Securing e-Government and e-Voting with an open cloud computing architecture
暂无分享,去创建一个
[1] Paul T. Jaeger,et al. The endless wire: e-government as global phenomenon , 2003, Gov. Inf. Q..
[2] Joe Mohen,et al. The case for internet voting , 2001, CACM.
[3] William C. Barker. Guideline for Identifying an Information System as a National Security System , 2003 .
[4] Rajkumar Buyya,et al. Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.
[5] Richard Heeks. Information Systems and Public Sector Accountability , 2004 .
[6] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[7] Jorge Marcelo Montagna,et al. A framework for the assessment and analysis of electronic government proposals , 2005, Electron. Commer. Res. Appl..
[8] Lorrie Faith Cranor,et al. In Search of the Perfect Voting Technology: No Easy Answers , 2003, Secure Electronic Voting.
[9] Rajkumar Buyya,et al. Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .
[10] Richard Heeks. Understanding e-Governance for Development , 2001 .
[11] Thomas M. Buchsbaum. E-Voting: International Developments and Lessons Learnt , 2004, Electronic Voting in Europe.
[12] Karen A. Scarfone,et al. SP 800-46 Rev. 1. Guide to Enterprise Telework and Remote Access Security , 2009 .
[13] William C. Barker,et al. Volume I: Guide for Mapping Types of Information and Information Systems to Security Categories , 2008 .
[14] Victor Bekkers,et al. Electronic Service Delivery in Public Administration: Some Trends and Issues , 1999 .
[15] Regina Bernhaupt,et al. Broadening eParticipation: Rethinking ICTs and Participation , 2006 .
[16] Charles P. Pfleeger,et al. Security in computing , 1988 .
[17] Richard Heeks,et al. Building e-Governance for Development: A Framework for National and Donor Action , 2001 .
[18] John Carlo Bertot,et al. The chief information officer (CIO): assessing its impact , 2000, Gov. Inf. Q..
[19] Dimitris Gritzali,et al. Principles and requirements for a secure e-voting system , 2002, Comput. Secur..
[20] Merle S. King,et al. Implementing voting systems: the Georgia method , 2004, CACM.
[21] B. Obama,et al. Office of the Press Secretary , 2009 .
[22] Gino Verleye,et al. User-centered E-Government in practice: A comprehensive model for measuring user satisfaction , 2009, Gov. Inf. Q..
[23] Marianne M. Swanson,et al. Recommended Security Controls for Federal Information Systems , 2005 .
[24] Danny Williams,et al. Cloud Application Architectures: Building Applications and Infrastructure in the Cloud , 2009 .
[25] Jeremy Rose,et al. Characterizing eParticipation , 2007, Int. J. Inf. Manag..
[26] Andreu Riera,et al. Bringing Confidence to Electronic Voting , 2003 .
[27] Unpan. Benchmarking E-government: A Global Perspective , 2022 .
[28] D. Jefferson,et al. Security analysis of SERVE 1 A Security Analysis of the Secure Electronic Registration and Voting Experiment ( SERVE ) , 2004 .
[29] Ann Macintosh,et al. Procedural security in electronic voting , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[30] Rajkumar Buyya,et al. Market-Oriented Cloud Computing: Vision, Hype, and Reality of Delivering Computing as the 5th Utility , 2009, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid.
[31] K. Deutsch. The nerves of government : models of political communication and control , 1965 .
[32] Maria Wimmer,et al. Integrated Service Modeling for Online One-stop Government , 2002, Electron. Mark..
[33] Mete Yildiz,et al. E-government research: Reviewing the literature, limitations, and ways forward , 2007, Gov. Inf. Q..