Research of E-Government Security Plan System

Article Preview

Abstract:

The e-government is an important content of the national government informational progress, it has far-reaching significance, it's security also faces many threats and challenges, it has frequent occurrence of security incidents. To control such a huge security risk and avoid huge losses, and protect the security of e-government, this paper constructs the e-government security plan system, in the design of the system, the security protection of e-government system and institution, emergency response system and mechanism are made as a major part of the design, security protection include security management and technology, and quantitatively analyze the security services performance assessment standards, and detailedly design security services performance assessment algorithm, and the algorithm is integrated into the security management and is verified by an instance, the plan system can do a better safety risk assessment, can control certain risks and losses.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 756-759)

Pages:

1580-1584

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Fazle Hadi and Fahad T. Bin Muhaya . Essentials for the E-Government Security:Information Society (i-Society), 2011 International Conference on Date of Conference: 27-29 June 2011. IEEE Computer (2011).

DOI: 10.1109/i-society18435.2011.5978443

Google Scholar

[2] Chen Xiaojing. Research within and outside the network of e-government integration technology. ZheJiang Land & Resources, 2010 (11).

Google Scholar

[3] Su Jin tian, Guo He Qing, Gao Ying. Based on the e-government security design of software Agent [J]. Computer Applications and Software, 2006(3):56-58.

Google Scholar

[4] Stephen smith and rodger jamieson, Determining key factors in egovernment information system security. information systems management, (2006).

Google Scholar