based on rational unified process (RUP) approach: inception and elaboration phases Mohd, Haslina Baharom, Fauziah Muhd Darus, Norida Saip, Mohamed Ali Marzuki @ Matt, Zaharin Yasin, Azman Muhammad Robie, Muhammad Afdhal QA75 Electronic computers. Computer science Due to the rapid rise in the e-Tendering transaction over the internet and the increasing use of e-Tendering solution by large organizations, there is a need to construct a secured e-Tendering model to ensure some security mechanisms such as confidentiality, integrity, and accessibility of the document are embedded in the e-tendering model.This to ensure the e-tendering transaction is secured and the most important is to gain trust from the e-Tendering stakeholder. Therefore, there is a need to develop a secured e-Tendering model as a guideline to e-tendering developers in developing the system. The Rational Unified Process (RUP) is the most appropriate system development methodology that can guide researchers in generating secured artifact. The RUP has been used by many researchers to construct a secured application model in various researches and projects. This due to the ability of the RUP in guiding researchers to deliver secured artifacts through Inception and elaboration phases.Therefore, this study aims to construct a secured e-tendering artifacts based on RUP. The Unified Modeling Language (UML) is used to generate the secured e-tendering artifacts. This paper discusses the generation of use case, misuse case and class diagrams based on security mechanism that need to be embedded in the e-Tendering model.This study also found that, the RUP is one of the best system development methodology that can be used as one of the research methodology in the Software Engineering domain, especially related to secured design of any observed application.This methodology has been tested in various studies, such as in Simulation-based Decision Support, Security Requirement Engineering, Business Modeling and Secure System Requirement, and so forth.This study may contribute to the software industries in developing a secured system application in the future, and also to the secured system modeling domain. ExcelingTech Publishers 2016-12 Article PeerReviewed application/pdf en cc4_by http://repo.uum.edu.my/20572/1/IJCSM%205%204%202016%20114%20120.pdf Mohd, Haslina and Baharom, Fauziah and Muhd Darus, Norida and Saip, Mohamed Ali and Marzuki @ Matt, Zaharin and Yasin, Azman and Muhammad Robie, Muhammad Afdhal (2016) A secured e-tendering model based on rational unified process (RUP) approach: inception and elaboration phases. International Journal of Supply Chain Management (IJSCM), 5 (4). pp. 114-120. ISSN 2050-7399 http://www.ojs.excelingtech.co.uk/index.php/IJSCM/article/view/1344
institution Universiti Utara Malaysia
building UUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Utara Malaysia
content_source UUM Institutionali Repository
url_provider http://repo.uum.edu.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Mohd, Haslina
Baharom, Fauziah
Muhd Darus, Norida
Saip, Mohamed Ali
Marzuki @ Matt, Zaharin
Yasin, Azman
Muhammad Robie, Muhammad Afdhal
A secured e-tendering model based on rational unified process (RUP) approach: inception and elaboration phases
description Due to the rapid rise in the e-Tendering transaction over the internet and the increasing use of e-Tendering solution by large organizations, there is a need to construct a secured e-Tendering model to ensure some security mechanisms such as confidentiality, integrity, and accessibility of the document are embedded in the e-tendering model.This to ensure the e-tendering transaction is secured and the most important is to gain trust from the e-Tendering stakeholder. Therefore, there is a need to develop a secured e-Tendering model as a guideline to e-tendering developers in developing the system. The Rational Unified Process (RUP) is the most appropriate system development methodology that can guide researchers in generating secured artifact. The RUP has been used by many researchers to construct a secured application model in various researches and projects. This due to the ability of the RUP in guiding researchers to deliver secured artifacts through Inception and elaboration phases.Therefore, this study aims to construct a secured e-tendering artifacts based on RUP. The Unified Modeling Language (UML) is used to generate the secured e-tendering artifacts. This paper discusses the generation of use case, misuse case and class diagrams based on security mechanism that need to be embedded in the e-Tendering model.This study also found that, the RUP is one of the best system development methodology that can be used as one of the research methodology in the Software Engineering domain, especially related to secured design of any observed application.This methodology has been tested in various studies, such as in Simulation-based Decision Support, Security Requirement Engineering, Business Modeling and Secure System Requirement, and so forth.This study may contribute to the software industries in developing a secured system application in the future, and also to the secured system modeling domain.
format Article
author Mohd, Haslina
Baharom, Fauziah
Muhd Darus, Norida
Saip, Mohamed Ali
Marzuki @ Matt, Zaharin
Yasin, Azman
Muhammad Robie, Muhammad Afdhal
author_facet Mohd, Haslina
Baharom, Fauziah
Muhd Darus, Norida
Saip, Mohamed Ali
Marzuki @ Matt, Zaharin
Yasin, Azman
Muhammad Robie, Muhammad Afdhal
author_sort Mohd, Haslina
title A secured e-tendering model based on rational unified process (RUP) approach: inception and elaboration phases
title_short A secured e-tendering model based on rational unified process (RUP) approach: inception and elaboration phases
title_full A secured e-tendering model based on rational unified process (RUP) approach: inception and elaboration phases
title_fullStr A secured e-tendering model based on rational unified process (RUP) approach: inception and elaboration phases
title_full_unstemmed A secured e-tendering model based on rational unified process (RUP) approach: inception and elaboration phases
title_sort secured e-tendering model based on rational unified process (rup) approach: inception and elaboration phases
publisher ExcelingTech Publishers
publishDate 2016
url http://repo.uum.edu.my/20572/1/IJCSM%205%204%202016%20114%20120.pdf
http://repo.uum.edu.my/20572/
http://www.ojs.excelingtech.co.uk/index.php/IJSCM/article/view/1344
_version_ 1644282994055184384