Misuse case modeling for secure e-tendering system
Tendering process is utilized by principal to invited capable tenderer to participate in competitive bid for winning a large project.Due to advent of IT infrastructure, E-tendering is introduced and adopted in many countries. Yet, an electronic environment did not promise curbing collusion between p...
Saved in:
Main Authors: | , , , , , , , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2012
|
Subjects: | |
Online Access: | http://repo.uum.edu.my/9400/1/CR214.pdf http://repo.uum.edu.my/9400/ http://www.kmice.cms.net.my |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Utara Malaysia |
Language: | English |
id |
my.uum.repo.9400 |
---|---|
record_format |
eprints |
spelling |
my.uum.repo.94002015-05-25T02:53:36Z http://repo.uum.edu.my/9400/ Misuse case modeling for secure e-tendering system Mohd, Haslina Muhammad Robie, Mohd Afdhal Baharom, Fauziah Nordin, Nazib Muhd Darus, Norida Saip, Mohamed Ali Yasin, Azman Zainol, Azida Hashim, Nor Laily QA75 Electronic computers. Computer science Tendering process is utilized by principal to invited capable tenderer to participate in competitive bid for winning a large project.Due to advent of IT infrastructure, E-tendering is introduced and adopted in many countries. Yet, an electronic environment did not promise curbing collusion between principal and certain tenderers. Other than common threats to system like security breaches by malicious parties, security issue related to ethical issue like fraud and repudiation issue where no evidence existed to denied it.In this paper, common threats for e-tendering process altogether with security countermeasure are described. This three interrelated attribute (consist of tender phase, threat and security countermeasure) are illustrated in misuse case for better understanding of the risk that may occurs in particular tender phase. Furthermore, it sought to ease the system developer for designing and constructing a secure e-tendering system. 2012-07-04 Conference or Workshop Item NonPeerReviewed application/pdf en http://repo.uum.edu.my/9400/1/CR214.pdf Mohd, Haslina and Muhammad Robie, Mohd Afdhal and Baharom, Fauziah and Nordin, Nazib and Muhd Darus, Norida and Saip, Mohamed Ali and Yasin, Azman and Zainol, Azida and Hashim, Nor Laily (2012) Misuse case modeling for secure e-tendering system. In: Knowledge Management International Conference (KMICe) 2012, 4 – 6 July 2012, Johor Bahru, Malaysia. (Unpublished) http://www.kmice.cms.net.my |
institution |
Universiti Utara Malaysia |
building |
UUM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Utara Malaysia |
content_source |
UUM Institutionali Repository |
url_provider |
http://repo.uum.edu.my/ |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Mohd, Haslina Muhammad Robie, Mohd Afdhal Baharom, Fauziah Nordin, Nazib Muhd Darus, Norida Saip, Mohamed Ali Yasin, Azman Zainol, Azida Hashim, Nor Laily Misuse case modeling for secure e-tendering system |
description |
Tendering process is utilized by principal to invited capable tenderer to participate in competitive bid for winning a large project.Due to advent of IT infrastructure, E-tendering is introduced and adopted in many countries. Yet, an electronic environment did not promise curbing collusion between principal and certain tenderers. Other than common threats to system like security breaches by malicious parties, security issue related to ethical issue like fraud and repudiation issue where no evidence existed
to denied it.In this paper, common threats for e-tendering process altogether with security countermeasure are described. This three interrelated attribute (consist of tender phase, threat and security countermeasure) are illustrated in misuse case for better understanding of the risk that may occurs in particular tender phase. Furthermore, it sought to ease the system developer for designing and constructing a secure e-tendering system. |
format |
Conference or Workshop Item |
author |
Mohd, Haslina Muhammad Robie, Mohd Afdhal Baharom, Fauziah Nordin, Nazib Muhd Darus, Norida Saip, Mohamed Ali Yasin, Azman Zainol, Azida Hashim, Nor Laily |
author_facet |
Mohd, Haslina Muhammad Robie, Mohd Afdhal Baharom, Fauziah Nordin, Nazib Muhd Darus, Norida Saip, Mohamed Ali Yasin, Azman Zainol, Azida Hashim, Nor Laily |
author_sort |
Mohd, Haslina |
title |
Misuse case modeling for secure e-tendering system |
title_short |
Misuse case modeling for secure e-tendering system |
title_full |
Misuse case modeling for secure e-tendering system |
title_fullStr |
Misuse case modeling for secure e-tendering system |
title_full_unstemmed |
Misuse case modeling for secure e-tendering system |
title_sort |
misuse case modeling for secure e-tendering system |
publishDate |
2012 |
url |
http://repo.uum.edu.my/9400/1/CR214.pdf http://repo.uum.edu.my/9400/ http://www.kmice.cms.net.my |
_version_ |
1644280099129786368 |