mailto:uumlib@uum.edu.my 24x7 Service; AnyTime; AnyWhere

Misuse case modeling for secure e-tendering system

Mohd, Haslina and Muhammad Robie, Mohd Afdhal and Baharom, Fauziah and Nordin, Nazib and Muhd Darus, Norida and Saip, Mohamed Ali and Yasin, Azman and Zainol, Azida and Hashim, Nor Laily (2012) Misuse case modeling for secure e-tendering system. In: Knowledge Management International Conference (KMICe) 2012, 4 – 6 July 2012, Johor Bahru, Malaysia. (Unpublished)

[thumbnail of CR214.pdf] PDF
Download (208kB)

Abstract

Tendering process is utilized by principal to invited capable tenderer to participate in competitive bid for winning a large project.Due to advent of IT infrastructure, E-tendering is introduced and adopted in many countries. Yet, an electronic environment did not promise curbing collusion between principal and certain tenderers. Other than common threats to system like security breaches by malicious parties, security issue related to ethical issue like fraud and repudiation issue where no evidence existed to denied it.In this paper, common threats for e-tendering process altogether with security countermeasure are described. This three interrelated attribute (consist of tender phase, threat and security countermeasure) are illustrated in misuse case for better understanding of the risk that may occurs in particular tender phase. Furthermore, it sought to ease the system developer for designing and constructing a secure e-tendering system.

Item Type: Conference or Workshop Item (Paper)
Uncontrolled Keywords: e-Tendering, Security threats and counter measure; misuse case.
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: College of Arts and Sciences
Depositing User: Mrs. Norazmilah Yaakub
Date Deposited: 18 Dec 2013 00:53
Last Modified: 25 May 2015 02:53
URI: https://repo.uum.edu.my/id/eprint/9400

Actions (login required)

View Item View Item