Misuse Case Modeling for Secure E-Tendering System

  • Mohd H
  • Robie M
  • Baharom F
  • et al.
N/ACitations
Citations of this article
21Readers
Mendeley users who have this article in their library.

Abstract

Tendering process is utilized by principal to invited capable tenderer to participate in competitive bid for winning a large project. Due to advent of IT infrastructure, E-tendering is introduced and adopted in many countries. Yet, an electronic environment did not promise curbing collusion between principal and certain tenderers. Other than common threats to system like security breaches by malicious parties, security issue related to ethical issue like fraud and repudiation issue where no evidence existed to denied it. In this paper, common threats for e-tendering process altogether with security countermeasure are described. This three interrelated attribute (consist of tender phase, threat and security countermeasure) are illustrated in misuse case for better understanding of the risk that may occurs in particular tender phase. Furthermore, it sought to ease the system developer for designing and constructing a secure e-tendering system.

Cite

CITATION STYLE

APA

Mohd, H., Robie, M. A. M., Baharom, F., Nordin, N., Darus, N. M., Saip, M. A., … Hashim, N. L. (2012). Misuse Case Modeling for Secure E-Tendering System. In M. Baharom, F and Mahmuddin, M and Yusof, Y and Hashim, NL and Hassan, S and Yusop, NI and Ishak, WHW and Saip (Ed.), Proceedings of Knowledge Management International Conference (pp. 569–575).

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free