Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
E-Government
biblio
Research on E-government Information Security Based on Cloud Computing
Submitted by grigby1 on Fri, 08/25/2023 - 10:34am
Cloud Computing
Large scale integration
Human Factors
standardization
E-Government
cloud computing security
Compositionality
composability
Information Assurance
Computers
Computational modeling
information security
Scalability
Conferences
Resiliency
resilience
collaboration
policy-based governance
Metrics
Human behavior
pubcrawl
biblio
Design and Implementation of A Vulnerability-Tolerant Reverse Proxy Based on Moving Target Defense for E-Government Application
Submitted by grigby1 on Tue, 02/22/2022 - 5:45pm
network security
information security
pubcrawl
Metrics
resilience
Resiliency
Scalability
cyber security
Prototypes
digital transformation
Dynamic scheduling
Uniform resource locators
Economics
E-Government
moving target defense
Communications technology
Web application
biblio
Research on Governmental Data Sharing Based on Local Differential Privacy Approach
Submitted by grigby1 on Fri, 10/16/2020 - 11:24am
information sharing
statistical data
statistical analysis
sharing statistics
Resiliency
resilience
pubcrawl
private blockchain
Privacy-preserving
privacy protection models
privacy disclosure
privacy
policy-based governance
Peer-to-peer computing
local differential privacy
blockchain
information management
governmental departments
governmental data sharing
government information resources
government departments
government data processing
Government
e-government applications
E-Government
differential privacy
data sharing
data privacy
Cybersecurity
collaboration
biblio
Security Analysis of the Electronic Voting Protocol Based on Blind Intermediaries Using the SPIN Verifier
Submitted by grigby1 on Fri, 10/16/2020 - 11:23am
LTL
verification
tools
SPIN verifier
SPIN formal verifier
SPIN
Security analysis
Resiliency
resilience
pubcrawl
Protocol Security
Promela language
policy-based governance
model checking
MITM
man in the middle attack
authentication
Linear Temporal Logic
government data processing
formal verification
Electronic voting systems
electronic voting system
electronic voting protocol
electronic voting
e-voting
E-Government
data substitution
Cybersecurity
Cryptographic Protocols
cryptographic protocol
collaboration
biblio
A User-centred Design Approach for Mobile- Government Systems for the Elderly
Submitted by grigby1 on Fri, 10/16/2020 - 11:23am
successful-government systems
pubcrawl
qualitative research methods
quantitative research methods
resilience
Resiliency
security
Senior citizens
Statistics
policy-based governance
technology acceptance model
usability
user acceptance
user centred design
user group
user-centred design approach
user-driven method
user-friendliness
IGUAN framework
collaboration
Cybersecurity
E-Government
e-government services
Electronic government
government data processing
governmental services
Human Factors
acceptance
important benefits
key acceptance factors
m-government for elderly
m-Government prototype
mobile computing
mobile government systems
mobile-government systems
biblio
LeMTrac: Legislative Management and Tracking System
Submitted by grigby1 on Fri, 10/16/2020 - 11:23am
quantitative research design
Local Government Unit
Measurement
Municipal Local Government Units
Philippines municipalities
policy-based governance
Princeton Project Management Methodology
project management
pubcrawl
local government
resilience
Resiliency
Sangguniang Bayan offce
software metrics
software quality
tracking system
transparent government
and Tracking System
LeMTrac
legislative management
legislation
ISO standards
ISO 9126 Software quality metric Usability
information and communications technology
information and communication technology
ICT
government services
government data processing
Electronic government
E-Government
E-Governance
Cybersecurity
collaboration
biblio
The Roles of E-Government in Healthcare from the Perspective of Structuration Theory
Submitted by grigby1 on Fri, 10/16/2020 - 11:23am
Lenses
Trajectory
structuration theory
security
Resiliency
resilience
qualitative methods
public administration
pubcrawl
policy-based governance
Medical services
collaboration
information technology
healthcare services
Healthcare
health care
government policies
Electronic government
e-government concept
E-Government
data analysis
Cybersecurity
biblio
Total e-Governance: Pros Cons
Submitted by grigby1 on Fri, 10/16/2020 - 11:22am
good governance
security
Resiliency
resilience
pubcrawl
politics
political turmoil
policy-based governance
internet
information technology
government data processing
Government
Big Data
finance
ERP
economical turmoil
E-Government
E-Governance
Databases
data center
Cybersecurity
computer security
collaboration
biblio
E-Government Documents Authentication and Security by Utilizing Video Crypto-Steganography
Submitted by grigby1 on Fri, 10/16/2020 - 11:22am
Image color analysis
video crypto-steganography
video coding
Steganography
security
secret data
reversible data hiding
Resiliency
resilience
RDH
pubcrawl
policy-based governance
key security parameters
internet
image encryption scheme
authentication
encryption
Electronic government
e-government process
e-government documents authentication
E-Government
data hiding scheme
data hiding procedure
data encapsulation
Cybersecurity
Cryptography
cover image
Conferences
collaboration
biblio
Identity theft on e-government/e-governance digital forensics
Submitted by grigby1 on Fri, 10/16/2020 - 11:22am
Neural networks
fraudulent transactions
genetic algorithms
Government
government data processing
governments
identity theft
internet
Law
malicious online activity
fraud
policy-based governance
product reviews
pubcrawl
resilience
Resiliency
system intrusions
time 13.0 month
user anonymity
Cybercrime
collaboration
Computer crime
corporate users
credit card fraud
credit card transactions
Credit cards
credit transactions
cyber-threats
blockchain technology
Cybersecurity
cyberspace-low entry barriers
Digital Forensics
E-Governance
E-Government
electronic commerce
Electronic government
financial fraud
1
2
3
4
5
next ›
last »